当前位置: X-MOL 学术Wirel. Commun. Mob. Comput. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
An Invocation Chain Test and Evaluation Method for Fog Computing
Wireless Communications and Mobile Computing ( IF 2.146 ) Pub Date : 2020-08-28 , DOI: 10.1155/2020/8812017
Yue Zhao 1, 2, 3 , Yarang Yang 4 , Bo Tian 1, 2, 3 , Tianyi Zhang 5
Affiliation  

In this paper, an invocation chain technology is used to test the security of fog computing systems. Atomic attacks based on the attack graph are combined according to the type, time sequence, and causal relationship. Different test sequences have gone through according to the principle of depth-first. In addition, the vulnerability assessment based on an invocation chain is evaluated to verify whether it can detect existing or unknown vulnerability in fog computing systems. Finally, the experimental results show that the invocation chain test and evaluation method based on the attack graph can evaluate the system risk quantitatively rather than qualitatively by calculating comprehensive probability on all test sequences.

中文翻译:

雾计算的调用链测试与评估方法

在本文中,调用链技术用于测试雾计算系统的安全性。基于攻击图的原子攻击根据类型,时间顺序和因果关系进行组合。根据深度优先原则,经历了不同的测试序列。此外,评估了基于调用链的漏洞评估,以验证其是否可以检测雾计算系统中的现有漏洞或未知漏洞。最后,实验结果表明,基于攻击图的调用链测试和评估方法可以通过计算所有测试序列的综合概率来定量评估系统风险,而不是定性评估系统风险。
更新日期:2020-08-28
down
wechat
bug