Cargando…

Multi-Source Knowledge Reasoning for Data-Driven IoT Security

Nowadays, there are different kinds of public knowledge bases for cyber security vulnerability and threat intelligence which can be used for IoT security threat analysis. However, the heterogeneity of these knowledge bases and the complexity of the IoT environments make network security situation aw...

Descripción completa

Detalles Bibliográficos
Autores principales: Zhang, Shuqin, Bai, Guangyao, Li, Hong, Liu, Peipei, Zhang, Minzhi, Li, Shujun
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8623156/
https://www.ncbi.nlm.nih.gov/pubmed/34833653
http://dx.doi.org/10.3390/s21227579
_version_ 1784605864069431296
author Zhang, Shuqin
Bai, Guangyao
Li, Hong
Liu, Peipei
Zhang, Minzhi
Li, Shujun
author_facet Zhang, Shuqin
Bai, Guangyao
Li, Hong
Liu, Peipei
Zhang, Minzhi
Li, Shujun
author_sort Zhang, Shuqin
collection PubMed
description Nowadays, there are different kinds of public knowledge bases for cyber security vulnerability and threat intelligence which can be used for IoT security threat analysis. However, the heterogeneity of these knowledge bases and the complexity of the IoT environments make network security situation awareness and threat assessment difficult. In this paper, we integrate vulnerabilities, weaknesses, affected platforms, tactics, attack techniques, and attack patterns into a coherent set of links. In addition, we propose an IoT security ontology model, namely, the IoT Security Threat Ontology (IoTSTO), to describe the elements of IoT security threats and design inference rules for threat analysis. This IoTSTO expands the current knowledge domain of cyber security ontology modeling. In the IoTSTO model, the proposed multi-source knowledge reasoning method can perform the following tasks: assess the threats of the IoT environment, automatically infer mitigations, and separate IoT nodes that are subject to specific threats. The method above provides support to security managers in their deployment of security solutions. This paper completes the association of current public knowledge bases for IoT security and solves the semantic heterogeneity of multi-source knowledge. In this paper, we reveal the scope of public knowledge bases and their interrelationships through the multi-source knowledge reasoning method for IoT security. In conclusion, the paper provides a unified, extensible, and reusable method for IoT security analysis and decision making.
format Online
Article
Text
id pubmed-8623156
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-86231562021-11-27 Multi-Source Knowledge Reasoning for Data-Driven IoT Security Zhang, Shuqin Bai, Guangyao Li, Hong Liu, Peipei Zhang, Minzhi Li, Shujun Sensors (Basel) Article Nowadays, there are different kinds of public knowledge bases for cyber security vulnerability and threat intelligence which can be used for IoT security threat analysis. However, the heterogeneity of these knowledge bases and the complexity of the IoT environments make network security situation awareness and threat assessment difficult. In this paper, we integrate vulnerabilities, weaknesses, affected platforms, tactics, attack techniques, and attack patterns into a coherent set of links. In addition, we propose an IoT security ontology model, namely, the IoT Security Threat Ontology (IoTSTO), to describe the elements of IoT security threats and design inference rules for threat analysis. This IoTSTO expands the current knowledge domain of cyber security ontology modeling. In the IoTSTO model, the proposed multi-source knowledge reasoning method can perform the following tasks: assess the threats of the IoT environment, automatically infer mitigations, and separate IoT nodes that are subject to specific threats. The method above provides support to security managers in their deployment of security solutions. This paper completes the association of current public knowledge bases for IoT security and solves the semantic heterogeneity of multi-source knowledge. In this paper, we reveal the scope of public knowledge bases and their interrelationships through the multi-source knowledge reasoning method for IoT security. In conclusion, the paper provides a unified, extensible, and reusable method for IoT security analysis and decision making. MDPI 2021-11-15 /pmc/articles/PMC8623156/ /pubmed/34833653 http://dx.doi.org/10.3390/s21227579 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Zhang, Shuqin
Bai, Guangyao
Li, Hong
Liu, Peipei
Zhang, Minzhi
Li, Shujun
Multi-Source Knowledge Reasoning for Data-Driven IoT Security
title Multi-Source Knowledge Reasoning for Data-Driven IoT Security
title_full Multi-Source Knowledge Reasoning for Data-Driven IoT Security
title_fullStr Multi-Source Knowledge Reasoning for Data-Driven IoT Security
title_full_unstemmed Multi-Source Knowledge Reasoning for Data-Driven IoT Security
title_short Multi-Source Knowledge Reasoning for Data-Driven IoT Security
title_sort multi-source knowledge reasoning for data-driven iot security
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8623156/
https://www.ncbi.nlm.nih.gov/pubmed/34833653
http://dx.doi.org/10.3390/s21227579
work_keys_str_mv AT zhangshuqin multisourceknowledgereasoningfordatadriveniotsecurity
AT baiguangyao multisourceknowledgereasoningfordatadriveniotsecurity
AT lihong multisourceknowledgereasoningfordatadriveniotsecurity
AT liupeipei multisourceknowledgereasoningfordatadriveniotsecurity
AT zhangminzhi multisourceknowledgereasoningfordatadriveniotsecurity
AT lishujun multisourceknowledgereasoningfordatadriveniotsecurity