A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions

Vulnerability assessment in industrial IoT networks is critical due to the evolving nature of the domain and the increasing complexity of security threats. This study aims to address the existing gaps in the literature by conducting a comprehensive survey on the use of attack graphs for vulnerabilit...

Full description

Saved in:
Bibliographic Details
Main Authors: Almazrouei O.S.M.B.H., Magalingam P., Hasan M.K., Shanmugam M.
Other Authors: 57984794500
Format: Review
Published: Institute of Electrical and Electronics Engineers Inc. 2024
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uniten.dspace-34638
record_format dspace
spelling my.uniten.dspace-346382024-10-14T11:21:19Z A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions Almazrouei O.S.M.B.H. Magalingam P. Hasan M.K. Shanmugam M. 57984794500 35302809600 55057479600 36195134500 Attack graph network vulnerabilities the Internet of Things vulnerability assessment Clustering algorithms Cybersecurity Genetic algorithms Graphic methods Internet of things Learning algorithms Markov processes Network security Regression analysis Reinforcement learning Attack graph Attacks scenarios Cyber security Fast forward Graph analysis Network vulnerability Potential attack Security threats Systematic Vulnerability assessments Wireless sensor networks Vulnerability assessment in industrial IoT networks is critical due to the evolving nature of the domain and the increasing complexity of security threats. This study aims to address the existing gaps in the literature by conducting a comprehensive survey on the use of attack graphs for vulnerability assessment in IoT networks. Attack graphs serve as a valuable cybersecurity tool for modeling and analyzing potential attack scenarios on systems, networks, or applications. The survey covers the research conducted between 2016 and 2021(34 peer-reviewed journal articles and 28 conference papers), identifying and categorizing the main methodologies and technologies employed in generating and analyzing attack graphs. In this review, core modeling techniques for IoT vulnerability assessment are highlighted, such as Markov Decision Processes (MDP), Feature Pyramid Networks (FPN), K-means clustering, and logistic regression models, along with other techniques involving genetic algorithms like fast-forward (FF), contingent fast-forwards (CFF), advanced reinforcement-learning algorithms, and HARMs models. The evaluation of the performance of these attack graph models using IoT networks or devices as case studies is also emphasized. This survey provides valuable insights into the state-of-the-art attack graph techniques for IoT network vulnerability assessment, identifying various applications, performances, research opportunities, and challenges. As a reference source, it serves to inform academicians and practitioners interested in leveraging attack graphs for IoT network vulnerability assessment and guides future research directions in this area. � 2013 IEEE. Final 2024-10-14T03:21:19Z 2024-10-14T03:21:19Z 2023 Review 10.1109/ACCESS.2023.3272053 2-s2.0-85159673104 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85159673104&doi=10.1109%2fACCESS.2023.3272053&partnerID=40&md5=88ae87caf6da41d99adb6ba743746d5d https://irepository.uniten.edu.my/handle/123456789/34638 11 44350 44376 All Open Access Gold Open Access Institute of Electrical and Electronics Engineers Inc. Scopus
institution Universiti Tenaga Nasional
building UNITEN Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tenaga Nasional
content_source UNITEN Institutional Repository
url_provider http://dspace.uniten.edu.my/
topic Attack graph
network vulnerabilities
the Internet of Things
vulnerability assessment
Clustering algorithms
Cybersecurity
Genetic algorithms
Graphic methods
Internet of things
Learning algorithms
Markov processes
Network security
Regression analysis
Reinforcement learning
Attack graph
Attacks scenarios
Cyber security
Fast forward
Graph analysis
Network vulnerability
Potential attack
Security threats
Systematic
Vulnerability assessments
Wireless sensor networks
spellingShingle Attack graph
network vulnerabilities
the Internet of Things
vulnerability assessment
Clustering algorithms
Cybersecurity
Genetic algorithms
Graphic methods
Internet of things
Learning algorithms
Markov processes
Network security
Regression analysis
Reinforcement learning
Attack graph
Attacks scenarios
Cyber security
Fast forward
Graph analysis
Network vulnerability
Potential attack
Security threats
Systematic
Vulnerability assessments
Wireless sensor networks
Almazrouei O.S.M.B.H.
Magalingam P.
Hasan M.K.
Shanmugam M.
A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions
description Vulnerability assessment in industrial IoT networks is critical due to the evolving nature of the domain and the increasing complexity of security threats. This study aims to address the existing gaps in the literature by conducting a comprehensive survey on the use of attack graphs for vulnerability assessment in IoT networks. Attack graphs serve as a valuable cybersecurity tool for modeling and analyzing potential attack scenarios on systems, networks, or applications. The survey covers the research conducted between 2016 and 2021(34 peer-reviewed journal articles and 28 conference papers), identifying and categorizing the main methodologies and technologies employed in generating and analyzing attack graphs. In this review, core modeling techniques for IoT vulnerability assessment are highlighted, such as Markov Decision Processes (MDP), Feature Pyramid Networks (FPN), K-means clustering, and logistic regression models, along with other techniques involving genetic algorithms like fast-forward (FF), contingent fast-forwards (CFF), advanced reinforcement-learning algorithms, and HARMs models. The evaluation of the performance of these attack graph models using IoT networks or devices as case studies is also emphasized. This survey provides valuable insights into the state-of-the-art attack graph techniques for IoT network vulnerability assessment, identifying various applications, performances, research opportunities, and challenges. As a reference source, it serves to inform academicians and practitioners interested in leveraging attack graphs for IoT network vulnerability assessment and guides future research directions in this area. � 2013 IEEE.
author2 57984794500
author_facet 57984794500
Almazrouei O.S.M.B.H.
Magalingam P.
Hasan M.K.
Shanmugam M.
format Review
author Almazrouei O.S.M.B.H.
Magalingam P.
Hasan M.K.
Shanmugam M.
author_sort Almazrouei O.S.M.B.H.
title A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions
title_short A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions
title_full A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions
title_fullStr A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions
title_full_unstemmed A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions
title_sort review on attack graph analysis for iot vulnerability assessment: challenges, open issues, and future directions
publisher Institute of Electrical and Electronics Engineers Inc.
publishDate 2024
_version_ 1814061188902813696
score 13.211869