• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

通过增强有向图和定量指标进行脆弱性分析的新模型。

A Novel Model for Vulnerability Analysis through Enhanced Directed Graphs and Quantitative Metrics.

机构信息

Ikerlan Technology Research Centre, Basque Research and Technology Alliance (BRTA), 20500 Arrasate, Spain.

Department of Electronics and Computing, Mondragon Unibertsitatea, 20500 Mondragón, Spain.

出版信息

Sensors (Basel). 2022 Mar 9;22(6):2126. doi: 10.3390/s22062126.

DOI:10.3390/s22062126
PMID:35336299
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC8952879/
Abstract

The rapid evolution of industrial components, the paradigm of Industry 4.0, and the new connectivity features introduced by 5G technology all increase the likelihood of cybersecurity incidents. Such incidents are caused by the vulnerabilities present in these components. Designing a secure system is critical, but it is also complex, costly, and an extra factor to manage during the lifespan of the component. This paper presents a model to analyze the known vulnerabilities of industrial components over time. The proposed Extended Dependency Graph (EDG) model is based on two main elements: a directed graph representation of the internal structure of the component, and a set of quantitative metrics based on the Common Vulnerability Scoring System (CVSS). The EDG model can be applied throughout the entire lifespan of a device to track vulnerabilities, identify new requirements, root causes, and test cases. It also helps prioritize patching activities. The model was validated by application to the OpenPLC project. The results reveal that most of the vulnerabilities associated with OpenPLC were related to memory buffer operations and were concentrated in the library. The model was able to determine new requirements and generate test cases from the analysis.

摘要

工业组件的快速发展、工业 4.0 范式以及 5G 技术引入的新连接特性都增加了网络安全事件的可能性。这些事件是由这些组件中存在的漏洞引起的。设计一个安全的系统至关重要,但它也很复杂、昂贵,并且在组件的生命周期内是一个额外需要管理的因素。本文提出了一种模型来分析工业组件随时间推移已知的漏洞。所提出的扩展依赖关系图 (EDG) 模型基于两个主要元素:组件内部结构的有向图表示和基于通用漏洞评分系统 (CVSS) 的一组定量指标。EDG 模型可以在设备的整个生命周期内应用,以跟踪漏洞、识别新需求、根本原因和测试用例。它还有助于确定补丁活动的优先级。该模型通过应用于 OpenPLC 项目进行了验证。结果表明,与 OpenPLC 相关的大多数漏洞都与内存缓冲区操作有关,并且集中在库中。该模型能够从分析中确定新的需求并生成测试用例。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bdf2/8952879/e39b882a19ba/sensors-22-02126-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bdf2/8952879/e6a9c5afcfc3/sensors-22-02126-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bdf2/8952879/23e8f43ee6d3/sensors-22-02126-g0A1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bdf2/8952879/99d8798c1ea8/sensors-22-02126-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bdf2/8952879/1e75764f8e76/sensors-22-02126-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bdf2/8952879/52ec759ec6e8/sensors-22-02126-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bdf2/8952879/904317efeb1d/sensors-22-02126-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bdf2/8952879/69f4ad9e967e/sensors-22-02126-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bdf2/8952879/87b7b225f2ba/sensors-22-02126-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bdf2/8952879/e39b882a19ba/sensors-22-02126-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bdf2/8952879/e6a9c5afcfc3/sensors-22-02126-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bdf2/8952879/23e8f43ee6d3/sensors-22-02126-g0A1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bdf2/8952879/99d8798c1ea8/sensors-22-02126-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bdf2/8952879/1e75764f8e76/sensors-22-02126-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bdf2/8952879/52ec759ec6e8/sensors-22-02126-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bdf2/8952879/904317efeb1d/sensors-22-02126-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bdf2/8952879/69f4ad9e967e/sensors-22-02126-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bdf2/8952879/87b7b225f2ba/sensors-22-02126-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bdf2/8952879/e39b882a19ba/sensors-22-02126-g008.jpg

相似文献

1
A Novel Model for Vulnerability Analysis through Enhanced Directed Graphs and Quantitative Metrics.通过增强有向图和定量指标进行脆弱性分析的新模型。
Sensors (Basel). 2022 Mar 9;22(6):2126. doi: 10.3390/s22062126.
2
AI-driven cybersecurity framework for software development based on the ANN-ISM paradigm.基于人工神经网络-解释结构模型范式的人工智能驱动的软件开发网络安全框架。
Sci Rep. 2025 Apr 18;15(1):13423. doi: 10.1038/s41598-025-97204-y.
3
Cybersecurity in Hospitals: A Systematic, Organizational Perspective.医院中的网络安全:系统的组织视角
J Med Internet Res. 2018 May 28;20(5):e10059. doi: 10.2196/10059.
4
Analysis and implementation of semi-automatic model for vulnerability exploitations of threat agents in NIST databases.美国国家标准与技术研究院(NIST)数据库中威胁主体漏洞利用的半自动模型分析与实现
Multimed Tools Appl. 2023;82(11):16951-16971. doi: 10.1007/s11042-022-14036-y. Epub 2022 Nov 2.
5
Multi-Layer Attack Graph Analysis in the 5G Edge Network Using a Dynamic Hexagonal Fuzzy Method.基于动态六边形模糊方法的5G边缘网络多层攻击图分析
Sensors (Basel). 2021 Dec 21;22(1):9. doi: 10.3390/s22010009.
6
An Improved Vulnerability Exploitation Prediction Model with Novel Cost Function and Custom Trained Word Vector Embedding.具有新型代价函数和自定义训练词向量嵌入的改进型漏洞利用预测模型。
Sensors (Basel). 2021 Jun 20;21(12):4220. doi: 10.3390/s21124220.
7
Maybe If We Turn It Off and Then Turn It Back On Again? Exploring Health Care Reform as a Means to Curb Cyber Attacks.也许我们可以关闭它,然后再重新打开它?探索医疗改革以遏制网络攻击。
J Law Med Ethics. 2019 Dec;47(4_suppl):91-102. doi: 10.1177/1073110519898046.
8
Support for the Vulnerability Management Process Using Conversion CVSS Base Score 2.0 to 3.x.利用转换 CVSS 基础分数 2.0 到 3.x 来支持漏洞管理流程。
Sensors (Basel). 2023 Feb 6;23(4):1802. doi: 10.3390/s23041802.
9
Modified graph-based algorithm to analyze security threats in IoT.用于分析物联网安全威胁的基于图的改进算法。
PeerJ Comput Sci. 2023 Dec 8;9:e1743. doi: 10.7717/peerj-cs.1743. eCollection 2023.
10
A Review of Attacks, Vulnerabilities, and Defenses in Industry 4.0 with New Challenges on Data Sovereignty Ahead.工业 4.0 中的攻击、漏洞和防御综述,以及即将面临的数据主权新挑战。
Sensors (Basel). 2021 Jul 30;21(15):5189. doi: 10.3390/s21155189.

引用本文的文献

1
A Formal Verification of a Reputation Multi-Factor Authentication Mechanism for Constrained Devices and Low-Power Wide-Area Network Using Temporal Logic.使用时态逻辑对受限设备和低功耗广域网的声誉多因素认证机制进行形式化验证。
Sensors (Basel). 2023 Aug 3;23(15):6933. doi: 10.3390/s23156933.
2
Cybersecurity of Critical Infrastructures: Challenges and Solutions.关键基础设施的网络安全:挑战与解决方案。
Sensors (Basel). 2022 Jul 7;22(14):5105. doi: 10.3390/s22145105.

本文引用的文献

1
Security Issues and Software Updates Management in the Industrial Internet of Things (IIoT) Era.工业物联网 (IIoT) 时代的安全问题和软件更新管理。
Sensors (Basel). 2020 Dec 14;20(24):7160. doi: 10.3390/s20247160.
2
ARES: Automated Risk Estimation in Smart Sensor Environments.ARES:智能传感器环境中的自动风险评估。
Sensors (Basel). 2020 Aug 17;20(16):4617. doi: 10.3390/s20164617.