2021
DOI: 10.1109/tetc.2021.3050733
|View full text |Cite
|
Sign up to set email alerts
|

SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems based on Machine learning

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
2

Relationship

2
6

Authors

Journals

citations
Cited by 24 publications
(19 citation statements)
references
References 62 publications
0
19
0
Order By: Relevance
“…Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems based on Machine Learning), which provides a novel framework for discovering IoT/CPS exploits [17]. Instead of artificially separating a system into different layers, SHARKS eschews a rigid classification and models an exploit chain (attack vector) as it appears to an adversary: a series of steps that begins at an "entry point" (a root node) and ends at a "goal" (a leaf node).…”
Section: Gravitas Builds On the Work Of Sharks (Smart Hackingmentioning
confidence: 99%
See 1 more Smart Citation
“…Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems based on Machine Learning), which provides a novel framework for discovering IoT/CPS exploits [17]. Instead of artificially separating a system into different layers, SHARKS eschews a rigid classification and models an exploit chain (attack vector) as it appears to an adversary: a series of steps that begins at an "entry point" (a root node) and ends at a "goal" (a leaf node).…”
Section: Gravitas Builds On the Work Of Sharks (Smart Hackingmentioning
confidence: 99%
“…Our model, called GRAVITAS, overcomes these challenges by combining the hardware, software, and network stack vulnerabilities of a system into a single attack graph. This attack graph, which includes undiscovered vulnerabilities and the connections between them as predicted by the SHARKS ML model [17], contains attack vectors that are passed over by risk management tools that employ only known vulnerabilities. These attack vectors are then assigned risk scores according to a probabilistic method that models the interaction between attack impacts and the graph's vulnerabilities.…”
Section: Introductionmentioning
confidence: 99%
“…We target this problem in this article. ML-based attack graphs have been used previously to analyze the security of IoT and cyber-physical systems [6,15]. We use ML on the attack graphs to enable our framework to scale to larger networks.…”
Section: Related Workmentioning
confidence: 99%
“…A new node may be added when a new vulnerability is discovered or when a new vulnerable component is introduced in the 5GCN. Utilization of ML at the system level is inspired by the SHARKS framework [6], where ML was used to discover novel possible exploits in an IoT system. SHARKS is an acronym for Smart Hacking Approaches for RisK Scanning.…”
Section: Introductionmentioning
confidence: 99%
“…The main areas of research that have gained increased attention in recent years are reliability [3], performance [4] and cyber security [5]. Systems using IoT frameworks produce a lot of data [6] due to the presence of many sensors and actuators, for instance, enabling predictive maintenance with minor manual interaction [7].…”
Section: Introductionmentioning
confidence: 99%