Universiti Teknologi Malaysia Institutional Repository

A review on attack graph analysis for IoT vulnerability assessment: challenges, open issues, and future directions.

Hamed Almazrouei, Omar Saif Musabbeh and Magalingam, Pritheega and Hasan, Mohammad Kamrul and Shanmugam, Mohana (2023) A review on attack graph analysis for IoT vulnerability assessment: challenges, open issues, and future directions. IEEE Access, 11 . pp. 44350-44376. ISSN 2169-3536

[img] PDF
1MB

Official URL: http://dx.doi.org/10.1109/ACCESS.2023.3272053

Abstract

Vulnerability assessment in industrial IoT networks is critical due to the evolving nature of the domain and the increasing complexity of security threats. This study aims to address the existing gaps in the literature by conducting a comprehensive survey on the use of attack graphs for vulnerability assessment in IoT networks. Attack graphs serve as a valuable cybersecurity tool for modeling and analyzing potential attack scenarios on systems, networks, or applications. The survey covers the research conducted between 2016 and 2021(34 peer-reviewed journal articles and 28 conference papers), identifying and categorizing the main methodologies and technologies employed in generating and analyzing attack graphs. In this review, core modeling techniques for IoT vulnerability assessment are highlighted, such as Markov Decision Processes (MDP), Feature Pyramid Networks (FPN), K-means clustering, and logistic regression models, along with other techniques involving genetic algorithms like fast-forward (FF), contingent fast-forwards (CFF), advanced reinforcement-learning algorithms, and HARMs models. The evaluation of the performance of these attack graph models using IoT networks or devices as case studies is also emphasized. This survey provides valuable insights into the state-of-the-art attack graph techniques for IoT network vulnerability assessment, identifying various applications, performances, research opportunities, and challenges. As a reference source, it serves to inform academicians and practitioners interested in leveraging attack graphs for IoT network vulnerability assessment and guides future research directions in this area.

Item Type:Article
Uncontrolled Keywords:Attack graph; network vulnerabilities; the Internet of Things; vulnerability assessment
Subjects:T Technology > T Technology (General)
Divisions:Advanced Informatics School
ID Code:104729
Deposited By: Muhamad Idham Sulong
Deposited On:25 Mar 2024 08:43
Last Modified:25 Mar 2024 08:43

Repository Staff Only: item control page