期刊文献+

物联网安全威胁与安全模型 被引量:2

IoT Security Threat and Security Model
下载PDF
导出
摘要 随着物联网应用的发展和普及利用,针对物联网的攻击事件日益增多且危害严重。目前面对物联网安全问题主要采用被动补救的方式,缺乏对物联网安全的体系化思考和研究。本论文首先介绍物联网系统架构和各实体的发展,然后分析物联网面临的多层次安全威胁,包括各实体自身的安全威胁,也包括跨域的安全威胁。其中,实体自身安全威胁涉及到云平台、设备端、管道、云端交互。物联网跨域安全威胁包含4个方面:多域级联攻击、物理域的冲突与叠加、信息域对物理域进行非预期的控制、信息域对物理域输入的理解不全面。在此基础上,论文研究了基于PDRR网络安全体系的物联网安全模型,包含安全防护、安全检测、响应、恢复4个维度。安全防护包含认证、授权与访问控制、通信加密等技术,需要考虑物联网种类繁多,规模巨大,异构等特点进行设计与实施。安全检测需要对各实体进行入侵检测、在线安全监测、脆弱性检测以及恶意代码检测。其中,在线安全监测获取系统内部设备、应用程序的行为、状态、是否存在已知脆弱性等。脆弱性检测偏向于对未知脆弱性进行深度挖掘。在响应阶段,除了配合相关部门机关完成安全行动资源配置、态势感知等响应工作外,还需要进行入侵事件的分析与响应,漏洞与恶意代码的公告与修复,以及安全防护加固与检测规则的更新。在恢复阶段,需要对关键数据进行恢复,并对系统进行升级与恢复。最后论文进行总结并提出值得关注的研究方向。 With the development and widespread use of Internet of Things(IoT)applications,attacks on the IoT are becoming more frequent and more serious.Currently,the main approach to address IoT security issues is passive remediation,lacking systematic thinking and research on IoT security.Therefore,in this paper,we first introduce the IoT system architecture and the development of various entities.Then,we analyze the multi-level security threats faced by the IoT system,including the security threats of the entities themselves and cross-domain security threats.The security threats of the entities themselves involve cloud platforms,device ends,pipelines,and cloud-end interactions.The cross-domain security threats of the IoT include four aspects:multi-domain cascading attacks,conflicts and overlaps in physical domains,unexpected control of physical domains by cyber domains,and incomplete understanding of physical domains by cyber domains.Based on it,we present an IoT security model based on PDRR network security framework,including four dimensions:security protection,security detection,response,and recovery.Security protection includes technologies such as authentication,authorization and access control,and communication encryption.It requires considering the wide variety,large scale,and heterogeneity of the IoT in design and implementation.Security detection requires intrusion detection,online security monitoring,vulnerability detection,and malicious code detection for each entity.Online security monitoring obtains the behavior,status,and known vulnerabilities of internal devices and applications,while vulnerability detection focuses on in-depth exploration of unknown vulnerabilities.In the response phase,in addition to coordinating with relevant departments to complete security action resource allocation and situational awareness response work,it is also necessary to analyze and respond to intrusion events,announce and fix vulnerabilities and malicious code,and update security protection and detection rules.In the recovery phase,it is necessary to recover critical data and upgrade and restore the system.Finally,we summarize the paper and present some research directions worth attention.
作者 郑尧文 文辉 程凯 李红 朱红松 孙利民 ZHENG Yaowen;WEN Hui;CHENG Kai;LI Hong;ZHU Hongsong;SUN Limin(Beijing Key Laboratory of IOT Information Security Technology,Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100093,China;School of Cyber Security,University of Chinese Academy of Sciences,Beijing 100049,China)
出处 《信息安全学报》 CSCD 2023年第5期81-95,共15页 Journal of Cyber Security
基金 广东省重点研发计划(No.2019B010137004) 国家自然科学基金联合基金项目(No.U1766215)资助。
关键词 物联网安全 安全威胁 安全模型 PDRR模型 IoT security security threat security model PDRR model
  • 相关文献

参考文献2

二级参考文献4

共引文献13

同被引文献23

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部