Sensitivity Analysis for Vulnerability Mitigation in Hybrid Networks

Attiq Ur‐rehman, Iqbal Gondal, Joarder Kamruzzaman, Alireza Jolfaei

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)
4 Downloads (Pure)

Abstract

The development of cyber‐assured systems is a challenging task, particularly due to the cost and complexities associated with the modern hybrid networks architectures, as well as the recent advancements in cloud computing. For this reason, the early detection of vulnerabilities and threat strategies are vital for minimising the risks for enterprise networks configured with a variety of node types, which are called hybrid networks. Existing vulnerability assessment techniques are unable to exhaustively analyse all vulnerabilities in modern dynamic IT networks, which utilise a wide range of IoT and industrial control devices (ICS). This could lead to having a less optimal risk evaluation. In this paper, we present a novel framework to analyse the mitigation strategies for a variety of nodes, including traditional IT systems and their dependability on IoT devices, as well as industrial control systems. The framework adopts avoid, reduce, and manage as its core principles in characterising mitigation strategies. Our results confirmed the effectiveness of our mitigation strategy framework, which took node types, their criticality, and the network topology into account. Our results showed that our proposed framework was highly effective at reducing the risks in dynamic and resource constraint environments, in contrast to the existing techniques in the literature.

Original languageEnglish
Article number238
Number of pages19
JournalElectronics (Switzerland)
Volume11
Issue number2
DOIs
Publication statusPublished - 2 Jan 2022
Externally publishedYes

Keywords

  • Attack tree
  • CVSS
  • CVSSIoT‐ICS
  • Hybrid networks
  • ICS
  • IoT
  • Mitigation
  • Sensitivity analysis

Fingerprint

Dive into the research topics of 'Sensitivity Analysis for Vulnerability Mitigation in Hybrid Networks'. Together they form a unique fingerprint.

Cite this