{"title":"基于医疗传感器网络的攻击路径可视化构建算法","authors":"Hanhe Zhang, Shigong Kang, Yijie Li","doi":"10.1109/IICSPI.2018.8690460","DOIUrl":null,"url":null,"abstract":"The age of IOT, the robustness of basic network has been a hot issue in industry and academia. To improve the security of THE basic network, researchers have proposed solutions from different perspectives, such as firewall based on management policy, intrusion detection system, and vulnerability scanner. However, the existing solutions cannot meet the requirements of attack intention prediction. In this paper, a construction and prediction algorithm based on the network attack path is proposed to mitigate the threats of attackers. The proposed algorithm adopts analysis integration results generated by the device of network security deployment to predict the objects of probabilistic attack targets. Based on the prediction results, the attack path is demonstrated, which provides assistant decision-making suggestions for network users. To evaluate the effectiveness, the prototype of the proposed algorithm is implemented and deployed into the actual sensor network. The experimental results indicate the vulnerability of network is accurately analyzed via the proposed algorithm.","PeriodicalId":6673,"journal":{"name":"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)","volume":"49 1","pages":"775-779"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Visual Construction Algorithm of Attack Path Based on Medical Sensor Networks\",\"authors\":\"Hanhe Zhang, Shigong Kang, Yijie Li\",\"doi\":\"10.1109/IICSPI.2018.8690460\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The age of IOT, the robustness of basic network has been a hot issue in industry and academia. To improve the security of THE basic network, researchers have proposed solutions from different perspectives, such as firewall based on management policy, intrusion detection system, and vulnerability scanner. However, the existing solutions cannot meet the requirements of attack intention prediction. In this paper, a construction and prediction algorithm based on the network attack path is proposed to mitigate the threats of attackers. The proposed algorithm adopts analysis integration results generated by the device of network security deployment to predict the objects of probabilistic attack targets. Based on the prediction results, the attack path is demonstrated, which provides assistant decision-making suggestions for network users. To evaluate the effectiveness, the prototype of the proposed algorithm is implemented and deployed into the actual sensor network. The experimental results indicate the vulnerability of network is accurately analyzed via the proposed algorithm.\",\"PeriodicalId\":6673,\"journal\":{\"name\":\"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)\",\"volume\":\"49 1\",\"pages\":\"775-779\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IICSPI.2018.8690460\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE International Conference of Safety Produce Informatization (IICSPI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IICSPI.2018.8690460","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Visual Construction Algorithm of Attack Path Based on Medical Sensor Networks
The age of IOT, the robustness of basic network has been a hot issue in industry and academia. To improve the security of THE basic network, researchers have proposed solutions from different perspectives, such as firewall based on management policy, intrusion detection system, and vulnerability scanner. However, the existing solutions cannot meet the requirements of attack intention prediction. In this paper, a construction and prediction algorithm based on the network attack path is proposed to mitigate the threats of attackers. The proposed algorithm adopts analysis integration results generated by the device of network security deployment to predict the objects of probabilistic attack targets. Based on the prediction results, the attack path is demonstrated, which provides assistant decision-making suggestions for network users. To evaluate the effectiveness, the prototype of the proposed algorithm is implemented and deployed into the actual sensor network. The experimental results indicate the vulnerability of network is accurately analyzed via the proposed algorithm.