{"title":"An Automated Framework for Generating Attack Graphs Using Known Security Threats","authors":"Rami Alnafrani, D. Wijesekera","doi":"10.1109/ISDFS55398.2022.9800833","DOIUrl":null,"url":null,"abstract":"As the proliferation of IoT increases, the need for threat modeling and risk assessment becomes more important. This paper presents an automated framework by utilizing publicly known vulnerabilities and the analytical capabilities provided by MulVAL. The goal is to address the problem of immature IoT security and adopt a proactive approach to threat detection and prevention. The proposed solution is based on the creation of a customized search tool that focuses on the components utilized to build IoT devices. The framework was evaluated by applying it to well-known gadgets. Based on the results, there is a link between currently known IoT vulnerabilities and different attack techniques and graphs. The System Usability Scale (SUS) was utilized to examine the usability of the search tool. As a result, a survey was performed to establish the user experience with the tool. The findings show that the proposed solution is functional and usable.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"50 10","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISDFS55398.2022.9800833","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
As the proliferation of IoT increases, the need for threat modeling and risk assessment becomes more important. This paper presents an automated framework by utilizing publicly known vulnerabilities and the analytical capabilities provided by MulVAL. The goal is to address the problem of immature IoT security and adopt a proactive approach to threat detection and prevention. The proposed solution is based on the creation of a customized search tool that focuses on the components utilized to build IoT devices. The framework was evaluated by applying it to well-known gadgets. Based on the results, there is a link between currently known IoT vulnerabilities and different attack techniques and graphs. The System Usability Scale (SUS) was utilized to examine the usability of the search tool. As a result, a survey was performed to establish the user experience with the tool. The findings show that the proposed solution is functional and usable.