An Attack Vector Evaluation Method for Smart City Security Protection
Title | An Attack Vector Evaluation Method for Smart City Security Protection |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Yin, Mingyong, Wang, Qixu, Cao, Mingsheng |
Conference Name | 2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) |
Date Published | Oct. 2019 |
Publisher | IEEE |
ISBN Number | 978-1-7281-3316-4 |
Keywords | Analytical models, attack vector, attack vector evaluation method, attack vectors, Big Data, Conferences, critical information infrastructure, defense factors, depend conditions, edge computing, formal representation, Human Behavior, Metrics, network security risk assessment, policy-based governance, pubcrawl, quantitative evaluation method, resilience, Resiliency, risk management, security, security of data, security weaknesses, simulation, smart cities, smart city security protection, Software, Vulnerability, vulnerability assessment, weakness |
Abstract | In the network security risk assessment on critical information infrastructure of smart city, to describe attack vectors for predicting possible initial access is a challenging task. In this paper, an attack vector evaluation model based on weakness, path and action is proposed, and the formal representation and quantitative evaluation method are given. This method can support the assessment of attack vectors based on known and unknown weakness through combination of depend conditions. In addition, defense factors are also introduced, an attack vector evaluation model of integrated defense is proposed, and an application example of the model is given. The research work in this paper can provide a reference for the vulnerability assessment of attack vector. |
URL | https://ieeexplore.ieee.org/document/8923576 |
DOI | 10.1109/WiMOB.2019.8923576 |
Citation Key | yin_attack_2019 |
- pubcrawl
- weakness
- vulnerability assessment
- Vulnerability
- Software
- smart city security protection
- smart cities
- simulation
- security weaknesses
- security of data
- security
- risk management
- Resiliency
- resilience
- quantitative evaluation method
- Analytical models
- policy-based governance
- network security risk assessment
- Metrics
- Human behavior
- formal representation
- edge computing
- depend conditions
- defense factors
- critical information infrastructure
- Conferences
- Big Data
- Attack vectors
- attack vector evaluation method
- attack vector