• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

用于数据驱动的物联网安全的多源知识推理

Multi-Source Knowledge Reasoning for Data-Driven IoT Security.

作者信息

Zhang Shuqin, Bai Guangyao, Li Hong, Liu Peipei, Zhang Minzhi, Li Shujun

机构信息

School of Computer Science, Zhongyuan University of Technology, Zhengzhou 450007, China.

Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China.

出版信息

Sensors (Basel). 2021 Nov 15;21(22):7579. doi: 10.3390/s21227579.

DOI:10.3390/s21227579
PMID:34833653
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC8623156/
Abstract

Nowadays, there are different kinds of public knowledge bases for cyber security vulnerability and threat intelligence which can be used for IoT security threat analysis. However, the heterogeneity of these knowledge bases and the complexity of the IoT environments make network security situation awareness and threat assessment difficult. In this paper, we integrate vulnerabilities, weaknesses, affected platforms, tactics, attack techniques, and attack patterns into a coherent set of links. In addition, we propose an IoT security ontology model, namely, the IoT Security Threat Ontology (IoTSTO), to describe the elements of IoT security threats and design inference rules for threat analysis. This IoTSTO expands the current knowledge domain of cyber security ontology modeling. In the IoTSTO model, the proposed multi-source knowledge reasoning method can perform the following tasks: assess the threats of the IoT environment, automatically infer mitigations, and separate IoT nodes that are subject to specific threats. The method above provides support to security managers in their deployment of security solutions. This paper completes the association of current public knowledge bases for IoT security and solves the semantic heterogeneity of multi-source knowledge. In this paper, we reveal the scope of public knowledge bases and their interrelationships through the multi-source knowledge reasoning method for IoT security. In conclusion, the paper provides a unified, extensible, and reusable method for IoT security analysis and decision making.

摘要

如今,有不同种类的网络安全漏洞和威胁情报公共知识库可用于物联网安全威胁分析。然而,这些知识库的异质性以及物联网环境的复杂性使得网络安全态势感知和威胁评估变得困难。在本文中,我们将漏洞、弱点、受影响的平台、策略、攻击技术和攻击模式整合为一组连贯的链接。此外,我们提出了一种物联网安全本体模型,即物联网安全威胁本体(IoTSTO),以描述物联网安全威胁的要素并设计用于威胁分析的推理规则。这个IoTSTO扩展了当前网络安全本体建模的知识领域。在IoTSTO模型中,所提出的多源知识推理方法可以执行以下任务:评估物联网环境的威胁、自动推断缓解措施以及分离受到特定威胁的物联网节点。上述方法为安全管理人员部署安全解决方案提供了支持。本文完成了当前物联网安全公共知识库的关联,并解决了多源知识的语义异质性问题。在本文中,我们通过物联网安全的多源知识推理方法揭示了公共知识库的范围及其相互关系。总之,本文为物联网安全分析和决策提供了一种统一、可扩展且可重用的方法。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dd8e/8623156/1f5167d749c5/sensors-21-07579-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dd8e/8623156/bae870546ead/sensors-21-07579-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dd8e/8623156/cd4c2bf66430/sensors-21-07579-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dd8e/8623156/5c5782dde8ff/sensors-21-07579-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dd8e/8623156/96f5237cb26e/sensors-21-07579-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dd8e/8623156/65d86562f2f1/sensors-21-07579-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dd8e/8623156/fa0330b81b75/sensors-21-07579-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dd8e/8623156/db34effff740/sensors-21-07579-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dd8e/8623156/bbac10acc0ff/sensors-21-07579-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dd8e/8623156/11171e0a54f3/sensors-21-07579-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dd8e/8623156/0f213c6a02bc/sensors-21-07579-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dd8e/8623156/0551ac9e1f1e/sensors-21-07579-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dd8e/8623156/1f5167d749c5/sensors-21-07579-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dd8e/8623156/bae870546ead/sensors-21-07579-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dd8e/8623156/cd4c2bf66430/sensors-21-07579-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dd8e/8623156/5c5782dde8ff/sensors-21-07579-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dd8e/8623156/96f5237cb26e/sensors-21-07579-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dd8e/8623156/65d86562f2f1/sensors-21-07579-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dd8e/8623156/fa0330b81b75/sensors-21-07579-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dd8e/8623156/db34effff740/sensors-21-07579-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dd8e/8623156/bbac10acc0ff/sensors-21-07579-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dd8e/8623156/11171e0a54f3/sensors-21-07579-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dd8e/8623156/0f213c6a02bc/sensors-21-07579-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dd8e/8623156/0551ac9e1f1e/sensors-21-07579-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dd8e/8623156/1f5167d749c5/sensors-21-07579-g012.jpg

相似文献

1
Multi-Source Knowledge Reasoning for Data-Driven IoT Security.用于数据驱动的物联网安全的多源知识推理
Sensors (Basel). 2021 Nov 15;21(22):7579. doi: 10.3390/s21227579.
2
Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach.利用威胁建模方法识别和缓解物联网用例中的网络钓鱼攻击威胁。
Sensors (Basel). 2021 Jul 14;21(14):4816. doi: 10.3390/s21144816.
3
Named-Entity-Recognition-Based Automated System for Diagnosing Cybersecurity Situations in IoT Networks.基于命名实体识别的物联网网络网络安全态势诊断自动化系统。
Sensors (Basel). 2019 Aug 1;19(15):3380. doi: 10.3390/s19153380.
4
An Ontology-Based Cybersecurity Framework for the Internet of Things.基于本体的物联网网络安全框架。
Sensors (Basel). 2018 Sep 12;18(9):3053. doi: 10.3390/s18093053.
5
Modified graph-based algorithm to analyze security threats in IoT.用于分析物联网安全威胁的基于图的改进算法。
PeerJ Comput Sci. 2023 Dec 8;9:e1743. doi: 10.7717/peerj-cs.1743. eCollection 2023.
6
A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools.用于验证网络威胁预防工具的恶意软件传播模拟器
Sensors (Basel). 2021 Oct 21;21(21):6983. doi: 10.3390/s21216983.
7
Threat Modeling for Communication Security of IoT-Enabled Digital Logistics.面向物联网数字物流通信安全的威胁建模
Sensors (Basel). 2023 Nov 29;23(23):9500. doi: 10.3390/s23239500.
8
Hybrid IoT Cyber Range.混合式物联网网络靶场。
Sensors (Basel). 2023 Mar 13;23(6):3071. doi: 10.3390/s23063071.
9
Towards Secure Fitness Framework Based on IoT-Enabled Blockchain Network Integrated with Machine Learning Algorithms.基于物联网的区块链网络与机器学习算法集成的安全健身框架。
Sensors (Basel). 2021 Feb 26;21(5):1640. doi: 10.3390/s21051640.
10
A Holistic Systems Security Approach Featuring Thin Secure Elements for Resilient IoT Deployments.一种采用精简安全元件的整体系统安全方法,用于实现可靠的物联网部署。
Sensors (Basel). 2020 Sep 14;20(18):5252. doi: 10.3390/s20185252.

引用本文的文献

1
Advancing cybersecurity and privacy with artificial intelligence: current trends and future research directions.利用人工智能推进网络安全与隐私保护:当前趋势与未来研究方向
Front Big Data. 2024 Dec 5;7:1497535. doi: 10.3389/fdata.2024.1497535. eCollection 2024.

本文引用的文献

1
Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach.利用威胁建模方法识别和缓解物联网用例中的网络钓鱼攻击威胁。
Sensors (Basel). 2021 Jul 14;21(14):4816. doi: 10.3390/s21144816.
2
A Hybrid Semantic Knowledge Integration and Sharing Approach for Distributed Smart Environments.一种用于分布式智能环境的混合语义知识集成与共享方法。
Sensors (Basel). 2020 Oct 20;20(20):5918. doi: 10.3390/s20205918.
3
Cyber Situation Comprehension for IoT Systems based on APT Alerts and Logs Correlation.基于 APT 警报和日志关联的物联网系统网络安全态势感知
Sensors (Basel). 2019 Sep 19;19(18):4045. doi: 10.3390/s19184045.
4
Meaningful Integration of Data from Heterogeneous Health Services and Home Environment Based on Ontology.基于本体论的异构健康服务和家庭环境数据的有意义集成。
Sensors (Basel). 2019 Apr 12;19(8):1747. doi: 10.3390/s19081747.
5
An Ontology-Based Cybersecurity Framework for the Internet of Things.基于本体的物联网网络安全框架。
Sensors (Basel). 2018 Sep 12;18(9):3053. doi: 10.3390/s18093053.