基于医疗传感器网络的攻击路径可视化构建算法

Hanhe Zhang, Shigong Kang, Yijie Li
{"title":"基于医疗传感器网络的攻击路径可视化构建算法","authors":"Hanhe Zhang, Shigong Kang, Yijie Li","doi":"10.1109/IICSPI.2018.8690460","DOIUrl":null,"url":null,"abstract":"The age of IOT, the robustness of basic network has been a hot issue in industry and academia. To improve the security of THE basic network, researchers have proposed solutions from different perspectives, such as firewall based on management policy, intrusion detection system, and vulnerability scanner. However, the existing solutions cannot meet the requirements of attack intention prediction. In this paper, a construction and prediction algorithm based on the network attack path is proposed to mitigate the threats of attackers. The proposed algorithm adopts analysis integration results generated by the device of network security deployment to predict the objects of probabilistic attack targets. Based on the prediction results, the attack path is demonstrated, which provides assistant decision-making suggestions for network users. To evaluate the effectiveness, the prototype of the proposed algorithm is implemented and deployed into the actual sensor network. The experimental results indicate the vulnerability of network is accurately analyzed via the proposed algorithm.","PeriodicalId":6673,"journal":{"name":"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Visual Construction Algorithm of Attack Path Based on Medical Sensor Networks\",\"authors\":\"Hanhe Zhang, Shigong Kang, Yijie Li\",\"doi\":\"10.1109/IICSPI.2018.8690460\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The age of IOT, the robustness of basic network has been a hot issue in industry and academia. To improve the security of THE basic network, researchers have proposed solutions from different perspectives, such as firewall based on management policy, intrusion detection system, and vulnerability scanner. However, the existing solutions cannot meet the requirements of attack intention prediction. In this paper, a construction and prediction algorithm based on the network attack path is proposed to mitigate the threats of attackers. The proposed algorithm adopts analysis integration results generated by the device of network security deployment to predict the objects of probabilistic attack targets. Based on the prediction results, the attack path is demonstrated, which provides assistant decision-making suggestions for network users. To evaluate the effectiveness, the prototype of the proposed algorithm is implemented and deployed into the actual sensor network. The experimental results indicate the vulnerability of network is accurately analyzed via the proposed algorithm.\",\"PeriodicalId\":6673,\"journal\":{\"name\":\"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IICSPI.2018.8690460\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IICSPI.2018.8690460","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

在物联网时代,基础网络的鲁棒性一直是业界和学术界关注的热点问题。为了提高基础网络的安全性,研究人员从不同的角度提出了解决方案,如基于管理策略的防火墙、入侵检测系统、漏洞扫描器等。然而,现有的解决方案无法满足攻击意图预测的需求。本文提出了一种基于网络攻击路径的构建和预测算法,以减轻攻击者的威胁。该算法采用网络安全部署设备生成的分析集成结果来预测概率攻击目标的对象。基于预测结果,对攻击路径进行了论证,为网络用户提供辅助决策建议。为了评估该算法的有效性,将该算法的原型实现并部署到实际的传感器网络中。实验结果表明,该算法能准确地分析网络的脆弱性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Visual Construction Algorithm of Attack Path Based on Medical Sensor Networks
The age of IOT, the robustness of basic network has been a hot issue in industry and academia. To improve the security of THE basic network, researchers have proposed solutions from different perspectives, such as firewall based on management policy, intrusion detection system, and vulnerability scanner. However, the existing solutions cannot meet the requirements of attack intention prediction. In this paper, a construction and prediction algorithm based on the network attack path is proposed to mitigate the threats of attackers. The proposed algorithm adopts analysis integration results generated by the device of network security deployment to predict the objects of probabilistic attack targets. Based on the prediction results, the attack path is demonstrated, which provides assistant decision-making suggestions for network users. To evaluate the effectiveness, the prototype of the proposed algorithm is implemented and deployed into the actual sensor network. The experimental results indicate the vulnerability of network is accurately analyzed via the proposed algorithm.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
The Functional Safety Analysis and Design of Dual-Motor Hybrid Bus Clutch System Methods of Resource Allocation with Conflict Detection Exploration and Application of Sheet Metal Technology on Pit Package Repairing Study on Standardization of Electrolytic Trace Moisture Meter in Safety Construction of CNG Refueling Station The Research and Analysis of Big Data Application on Distribution Network
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1