Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3220162.3220170acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicmsspConference Proceedingsconference-collections
research-article

Dynamically-enabled Defense Effectiveness Evaluation of IoT Based on Vulnerability Analysis

Published: 28 April 2018 Publication History

Abstract

With the rapid development of Internet of Things(IoT), many security challenges have emerged. In order to have a quantitative evaluation of security defense capability of IoT system, this paper proposes an improved common vulnerability scoring system(CVSS) of IoT, which quantitatively evaluates the defense effectiveness of IoT: higher CVSS score indicates weaker security defense ability of IoT system. In this paper, dynamically-enabled defense technology is applied to enhance the security defense ability of IoT system. The dynamically-enabled defense technology improves the security defense capability of IoT system by changing states randomly. Through comparing the CVSS scores before and after random changes of system status, the paper uses the improved CVSS to analyze the defense effectiveness of IoT system quantitatively.

References

[1]
Yang Y, Peng H, Li L, et al. General Theory of Security and a Study Case in Internet of Things{J}. 2016:1--1.
[2]
Shan C, Hui X, Da L, et al. A Vision of IoT: Applications, Challenges, and Opportunities With China Perspective{J}. IEEE Internet of Things Journal, 2014, 1(4):349--359.
[3]
John A. Stankovic. Research Directions for the Internet of Things{J}. IEEE Internet of Things Journal, 2014, 1(1):3--9.
[4]
Lan Y, Liu S P, Lin L, et al. Effectiveness Evaluation on Cyberspace Security Defense System{C}// International Conference on Network and Information Systems for Computers. IEEE, 2015:576--579.
[5]
Keramati M, Akbari A, Keramati M. CVSS-based security metrics for quantitative analysis of attack graphs{C}// International Econference on Computer and Knowledge Engineering. IEEE, 2013:178--183.
[6]
Younis A A, Malaiya Y K. Comparing and Evaluating CVSS Base Metrics and Microsoft Rating System{C}// IEEE International Conference on Software Quality, Reliability and Security. IEEE, 2015:252--261.
[7]
Wang R, Gao L, Sun Q, et al. An Improved CVSS-based Vulnerability Scoring Mechanism{C}// Third International Conference on Multimedia Information NETWORKING and Security. IEEE, 2011:352--355.
[8]
Salamat B, Jackson T, Wagner G, et al. Runtime Defense against Code Injection Attacks Using Replicated Execution{J}. Dependable & Secure Computing IEEE Transactions on, 2011, 8(4):588--601.
[9]
Sutton M, Greene A, Amini P. Fuzzing: Brute Force Vulnerability Discovery{M}. Electronic Industry Press, 2013.
[10]
Wang S, Xia C, Gao J, et al. Vulnerability evaluation based on CVSS and environmental information statistics{C}// International Conference on Computer Science and Network Technology. 2015:1249--1252.
[11]
Antunes N, Vieira M. Defending against Web Application Vulnerabilities{J}. Computer, 2012, 45(2):66--72

Cited By

View all
  • (2020)Processing Continuous k Nearest Neighbor Queries in Obstructed Space with Voronoi DiagramsACM Transactions on Spatial Algorithms and Systems10.1145/34259557:2(1-27)Online publication date: 8-Dec-2020
  • (2020)On Location Relevance and Diversity in Human Mobility DataACM Transactions on Spatial Algorithms and Systems10.1145/34234047:2(1-38)Online publication date: 27-Oct-2020
  • (2020)Using Social Media for Mental Health SurveillanceACM Computing Surveys10.1145/342282453:6(1-31)Online publication date: 6-Dec-2020
  • Show More Cited By

Index Terms

  1. Dynamically-enabled Defense Effectiveness Evaluation of IoT Based on Vulnerability Analysis

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICMSSP '18: Proceedings of the 3rd International Conference on Multimedia Systems and Signal Processing
    April 2018
    168 pages
    ISBN:9781450364577
    DOI:10.1145/3220162
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 28 April 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. IoT
    2. dynamically-enabled defense
    3. vulnerability distribution

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Funding Sources

    • CCF-Venustech Hongyan Research Initiative
    • National Key R&D Program of China

    Conference

    ICMSSP '18

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)6
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 28 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2020)Processing Continuous k Nearest Neighbor Queries in Obstructed Space with Voronoi DiagramsACM Transactions on Spatial Algorithms and Systems10.1145/34259557:2(1-27)Online publication date: 8-Dec-2020
    • (2020)On Location Relevance and Diversity in Human Mobility DataACM Transactions on Spatial Algorithms and Systems10.1145/34234047:2(1-38)Online publication date: 27-Oct-2020
    • (2020)Using Social Media for Mental Health SurveillanceACM Computing Surveys10.1145/342282453:6(1-31)Online publication date: 6-Dec-2020
    • (2020)Strengths and Limitations of Stretching for Least-squares Problems with Some Dense RowsACM Transactions on Mathematical Software10.1145/341255947:1(1-25)Online publication date: 8-Dec-2020
    • (2020)A Survey of Cybersecurity Certification for the Internet of ThingsACM Computing Surveys10.1145/341016053:6(1-36)Online publication date: 6-Dec-2020
    • (2020)Mathematical Reconciliation of Medical Privacy PoliciesACM Transactions on Management Information Systems10.1145/339752012:1(1-18)Online publication date: 8-Dec-2020
    • (2020)The Effect of the GDPR on Privacy PoliciesACM Transactions on Management Information Systems10.1145/338968512:1(1-20)Online publication date: 8-Dec-2020
    • (1995)HiveACM SIGOPS Operating Systems Review10.1145/224057.22405929:5(12-25)Online publication date: 3-Dec-1995
    • (1995)Hypervisor-based fault toleranceACM SIGOPS Operating Systems Review10.1145/224057.22405829:5(1-11)Online publication date: 3-Dec-1995

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media