当前位置: X-MOL 学术ACM Comput. Surv. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Attack and System Modeling Applied to IoT, Cloud, and Mobile Ecosystems
ACM Computing Surveys ( IF 23.8 ) Pub Date : 2020-03-20 , DOI: 10.1145/3376123
João B. F. Sequeiros 1 , Francisco T. Chimuco 1 , Musa G. Samaila 1 , Mário M. Freire 1 , Pedro R. M. Inácio 1
Affiliation  

Over the years, pervasive computing and communication technologies have enabled the emergence of new computing paradigms that have gained importance across a wide spectrum of domains. The three most notable that have witnessed significant advancements and have a solid track record of exponential growth in diverse applications are the Internet of Things (IoT), Cloud, and Mobile Computing. The ubiquity of these paradigms, their expandability, and applicability in different problem spaces have made them invaluable in modern computing solutions. Security becomes a real concern, especially when it comes to the development of applications in these environments, as numerous security issues may arise from potential design flaws. Secure application development across these three technologies can only be achieved when applications and systems are designed and developed with security in mind. This will improve the quality of the solutions and ensure that vulnerabilities are identified. It will also help in defining countermeasures against cyberattacks or mitigate the effects of potential threats to the systems. This article surveys existing approaches, tools, and techniques for attack and system modeling applicable to IoT, Cloud computing, and Mobile Computing. It also evaluates the strengths and limitations of the reviewed approaches and tools, from which it highlights the main existing challenges and open issues in the area.

中文翻译:

应用于物联网、云和移动生态系统的攻击和系统建模

多年来,普及计算和通信技术促成了新的计算范式的出现,这些范式在广泛的领域中变得越来越重要。物联网 (IoT)、云计算和移动计算是三个最显着的见证了重大进步并在各种应用程序中呈指数级增长的可靠记录。这些范式的普遍性、可扩展性和在不同问题空间中的适用性使它们在现代计算解决方案中具有不可估量的价值。安全成为一个真正的问题,尤其是在这些环境中开发应用程序时,因为潜在的设计缺陷可能会引发许多安全问题。只有在设计和开发应用程序和系统时考虑到安全性,才能实现跨这三种技术的安全应用程序开发。这将提高解决方案的质量并确保发现漏洞。它还将有助于确定针对网络攻击的对策或减轻潜在威胁对系统的影响。本文调查了适用于物联网、云计算和移动计算的攻击和系统建模的现有方法、工具和技术。它还评估了所审查的方法和工具的优势和局限性,从中突出了该领域的主要现有挑战和未解决的问题。它还将有助于确定针对网络攻击的对策或减轻潜在威胁对系统的影响。本文调查了适用于物联网、云计算和移动计算的攻击和系统建模的现有方法、工具和技术。它还评估了所审查的方法和工具的优势和局限性,从中突出了该领域的主要现有挑战和未解决的问题。它还将有助于确定针对网络攻击的对策或减轻潜在威胁对系统的影响。本文调查了适用于物联网、云计算和移动计算的攻击和系统建模的现有方法、工具和技术。它还评估了所审查的方法和工具的优势和局限性,从中突出了该领域的主要现有挑战和未解决的问题。
更新日期:2020-03-20
down
wechat
bug