首页> 外文期刊>Future generation computer systems >Game theory-based Security Vulnerability Quantification for Social Internet of Things
【24h】

Game theory-based Security Vulnerability Quantification for Social Internet of Things

机译:社交物联网的基于博弈论的安全漏洞量化

获取原文
获取原文并翻译 | 示例
           

摘要

In modern society, information and communication technology (ICT) has been applied to various areas such as home, industry, and finance. Therefore, social networks using Internet of Things (IoT) technologies have been constructed. As ICT continues to be used in various modern applications, security vulnerabilities from legacy ICT have been inherited by social IoT network systems. To guarantee the safety of these applications, these networks must be protected from various cyberattacks. A variety of security technologies and products have been developed for this purpose. However, the most important task in dealing with cyberattacks is to inspect the current security status of a social IoT network system. Many types of vulnerability quantification methods exist for inspecting the security vulnerabilities of network systems. However, with legacy methods, quantification results lack objectivity. In this study, to compensate for this limitation, we propose a game-theory-based vulnerability quantification method using attack tree, which consists of three steps: game strategy modeling, cost-impact analyzation, and payoff calculation. We present a case study for a social-IoT-based network environment. Using the proposed method, we believe social IoT network system security experts will be able to cope with security incidents more effectively. The proposed method can be used as a reference for constructing a safer social IoT network system.
机译:在现代社会中,信息和通信技术(ICT)已应用于各种领域,例如家庭,工业和金融。因此,已经构建了使用物联网(IoT)技术的社交网络。随着ICT继续用于各种现代应用程序中,社交IoT网络系统已继承了来自传统ICT的安全漏洞。为了保证这些应用程序的安全性,必须保护这些网络免受各种网络攻击。为此目的已经开发了多种安全技术和产品。但是,处理网络攻击的最重要任务是检查社交物联网网络系统的当前安全状态。存在许多类型的漏洞量化方法来检查网络系统的安全漏洞。但是,使用传统方法时,定量结果缺乏客观性。在这项研究中,为了弥补这一局限性,我们提出了一种使用攻击树的基于博弈论的漏洞量化方法,该方法包括三个步骤:博弈策略建模,成本影响分析和收益计算。我们提出了一个基于社交物联网的网络环境的案例研究。使用所提出的方法,我们相信社交IoT网络系统安全专家将能够更有效地应对安全事件。该方法可为构建更安全的社交物联网网络系统提供参考。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号