A Vulnerability Assessment Method in Industrial Internet of Things Based on Attack Graph and Maximum Flow

To solve the low attack path quantification degree and complex path finding in the industrial Internet of Things, a vulnerability assessment method based on attack graph and maximum flow is proposed. The method takes into account the factors influencing the attack behavior and relationship between n...

Full description

Bibliographic Details
Main Authors: Huan Wang, Zhanfang Chen, Jianping Zhao, Xiaoqiang Di, Dan Liu
Format: Article
Language:English
Published: IEEE 2018-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8290918/
id doaj-9876a9ad61e44cc29105dc61c1f5579b
record_format Article
spelling doaj-9876a9ad61e44cc29105dc61c1f5579b2021-03-29T20:38:22ZengIEEEIEEE Access2169-35362018-01-0168599860910.1109/ACCESS.2018.28056908290918A Vulnerability Assessment Method in Industrial Internet of Things Based on Attack Graph and Maximum FlowHuan Wang0Zhanfang Chen1Jianping Zhao2https://orcid.org/0000-0002-4080-8448Xiaoqiang Di3Dan Liu4Department of Computer Science and Technology, Changchun University of Science and Technology, Changchun, ChinaDepartment of Computer Science and Technology, Changchun University of Science and Technology, Changchun, ChinaDepartment of Computer Science and Technology, Changchun University of Science and Technology, Changchun, ChinaDepartment of Computer Science and Technology, Changchun University of Science and Technology, Changchun, ChinaDepartment of Computer Science and Technology, Changchun University of Science and Technology, Changchun, ChinaTo solve the low attack path quantification degree and complex path finding in the industrial Internet of Things, a vulnerability assessment method based on attack graph and maximum flow is proposed. The method takes into account the factors influencing the attack behavior and relationship between network nodes. The attack risk is calculated by common vulnerability scoring system, which increases the attack path quantification degree. The maximum loss flow describes the attack path, evaluates the network vulnerability by maximum loss flow and loss saturation and represents the vulnerability relevance. Avoiding the repeat calculation and obtaining the potential key vulnerability path fast, the augmented road algorithm is used to find optimal attack path within global path. The result shows that the method is feasible and can evaluate the vulnerability and risk path objectively.https://ieeexplore.ieee.org/document/8290918/Vulnerability assessmentattack graphmaximum flowindustrial Internet of Things
collection DOAJ
language English
format Article
sources DOAJ
author Huan Wang
Zhanfang Chen
Jianping Zhao
Xiaoqiang Di
Dan Liu
spellingShingle Huan Wang
Zhanfang Chen
Jianping Zhao
Xiaoqiang Di
Dan Liu
A Vulnerability Assessment Method in Industrial Internet of Things Based on Attack Graph and Maximum Flow
IEEE Access
Vulnerability assessment
attack graph
maximum flow
industrial Internet of Things
author_facet Huan Wang
Zhanfang Chen
Jianping Zhao
Xiaoqiang Di
Dan Liu
author_sort Huan Wang
title A Vulnerability Assessment Method in Industrial Internet of Things Based on Attack Graph and Maximum Flow
title_short A Vulnerability Assessment Method in Industrial Internet of Things Based on Attack Graph and Maximum Flow
title_full A Vulnerability Assessment Method in Industrial Internet of Things Based on Attack Graph and Maximum Flow
title_fullStr A Vulnerability Assessment Method in Industrial Internet of Things Based on Attack Graph and Maximum Flow
title_full_unstemmed A Vulnerability Assessment Method in Industrial Internet of Things Based on Attack Graph and Maximum Flow
title_sort vulnerability assessment method in industrial internet of things based on attack graph and maximum flow
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2018-01-01
description To solve the low attack path quantification degree and complex path finding in the industrial Internet of Things, a vulnerability assessment method based on attack graph and maximum flow is proposed. The method takes into account the factors influencing the attack behavior and relationship between network nodes. The attack risk is calculated by common vulnerability scoring system, which increases the attack path quantification degree. The maximum loss flow describes the attack path, evaluates the network vulnerability by maximum loss flow and loss saturation and represents the vulnerability relevance. Avoiding the repeat calculation and obtaining the potential key vulnerability path fast, the augmented road algorithm is used to find optimal attack path within global path. The result shows that the method is feasible and can evaluate the vulnerability and risk path objectively.
topic Vulnerability assessment
attack graph
maximum flow
industrial Internet of Things
url https://ieeexplore.ieee.org/document/8290918/
work_keys_str_mv AT huanwang avulnerabilityassessmentmethodinindustrialinternetofthingsbasedonattackgraphandmaximumflow
AT zhanfangchen avulnerabilityassessmentmethodinindustrialinternetofthingsbasedonattackgraphandmaximumflow
AT jianpingzhao avulnerabilityassessmentmethodinindustrialinternetofthingsbasedonattackgraphandmaximumflow
AT xiaoqiangdi avulnerabilityassessmentmethodinindustrialinternetofthingsbasedonattackgraphandmaximumflow
AT danliu avulnerabilityassessmentmethodinindustrialinternetofthingsbasedonattackgraphandmaximumflow
AT huanwang vulnerabilityassessmentmethodinindustrialinternetofthingsbasedonattackgraphandmaximumflow
AT zhanfangchen vulnerabilityassessmentmethodinindustrialinternetofthingsbasedonattackgraphandmaximumflow
AT jianpingzhao vulnerabilityassessmentmethodinindustrialinternetofthingsbasedonattackgraphandmaximumflow
AT xiaoqiangdi vulnerabilityassessmentmethodinindustrialinternetofthingsbasedonattackgraphandmaximumflow
AT danliu vulnerabilityassessmentmethodinindustrialinternetofthingsbasedonattackgraphandmaximumflow
_version_ 1724194454790733824