2017
DOI: 10.1007/s00779-017-1084-3
|View full text |Cite
|
Sign up to set email alerts
|

Dynamically enabled defense effectiveness evaluation of a home Internet based on vulnerability analysis and attack layer measurement

Abstract: Smart devices in a home Internet, such as routers and cameras, suffer malicious attacks from hackers on a daily basis. Defenders should change system states dynamically to improve the system's defense ability. To quantify evaluation of defense effectiveness, this paper proposes an improved vulnerability scoring method for home Internets based on the Information Security Technology Security Vulnerability Classification Guide, which calculates a vulnerability score. A higher vulnerability score indicates weaker … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 12 publications
0
1
0
Order By: Relevance
“…Other methods like game-theorybased vulnerability quantification method is also used for inspecting the security vulnerability of network over legacy methods [105]. Similarly, the vulnerability can also be assessed by using vulnerability scoring like Common Vulnerability Scoring System (CVSS), which is based on scoring from 0 to 10 [106]. The vulnerabilities of IoT network can also be investigated by using multi-attacker multi-target graphical model [25].…”
Section: A Rq1 What Are the Security Problems And Challenges Faced mentioning
confidence: 99%
“…Other methods like game-theorybased vulnerability quantification method is also used for inspecting the security vulnerability of network over legacy methods [105]. Similarly, the vulnerability can also be assessed by using vulnerability scoring like Common Vulnerability Scoring System (CVSS), which is based on scoring from 0 to 10 [106]. The vulnerabilities of IoT network can also be investigated by using multi-attacker multi-target graphical model [25].…”
Section: A Rq1 What Are the Security Problems And Challenges Faced mentioning
confidence: 99%