IoT security: Graph-based vulnerability and risk assessment models

Organisatsiooni nimi
Cryptography Research Group
Kokkuvõte
IoT devices and systems are vulnerable to attacks due to their characteristics. There are various attack and vulnerability assessment studies in the literature to bring persistent and applicable solutions for security concerns in IoT. These studies provide different approaches in terms of network representation and solution techniques. The graph model is one of these representations and technical approaches. An attack graph model shows all possible attack path sequences from the source to the target. Therefore, graph-based models can offer systematic, formal, and strong directions to determine vulnerable points, and they can help to design defense mechanisms. In this seminar, the main goal is to give a literature review with a comparison of available models.
Lõputöö kaitsmise aasta
2024-2025
Juhendaja
Sedat Akleylek
Suhtlemiskeel(ed)
inglise keel
Nõuded kandideerijale
Tase
Magister
Märksõnad
#cybersecurity, #graph_theory, #risk_assessment, #vulnerability_analysis

Kandideerimise kontakt

 
Nimi
Sedat Akleylek
Tel
E-mail
sedat.akleylek@ut.ee