Automated Security Assessment for the Internet of Things

被引:14
作者
Duan, Xuanyu [1 ]
Ge, Mengmeng [2 ]
Triet Huynh Minh Le [3 ]
Ullah, Faheem [3 ]
Gao, Shang [1 ]
Lu, Xuequan [1 ]
Babar, M. Ali [3 ,4 ]
机构
[1] Deakin Univ, Sch Informat Technol, Geelong, Vic, Australia
[2] RMIT Univ, Sch Comp Technol, Melbourne, Vic, Australia
[3] Univ Adelaide, Sch Comp Sci, Adelaide, SA, Australia
[4] Cyber Secur Cooperat Res Ctr, Joondalup, Australia
来源
2021 IEEE 26TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC 2021) | 2021年
关键词
Internet of Things; Vulnerability Assessment; Machine Learning; Natural Language Processing; Graphical Security Model; IOT;
D O I
10.1109/PRDC53464.2021.00016
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Internet of Things (IoT) based applications face an increasing number of potential security risks, which need to be systematically assessed and addressed. Expert-based manual assessment of IoT security is a predominant approach, which is usually inefficient. To address this problem, we propose an automated security assessment framework for IoT networks. Our framework first leverages machine learning and natural language processing to analyze vulnerability descriptions for predicting vulnerability metrics. The predicted metrics are then input into a two-layered graphical security model, which consists of an attack graph at the upper layer to present the network connectivity and an attack tree for each node in the network at the bottom layer to depict the vulnerability information. This security model automatically assesses the security of the IoT network by capturing potential attack paths. We evaluate the viability of our approach using a proof-of-concept smart building system model which contains a variety of real-world IoT devices and potential vulnerabilities. Our evaluation of the proposed framework demonstrates its effectiveness in terms of automatically predicting the vulnerability metrics of new vulnerabilities with more than 90% accuracy, on average, and identifying the most vulnerable attack paths within an IoT network. The produced assessment results can serve as a guideline for cybersecurity professionals to take further actions and mitigate risks in a timely manner.
引用
收藏
页码:47 / 56
页数:10
相关论文
共 41 条
  • [1] Design and implementation of automated IoT security testbed
    Abu Waraga, Omnia
    Bettayeb, Meriem
    Nasir, Qassim
    Abu Talib, Manar
    [J]. COMPUTERS & SECURITY, 2020, 88 (88)
  • [2] [Anonymous], 2021, ANYCHART
  • [3] [Anonymous], 2012, P 10 AUSTR INF SEC M
  • [4] [Anonymous], 2012, Performance and Reliability Analysis of Computer Systems: An Example-Based Approach Using the SHARPE Software Package
  • [5] Blinowski Grzegorz J., 2020, Theory and Applications of Dependable Computer Systems. Proceedings of the Fifteenth International Conference on Dependability of Computer Systems DepCoS-RELCOMEX. Advances in Intelligent Systems and Computing (1173), P82, DOI 10.1007/978-3-030-48256-5_9
  • [6] Bugeja J, 2019, INT CONF PERVAS COMP, P267, DOI [10.1109/percomw.2019.8730672, 10.1109/PERCOMW.2019.8730672]
  • [7] XGBoost: A Scalable Tree Boosting System
    Chen, Tianqi
    Guestrin, Carlos
    [J]. KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2016, : 785 - 794
  • [8] Duc A. N., 2017, P XP2017 SCI WORKSH, P1
  • [9] Modeling, analyzing and predicting security cascading attacks in smart buildings systems-of-systems
    EL Hachem, Jamal
    Chiprianov, Vanea
    Babar, Muhammad Ali
    AL Khalil, Tarek
    Aniorte, Philippe
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2020, 162
  • [10] Security modelling and assessment of modern networks using time independent Graphical Security Models
    Enoch, Simon Yusuf
    Hong, Jin B.
    Kim, Dong Seong
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 148