A Vulnerability Assessment Method in Industrial Internet of Things Based on Attack Graph and Maximum Flow
To solve the low attack path quantification degree and complex path finding in the industrial Internet of Things, a vulnerability assessment method based on attack graph and maximum flow is proposed. The method takes into account the factors influencing the attack behavior and relationship between n...
Main Authors: | Huan Wang, Zhanfang Chen, Jianping Zhao, Xiaoqiang Di, Dan Liu |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2018-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8290918/ |
Similar Items
-
Vulnerabilities in the internet of things
by: José Custodio Najar-Pacheco, et al.
Published: (2019-07-01) -
Internet of Things Vulnerabilities in Military Environments
by: Andras Toth
Published: (2021-09-01) -
Internet of Things Security: Layered classification of attacks and possible Countermeasures
by: Otmane El Mouaatamid, et al.
Published: (2016-12-01) -
Defending Against New-Flow Attack in SDN-Based Internet of Things
by: Tong Xu, et al.
Published: (2017-01-01) -
Command Disaggregation Attack and Mitigation in Industrial Internet of Things
by: Peng Xun, et al.
Published: (2017-10-01)