Information security assessment of wireless sensor networks based on Bayesian attack graphs

被引:6
|
作者
Chen, You Ying [1 ]
Xu, Bing [2 ]
Long, Jun [3 ]
机构
[1] Guangdong Ocean Univ, Sch Math & Comp Sci, Zhanjiang, Guangdong, Peoples R China
[2] Guangdong Univ Petrochem Technol, Sch Comp Sci, Maoming 525000, Guangdong, Peoples R China
[3] Yulin Normal Univ, Sch Comp Sci & Engn, Yulin, Guangxi, Peoples R China
关键词
Information security; wireless sensor networks; fuzzy comprehensive evaluation; dynamic security risk assessment; Bayesian network; attack graph;
D O I
10.3233/JIFS-189711
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Network security issues have become increasingly prominent, and information security risk assessment is an important part of network security protection. Security risk assessment based on methods such as attack trees, attack graphs, neural networks, and fuzzy logic has problems such as difficulty in data collection during the assessment process, excessive reliance on expert experience, failure to consider the actual network environment, or ineffective joint application. The qualitative and quantitative information security fuzzy comprehensive evaluation method uses the theory of fuzzy mathematics to better solve the above problems, so that the evaluation method is scientific, comprehensive and operable. To improve the accuracy of information security risk assessment in wireless sensor networks, we propose a fuzzy comprehensive evaluation method based on Bayesian attack graphs. This considers the impact of environmental factors of the assessed system on security risk and the spread of the effects on the Bayesian network. Therefore, this model can reflect possible situations due to network attacks in the wireless sensor network system. The results show that this quantitative evaluation method is applicable to assessing risk in wireless sensor network systems, and the results are more objective and accurate.
引用
收藏
页码:4511 / 4517
页数:7
相关论文
共 50 条
  • [1] Security risk assessment based on bayesian multi-step attack graphs
    Yang, Yunxue
    Jin, Shuyuan
    Fang, Binxing
    Journal of Computational Information Systems, 2015, 11 (11): : 3911 - 3918
  • [2] Information Hiding data security based on Wireless Sensor Networks
    Wang, Zhidan
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2016), 2016, 50 : 240 - 245
  • [3] Ways to improve the information security in Wireless Sensor Networks.
    Wasimi, Delshad
    DILEMAS CONTEMPORANEOS-EDUCACION POLITICA Y VALORES, 2019, 6
  • [4] An Attack Tree based Risk Assessment for Location Privacy in Wireless Sensor Networks
    Jiang, Rong
    Luo, Jun
    Wang, Xiaoping
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [5] Efficient security mechanism to counter the malicious attack in wireless sensor networks
    Sunil Gupta
    Harsh K. Verma
    A. L. Sangal
    CSI Transactions on ICT, 2014, 2 (1) : 35 - 41
  • [6] ASSESSING SECURITY RISK FOR WIRELESS SENSOR NETWORKS UNDER CYBER ATTACK
    Yarbrough, Brian
    Wagner, Neal
    PROCEEDINGS OF THE ANNUAL SIMULATION SYMPOSIUM (ANSS 2018), 2018, 50 (02):
  • [7] Energy Optimised Security against Wormhole Attack in IoT-Based Wireless Sensor Networks
    Shahid, Hafsa
    Ashraf, Humaira
    Javed, Hafsa
    Humayun, Mamoona
    Jhanjhi, Nz
    AlZain, Mohammed A.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (02): : 1966 - 1980
  • [8] Network Information Security Situation Assessment Based on Bayesian Network
    Wang Xing-zhu
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (05): : 129 - 137
  • [9] Evaluation of Security Mechanisms for Information Dissemination in Wireless Sensor Networks
    Jambli, Mohamad Nazim
    Suhaili, Sinarwati Mohamad
    Mansor, Nurul Sahida
    Abdullah, Johari
    Lenando, Halikul
    2013 FIRST INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, MODELLING AND SIMULATION (AIMS 2013), 2013, : 416 - 420
  • [10] On the Usefulness of Information Hiding Techniques for Wireless Sensor Networks Security
    Al-Sharif, Rola
    Guyeux, Christophe
    Fadil, Yousra Ahmed
    Makhoul, Abdallah
    Jaber, Ali
    AD HOC NETWORKS, ADHOCNETS 2014, 2014, 140 : 51 - 62