The Internet of Things network penetration testing model using attack graph analysis

Penetration testing (pen-testing) is one of the most effective approaches to increase the security level of information systems. Although pen-testing is a very popular approach, the process requires a significant investment of time and extensive financial resources. Existing pen-testing models have...

Full description

Saved in:
Bibliographic Details
Main Authors: Almazrouei, Omar, Magalingam, Pritheega
Format: Conference or Workshop Item
Published: 2022
Subjects:
Online Access:http://eprints.utm.my/id/eprint/98928/
http://dx.doi.org/10.1109/ISMSIT56059.2022.9932758
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Penetration testing (pen-testing) is one of the most effective approaches to increase the security level of information systems. Although pen-testing is a very popular approach, the process requires a significant investment of time and extensive financial resources. Existing pen-testing models have focused heavily on handling IoT security breaches and improving attack path analysis. However, they have their limitations as they are too general and unable to detect multi-stage, multi-host, or zero-day vulnerabilities in IoT devices. In this proposed study, an algorithm is developed to generate all attack paths for vulnerable IoT devices. The techniques to optimize the attack paths are defined. A second algorithm is developed to identify the criticality of the paths, nodes, and vulnerabilities before it is used to optimize the target graphs. The developed model is expected to be an end-to-end, accurate, flexible, and automatic pen-testing model using attack graphs for detecting all possible paths that can be used by an attacker to penetrate the target system.