2014
DOI: 10.1109/surv.2013.082713.00154
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability Assessment in Autonomic Networks and Services: A Survey

Abstract: Abstract-Autonomic networks and services are exposed to a large variety of security risks. The vulnerability management process plays a crucial role for ensuring their safe configurations and preventing security attacks. We focus in this survey on the assessment of vulnerabilities in autonomic environments. In particular, we analyze current methods and techniques contributing to the discovery, the description and the detection of these vulnerabilities. We also point out important challenges that should be face… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 46 publications
0
3
0
Order By: Relevance
“…In March 2019, Venezuela experienced a nationwide blackout, which Venezuela officially indicated was related to network attacks. Therefore, it is urgent to carry out security risk assessment of the power IoT so as to evaluate the effectiveness of relevant protective measures 5 .…”
Section: Current Status Of Security and Risk Assessment For Power Iotmentioning
confidence: 99%
“…In March 2019, Venezuela experienced a nationwide blackout, which Venezuela officially indicated was related to network attacks. Therefore, it is urgent to carry out security risk assessment of the power IoT so as to evaluate the effectiveness of relevant protective measures 5 .…”
Section: Current Status Of Security and Risk Assessment For Power Iotmentioning
confidence: 99%
“…Corresponding to the traditional security defense technology, the current mainstream network security effectiveness evaluation technology is still focused on the security evaluation of traditional static security defense systems, including evaluation methods based on vulnerability detection rules [13], mathematical evaluation methods based on Bayesian networks [14], and model evaluation methods based on attack graphs [15], etc. These network security evaluation technologies have their applicable values, but they are difficult to apply to dynamic and active network attack and defense games, and cannot effectively solve the problem of dynamic network defense security effectiveness evaluation.…”
Section: Introductionmentioning
confidence: 99%
“…Several network attacks have been presented below along with their countermeasures. Vulnerability assessment is a good tool to identify the potential threats an aerial network might face [9][10] [11]. A robust and reliable system is of significant interest in aerial drone systems [12][13] [14].…”
Section: Fig1 Introduction To Drone Communicationmentioning
confidence: 99%