Title: Bio-inspired security analysis for IoT scenarios

Authors: Vincenzo Conti; Andrea Ziggiotto; Mauro Migliardi; Salvatore Vitabile

Addresses: Faculty of Engineering and Architecture, University of Enna KORE, Enna, Italy ' Department of Information Engineering, University of Padua, Padua, Italy ' Department of Information Engineering, University of Padua, Padua, Italy ' Department of Biomedicine, Neuroscience and Advanced Diagnostics, University of Palermo, Palermo, Italy

Abstract: Computer security has recently become more and more important as the world economy dependency from data has kept growing. The complexity of the systems that need to be kept secure calls for new models capable of abstracting the interdependencies among heterogeneous components that cooperate at providing the desired service. A promising approach is attack graph analysis, however, the manual analysis of attack graphs is tedious and error prone. In this paper we propose to apply the metabolic network model to attack graph analysis, using three interacting bio-inspired algorithms: topological analysis, flux balance analysis, and extreme pathway analysis. A developed framework for graph building and simulations as well as an introductory to some IoT scenarios as use cases are also outlined.

Keywords: security analysis; attack graphs; network security; system security; bio-inspired techniques; IoT; metabolic networks; bio-inspired algorithms.

DOI: 10.1504/IJES.2020.108871

International Journal of Embedded Systems, 2020 Vol.13 No.2, pp.221 - 235

Received: 10 Jan 2019
Accepted: 02 Jun 2019

Published online: 11 May 2020 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article