Cargando…
Multi-Source Knowledge Reasoning for Data-Driven IoT Security
Nowadays, there are different kinds of public knowledge bases for cyber security vulnerability and threat intelligence which can be used for IoT security threat analysis. However, the heterogeneity of these knowledge bases and the complexity of the IoT environments make network security situation aw...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8623156/ https://www.ncbi.nlm.nih.gov/pubmed/34833653 http://dx.doi.org/10.3390/s21227579 |
_version_ | 1784605864069431296 |
---|---|
author | Zhang, Shuqin Bai, Guangyao Li, Hong Liu, Peipei Zhang, Minzhi Li, Shujun |
author_facet | Zhang, Shuqin Bai, Guangyao Li, Hong Liu, Peipei Zhang, Minzhi Li, Shujun |
author_sort | Zhang, Shuqin |
collection | PubMed |
description | Nowadays, there are different kinds of public knowledge bases for cyber security vulnerability and threat intelligence which can be used for IoT security threat analysis. However, the heterogeneity of these knowledge bases and the complexity of the IoT environments make network security situation awareness and threat assessment difficult. In this paper, we integrate vulnerabilities, weaknesses, affected platforms, tactics, attack techniques, and attack patterns into a coherent set of links. In addition, we propose an IoT security ontology model, namely, the IoT Security Threat Ontology (IoTSTO), to describe the elements of IoT security threats and design inference rules for threat analysis. This IoTSTO expands the current knowledge domain of cyber security ontology modeling. In the IoTSTO model, the proposed multi-source knowledge reasoning method can perform the following tasks: assess the threats of the IoT environment, automatically infer mitigations, and separate IoT nodes that are subject to specific threats. The method above provides support to security managers in their deployment of security solutions. This paper completes the association of current public knowledge bases for IoT security and solves the semantic heterogeneity of multi-source knowledge. In this paper, we reveal the scope of public knowledge bases and their interrelationships through the multi-source knowledge reasoning method for IoT security. In conclusion, the paper provides a unified, extensible, and reusable method for IoT security analysis and decision making. |
format | Online Article Text |
id | pubmed-8623156 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-86231562021-11-27 Multi-Source Knowledge Reasoning for Data-Driven IoT Security Zhang, Shuqin Bai, Guangyao Li, Hong Liu, Peipei Zhang, Minzhi Li, Shujun Sensors (Basel) Article Nowadays, there are different kinds of public knowledge bases for cyber security vulnerability and threat intelligence which can be used for IoT security threat analysis. However, the heterogeneity of these knowledge bases and the complexity of the IoT environments make network security situation awareness and threat assessment difficult. In this paper, we integrate vulnerabilities, weaknesses, affected platforms, tactics, attack techniques, and attack patterns into a coherent set of links. In addition, we propose an IoT security ontology model, namely, the IoT Security Threat Ontology (IoTSTO), to describe the elements of IoT security threats and design inference rules for threat analysis. This IoTSTO expands the current knowledge domain of cyber security ontology modeling. In the IoTSTO model, the proposed multi-source knowledge reasoning method can perform the following tasks: assess the threats of the IoT environment, automatically infer mitigations, and separate IoT nodes that are subject to specific threats. The method above provides support to security managers in their deployment of security solutions. This paper completes the association of current public knowledge bases for IoT security and solves the semantic heterogeneity of multi-source knowledge. In this paper, we reveal the scope of public knowledge bases and their interrelationships through the multi-source knowledge reasoning method for IoT security. In conclusion, the paper provides a unified, extensible, and reusable method for IoT security analysis and decision making. MDPI 2021-11-15 /pmc/articles/PMC8623156/ /pubmed/34833653 http://dx.doi.org/10.3390/s21227579 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Zhang, Shuqin Bai, Guangyao Li, Hong Liu, Peipei Zhang, Minzhi Li, Shujun Multi-Source Knowledge Reasoning for Data-Driven IoT Security |
title | Multi-Source Knowledge Reasoning for Data-Driven IoT Security |
title_full | Multi-Source Knowledge Reasoning for Data-Driven IoT Security |
title_fullStr | Multi-Source Knowledge Reasoning for Data-Driven IoT Security |
title_full_unstemmed | Multi-Source Knowledge Reasoning for Data-Driven IoT Security |
title_short | Multi-Source Knowledge Reasoning for Data-Driven IoT Security |
title_sort | multi-source knowledge reasoning for data-driven iot security |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8623156/ https://www.ncbi.nlm.nih.gov/pubmed/34833653 http://dx.doi.org/10.3390/s21227579 |
work_keys_str_mv | AT zhangshuqin multisourceknowledgereasoningfordatadriveniotsecurity AT baiguangyao multisourceknowledgereasoningfordatadriveniotsecurity AT lihong multisourceknowledgereasoningfordatadriveniotsecurity AT liupeipei multisourceknowledgereasoningfordatadriveniotsecurity AT zhangminzhi multisourceknowledgereasoningfordatadriveniotsecurity AT lishujun multisourceknowledgereasoningfordatadriveniotsecurity |