Thesis Deployment Optimization of IoT Devices through Attack Graph Analysis

11/15/2019
by   Noga Agmon, et al.
0

The Internet of things (IoT) has become an integral part of our life at both work and home. However, these IoT devices are prone to vulnerability exploits due to their low cost, low resources, the diversity of vendors, and proprietary firmware. Moreover, short range communication protocols (e.g., Bluetooth or ZigBee) open additional opportunities for the lateral movement of an attacker within an organization. Thus, the type and location of IoT devices may significantly change the level of network security of the organizational network. In this work, we quantify the level of network security based on an augmented attack graph analysis that accounts for the physical location of IoT devices and their communication capabilities. We use the depth-first branch and bound (DFBnB) heuristic search algorithm to solve two optimization problems: Full Deployment with Minimal Risk (FDMR) and Maximal Utility without Risk Deterioration (MURD). An admissible heuristic is proposed to accelerate the search. The proposed method is evaluated using a real network with simulated deployment of IoT devices. The results demonstrate (1) the contribution of the augmented attack graphs to quantifying the impact of IoT devices deployed within the organization on security, and (2) the effectiveness of the optimized IoT deployment.

READ FULL TEXT
research
04/11/2019

Deployment Optimization of IoT Devices through Attack Graph Analysis

The Internet of things (IoT) has become an integral part of our life at ...
research
03/02/2023

IoT Device Identification Based on Network Communication Analysis Using Deep Learning

Attack vectors for adversaries have increased in organizations because o...
research
07/22/2020

Pushing the Physical Limits of IoT Devices with Programmable Metasurfaces

Small, low-cost IoT devices are typically equipped with only a single, l...
research
06/26/2019

Heuristic Approach Towards Countermeasure Selection using Attack Graphs

Selecting the optimal set of countermeasures is a challenging task that ...
research
12/28/2019

How Secure Is Your IoT Network?

The proliferation of IoT devices in smart homes, hospitals, and enterpri...
research
02/25/2019

Network Service Dependencies in Commodity Internet-of-Things Devices

We continue to see increasingly widespread deployment of IoT devices, wi...
research
03/04/2020

Enabling URLLC for Low-Cost IoT Devices via Diversity Combining Schemes

Supporting Ultra-Reliable Low-Latency Communication (URLLC) in the Inter...

Please sign up or login with your details

Forgot password? Click here to reset