Loading…
Automated Security Assessment for the Internet of Things
Internet of Things (IoT) based applications face an increasing number of potential security risks, which need to be systematically assessed and addressed. Expert-based manual assessment of IoT security is a predominant approach, which is usually inefficient. To address this problem, we propose an au...
Saved in:
Main Authors: | , , , , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 56 |
container_issue | |
container_start_page | 47 |
container_title | |
container_volume | |
creator | Duan, Xuanyu Ge, Mengmeng Minh Le, Triet Huynh Ullah, Faheem Gao, Shang Lu, Xuequan Babar, M. Ali |
description | Internet of Things (IoT) based applications face an increasing number of potential security risks, which need to be systematically assessed and addressed. Expert-based manual assessment of IoT security is a predominant approach, which is usually inefficient. To address this problem, we propose an automated security assessment framework for IoT networks. Our framework first leverages machine learning and natural language processing to analyze vulnerability descriptions for predicting vulnerability metrics. The predicted metrics are then input into a two-layered graphical security model, which consists of an attack graph at the upper layer to present the network connectivity and an attack tree for each node in the network at the bottom layer to depict the vulnerability information. This security model automatically assesses the security of the IoT network by capturing potential attack paths. We evaluate the viability of our approach using a proof-of-concept smart building system model which contains a variety of real-world IoT devices and poten-tial vulnerabilities. Our evaluation of the proposed framework demonstrates its effectiveness in terms of automatically predicting the vulnerability metrics of new vulnerabilities with more than 90% accuracy, on average, and identifying the most vulnerable attack paths within an IoT network. The produced assessment results can serve as a guideline for cybersecurity professionals to take further actions and mitigate risks in a timely manner. |
doi_str_mv | 10.1109/PRDC53464.2021.00016 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_9667743</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9667743</ieee_id><sourcerecordid>9667743</sourcerecordid><originalsourceid>FETCH-LOGICAL-i203t-d95132ce15038d3cf34fc350bf366ab9a2ec624a1f005995f568dbc001c7b6743</originalsourceid><addsrcrecordid>eNotj8tOwzAQRQ0SEqX0C2DhH0gYe-xJvIzKq1IlEJR1lThjGkQSFLuL_j2RYHUWVzq6R4hbBblS4O5e3-7XFg2ZXINWOQAoOhMrV5SKyBptCnLnYjETM1RgL8VVjF8AFlUJC1FWxzT2deJWvrM_Tl06ySpGjrHnIckwTjIdWG6GxNPASY5B7g7d8BmvxUWovyOv_rkUH48Pu_Vztn152qyrbdZpwJS1zirUnpUFLFv0AU3waKEJSFQ3rtbsSZtahfmSczZYKtvGzxW-aKgwuBQ3f96Omfc_U9fX02nviIp5xF--NkbU</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Automated Security Assessment for the Internet of Things</title><source>IEEE Xplore All Conference Series</source><creator>Duan, Xuanyu ; Ge, Mengmeng ; Minh Le, Triet Huynh ; Ullah, Faheem ; Gao, Shang ; Lu, Xuequan ; Babar, M. Ali</creator><creatorcontrib>Duan, Xuanyu ; Ge, Mengmeng ; Minh Le, Triet Huynh ; Ullah, Faheem ; Gao, Shang ; Lu, Xuequan ; Babar, M. Ali</creatorcontrib><description>Internet of Things (IoT) based applications face an increasing number of potential security risks, which need to be systematically assessed and addressed. Expert-based manual assessment of IoT security is a predominant approach, which is usually inefficient. To address this problem, we propose an automated security assessment framework for IoT networks. Our framework first leverages machine learning and natural language processing to analyze vulnerability descriptions for predicting vulnerability metrics. The predicted metrics are then input into a two-layered graphical security model, which consists of an attack graph at the upper layer to present the network connectivity and an attack tree for each node in the network at the bottom layer to depict the vulnerability information. This security model automatically assesses the security of the IoT network by capturing potential attack paths. We evaluate the viability of our approach using a proof-of-concept smart building system model which contains a variety of real-world IoT devices and poten-tial vulnerabilities. Our evaluation of the proposed framework demonstrates its effectiveness in terms of automatically predicting the vulnerability metrics of new vulnerabilities with more than 90% accuracy, on average, and identifying the most vulnerable attack paths within an IoT network. The produced assessment results can serve as a guideline for cybersecurity professionals to take further actions and mitigate risks in a timely manner.</description><identifier>EISSN: 2473-3105</identifier><identifier>EISBN: 9781665424769</identifier><identifier>EISBN: 1665424761</identifier><identifier>DOI: 10.1109/PRDC53464.2021.00016</identifier><identifier>CODEN: IEEPAD</identifier><language>eng</language><publisher>IEEE</publisher><subject>Graphical Security Model ; Internet of Things ; Machine learning ; Manuals ; Measurement ; Natural language processing ; Predictive models ; Security ; Smart buildings ; Vulnerability Assessment</subject><ispartof>2021 IEEE 26th Pacific Rim International Symposium on Dependable Computing (PRDC), 2021, p.47-56</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9667743$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,27925,54555,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9667743$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Duan, Xuanyu</creatorcontrib><creatorcontrib>Ge, Mengmeng</creatorcontrib><creatorcontrib>Minh Le, Triet Huynh</creatorcontrib><creatorcontrib>Ullah, Faheem</creatorcontrib><creatorcontrib>Gao, Shang</creatorcontrib><creatorcontrib>Lu, Xuequan</creatorcontrib><creatorcontrib>Babar, M. Ali</creatorcontrib><title>Automated Security Assessment for the Internet of Things</title><title>2021 IEEE 26th Pacific Rim International Symposium on Dependable Computing (PRDC)</title><addtitle>PRDC</addtitle><description>Internet of Things (IoT) based applications face an increasing number of potential security risks, which need to be systematically assessed and addressed. Expert-based manual assessment of IoT security is a predominant approach, which is usually inefficient. To address this problem, we propose an automated security assessment framework for IoT networks. Our framework first leverages machine learning and natural language processing to analyze vulnerability descriptions for predicting vulnerability metrics. The predicted metrics are then input into a two-layered graphical security model, which consists of an attack graph at the upper layer to present the network connectivity and an attack tree for each node in the network at the bottom layer to depict the vulnerability information. This security model automatically assesses the security of the IoT network by capturing potential attack paths. We evaluate the viability of our approach using a proof-of-concept smart building system model which contains a variety of real-world IoT devices and poten-tial vulnerabilities. Our evaluation of the proposed framework demonstrates its effectiveness in terms of automatically predicting the vulnerability metrics of new vulnerabilities with more than 90% accuracy, on average, and identifying the most vulnerable attack paths within an IoT network. The produced assessment results can serve as a guideline for cybersecurity professionals to take further actions and mitigate risks in a timely manner.</description><subject>Graphical Security Model</subject><subject>Internet of Things</subject><subject>Machine learning</subject><subject>Manuals</subject><subject>Measurement</subject><subject>Natural language processing</subject><subject>Predictive models</subject><subject>Security</subject><subject>Smart buildings</subject><subject>Vulnerability Assessment</subject><issn>2473-3105</issn><isbn>9781665424769</isbn><isbn>1665424761</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2021</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotj8tOwzAQRQ0SEqX0C2DhH0gYe-xJvIzKq1IlEJR1lThjGkQSFLuL_j2RYHUWVzq6R4hbBblS4O5e3-7XFg2ZXINWOQAoOhMrV5SKyBptCnLnYjETM1RgL8VVjF8AFlUJC1FWxzT2deJWvrM_Tl06ySpGjrHnIckwTjIdWG6GxNPASY5B7g7d8BmvxUWovyOv_rkUH48Pu_Vztn152qyrbdZpwJS1zirUnpUFLFv0AU3waKEJSFQ3rtbsSZtahfmSczZYKtvGzxW-aKgwuBQ3f96Omfc_U9fX02nviIp5xF--NkbU</recordid><startdate>202112</startdate><enddate>202112</enddate><creator>Duan, Xuanyu</creator><creator>Ge, Mengmeng</creator><creator>Minh Le, Triet Huynh</creator><creator>Ullah, Faheem</creator><creator>Gao, Shang</creator><creator>Lu, Xuequan</creator><creator>Babar, M. Ali</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>202112</creationdate><title>Automated Security Assessment for the Internet of Things</title><author>Duan, Xuanyu ; Ge, Mengmeng ; Minh Le, Triet Huynh ; Ullah, Faheem ; Gao, Shang ; Lu, Xuequan ; Babar, M. Ali</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i203t-d95132ce15038d3cf34fc350bf366ab9a2ec624a1f005995f568dbc001c7b6743</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Graphical Security Model</topic><topic>Internet of Things</topic><topic>Machine learning</topic><topic>Manuals</topic><topic>Measurement</topic><topic>Natural language processing</topic><topic>Predictive models</topic><topic>Security</topic><topic>Smart buildings</topic><topic>Vulnerability Assessment</topic><toplevel>online_resources</toplevel><creatorcontrib>Duan, Xuanyu</creatorcontrib><creatorcontrib>Ge, Mengmeng</creatorcontrib><creatorcontrib>Minh Le, Triet Huynh</creatorcontrib><creatorcontrib>Ullah, Faheem</creatorcontrib><creatorcontrib>Gao, Shang</creatorcontrib><creatorcontrib>Lu, Xuequan</creatorcontrib><creatorcontrib>Babar, M. Ali</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Duan, Xuanyu</au><au>Ge, Mengmeng</au><au>Minh Le, Triet Huynh</au><au>Ullah, Faheem</au><au>Gao, Shang</au><au>Lu, Xuequan</au><au>Babar, M. Ali</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Automated Security Assessment for the Internet of Things</atitle><btitle>2021 IEEE 26th Pacific Rim International Symposium on Dependable Computing (PRDC)</btitle><stitle>PRDC</stitle><date>2021-12</date><risdate>2021</risdate><spage>47</spage><epage>56</epage><pages>47-56</pages><eissn>2473-3105</eissn><eisbn>9781665424769</eisbn><eisbn>1665424761</eisbn><coden>IEEPAD</coden><abstract>Internet of Things (IoT) based applications face an increasing number of potential security risks, which need to be systematically assessed and addressed. Expert-based manual assessment of IoT security is a predominant approach, which is usually inefficient. To address this problem, we propose an automated security assessment framework for IoT networks. Our framework first leverages machine learning and natural language processing to analyze vulnerability descriptions for predicting vulnerability metrics. The predicted metrics are then input into a two-layered graphical security model, which consists of an attack graph at the upper layer to present the network connectivity and an attack tree for each node in the network at the bottom layer to depict the vulnerability information. This security model automatically assesses the security of the IoT network by capturing potential attack paths. We evaluate the viability of our approach using a proof-of-concept smart building system model which contains a variety of real-world IoT devices and poten-tial vulnerabilities. Our evaluation of the proposed framework demonstrates its effectiveness in terms of automatically predicting the vulnerability metrics of new vulnerabilities with more than 90% accuracy, on average, and identifying the most vulnerable attack paths within an IoT network. The produced assessment results can serve as a guideline for cybersecurity professionals to take further actions and mitigate risks in a timely manner.</abstract><pub>IEEE</pub><doi>10.1109/PRDC53464.2021.00016</doi><tpages>10</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | EISSN: 2473-3105 |
ispartof | 2021 IEEE 26th Pacific Rim International Symposium on Dependable Computing (PRDC), 2021, p.47-56 |
issn | 2473-3105 |
language | eng |
recordid | cdi_ieee_primary_9667743 |
source | IEEE Xplore All Conference Series |
subjects | Graphical Security Model Internet of Things Machine learning Manuals Measurement Natural language processing Predictive models Security Smart buildings Vulnerability Assessment |
title | Automated Security Assessment for the Internet of Things |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T20%3A12%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Automated%20Security%20Assessment%20for%20the%20Internet%20of%20Things&rft.btitle=2021%20IEEE%2026th%20Pacific%20Rim%20International%20Symposium%20on%20Dependable%20Computing%20(PRDC)&rft.au=Duan,%20Xuanyu&rft.date=2021-12&rft.spage=47&rft.epage=56&rft.pages=47-56&rft.eissn=2473-3105&rft.coden=IEEPAD&rft_id=info:doi/10.1109/PRDC53464.2021.00016&rft.eisbn=9781665424769&rft.eisbn_list=1665424761&rft_dat=%3Cieee_CHZPO%3E9667743%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i203t-d95132ce15038d3cf34fc350bf366ab9a2ec624a1f005995f568dbc001c7b6743%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=9667743&rfr_iscdi=true |