Bio-inspired security analysis for IoT scenarios

Salvatore Vitabile, Mauro Migliardi, Andrea Ziggiotto, Vincenzo Conti

Risultato della ricerca: Articlepeer review

2 Citazioni (Scopus)

Abstract

Computer security has recently become more and more important as the world economy dependency from data has kept growing. The complexity of the systems that need to be kept secure calls for new models capable of abstracting the interdependencies among heterogeneous components that cooperate at providing the desired service. A promising approach is attack graph analysis, however, the manual analysis of attack graphs is tedious and error prone. In this paper we propose to apply the metabolic network model to attack graph analysis, using three interacting bio-inspired algorithms: topological analysis, flux balance analysis, and extreme pathway analysis. A developed framework for graph building and simulations as well as an introductory to some IoT scenarios as use cases are also outlined.
Lingua originaleEnglish
pagine (da-a)221-235
Numero di pagine15
RivistaInternational Journal of Embedded Systems
Volume13
Stato di pubblicazionePublished - 2020

All Science Journal Classification (ASJC) codes

  • ???subjectarea.asjc.1700.1712???
  • ???subjectarea.asjc.1700.1708???

Fingerprint

Entra nei temi di ricerca di 'Bio-inspired security analysis for IoT scenarios'. Insieme formano una fingerprint unica.

Cita questo