Publication type: | Article in scientific journal |
Type of review: | Peer review (publication) |
Title: | Cost-aware securing of IoT systems using attack graphs |
Authors: | Yiğit, Beytüllah Gür, Gürkan Alagöz, Fatih Tellenbach, Bernhard |
DOI: | 10.1016/j.adhoc.2018.10.024 |
Published in: | Ad Hoc Networks |
Volume(Issue): | 86 |
Page(s): | 23 |
Pages to: | 35 |
Issue Date: | 2019 |
Publisher / Ed. Institution: | Elsevier |
ISSN: | 1570-8705 1570-8713 |
Language: | English |
Subject (DDC): | 004: Computer science |
Abstract: | The Internet of Things (IoT) contains a diverse set of sensors, actuators and other Internet-connected devices communicating, processing data and performing a multitude of functions. It is emerging as an integral part of societal infrastructure enabling smart services. However, these connected objects might have various vulnerabilities that can lead to serious security compromises and breaches. Securing and hardening of IoT systems is thus of vital importance. In that regard, attack graphs provide analytical support to prevent multistep network attacks by showing all possible sequences of vulnerabilities and their interactions. Since attack graphs generally consist of a very large number of nodes, it is computationally challenging to analyze them for network hardening. In this paper, we propose a greedy algorithm using compact attack graphs to find a cost-effective solution to protect IoT systems. First, we extract all possible attack paths which reach predetermined critical resources embedded in the network. Then, exploit or initial condition with minimum effective cost is selected to be removed. This cost is calculated as a function of contribution to attack paths (the higher, the better) and removal cost (the lower, the better). This process continues iteratively until the total cost exceeds the allocated budget. The experimental results show that our algorithm scales almost linearly with the network size and it can be applied to large-scale graphs with a very large number of IoT nodes. In addition to network-hardening, our proposal measures the security level of the network in every step to demonstrate the vulnerability grade of the system. |
URI: | https://digitalcollection.zhaw.ch/handle/11475/15675 |
Fulltext version: | Published version |
License (according to publishing contract): | Licence according to publishing contract |
Departement: | School of Engineering |
Organisational Unit: | Institute of Computer Science (InIT) |
Appears in collections: | Publikationen School of Engineering |
Files in This Item:
There are no files associated with this item.
Show full item record
Yiğit, B., Gür, G., Alagöz, F., & Tellenbach, B. (2019). Cost-aware securing of IoT systems using attack graphs. Ad Hoc Networks, 86, 23–35. https://doi.org/10.1016/j.adhoc.2018.10.024
Yiğit, B. et al. (2019) ‘Cost-aware securing of IoT systems using attack graphs’, Ad Hoc Networks, 86, pp. 23–35. Available at: https://doi.org/10.1016/j.adhoc.2018.10.024.
B. Yiğit, G. Gür, F. Alagöz, and B. Tellenbach, “Cost-aware securing of IoT systems using attack graphs,” Ad Hoc Networks, vol. 86, pp. 23–35, 2019, doi: 10.1016/j.adhoc.2018.10.024.
YIĞIT, Beytüllah, Gürkan GÜR, Fatih ALAGÖZ und Bernhard TELLENBACH, 2019. Cost-aware securing of IoT systems using attack graphs. Ad Hoc Networks. 2019. Bd. 86, S. 23–35. DOI 10.1016/j.adhoc.2018.10.024
Yiğit, Beytüllah, Gürkan Gür, Fatih Alagöz, and Bernhard Tellenbach. 2019. “Cost-Aware Securing of IoT Systems Using Attack Graphs.” Ad Hoc Networks 86: 23–35. https://doi.org/10.1016/j.adhoc.2018.10.024.
Yiğit, Beytüllah, et al. “Cost-Aware Securing of IoT Systems Using Attack Graphs.” Ad Hoc Networks, vol. 86, 2019, pp. 23–35, https://doi.org/10.1016/j.adhoc.2018.10.024.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.