multiple layers of fuzzy logic to quantify vulnerabilies in iot

AI-generated keywords: Network Security IoT Quantification Vulnerabilities Department of Transportation

AI-generated Key Points

The license of the paper does not allow us to build upon its content and the key points are generated using the paper metadata rather than the full article.

  • Quantification of vulnerabilities in network systems and IoT is a contentious issue in network security.
  • Extensive research has been conducted, but ambiguities and uncertainties persist in the process.
  • A study was conducted to investigate vulnerability quantification within the Department of Transportation (DOT) as a proof of concept.
  • Security requirements were identified using Security Quality Requirements Engineering (SQUARE).
  • Established security standards like NIST SP-800 and ISO 27001 were used to map out security factors relevant to the DOT's network infrastructure.
  • A Multi-layered Fuzzy Logic (MFL) approach based on Goal question Metrics (GQM) was proposed to enhance the quantification process.
  • The methodology aims to provide a comprehensive framework for assessing network security and IoT vulnerabilities, particularly focusing on mobile devices within the DOT environment.
  • Combining established security standards with innovative approaches like MFL offers a robust framework for evaluating and addressing vulnerabilities within complex network systems.
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Mohammad Shojaeshafiei, Letha Etzkorn, Michael Anderson

Abstract: Quantifying vulnerabilities of network systems has been a highly controversial issue in the fields of network security and IoT. Much research has been conducted on this purpose; however, these have many ambiguities and uncertainties. In this paper, we investigate the quantification of vulnerability in the Department of Transportation (DOT) as our proof of concept. We initiate the analysis of security requirements, using Security Quality Requirements Engineering (SQUARE) for security requirements elicitation. Then we apply published security standards such as NIST SP-800 and ISO 27001 to map our security factors and sub-factors. Finally, we propose our Multi-layered Fuzzy Logic (MFL) approach based on Goal question Metrics (GQM) to quantify network security and IoT (Mobile Devices) vulnerability in DOT.

Submitted to arXiv on 14 Jul. 2020

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

The license of the paper does not allow us to build upon its content and the AI assistant only knows about the paper metadata rather than the full article.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 2007.07155v1

This paper's license doesn't allow us to build upon its content and the summarizing process is here made with the paper's metadata rather than the article.

The quantification of vulnerabilities in network systems has been a contentious issue in the realm of network security and IoT. Despite extensive research in this area, there remain numerous ambiguities and uncertainties surrounding the process. To address this challenge, a study was conducted to investigate the quantification of vulnerability within the Department of Transportation (DOT) as a proof of concept. The analysis began by identifying security requirements using Security Quality Requirements Engineering (SQUARE) for eliciting security needs. Subsequently, established security standards like NIST SP-800 and ISO 27001 were utilized to map out security factors and sub-factors relevant to the DOT's network infrastructure. To further enhance the quantification process, a Multi-layered Fuzzy Logic (MFL) approach was proposed. This methodology is based on Goal question Metrics (GQM) and aims to provide a comprehensive framework for assessing network security and IoT vulnerabilities, particularly focusing on mobile devices within the DOT environment. By combining established security standards with innovative approaches like MFL, they offer a robust framework for evaluating and addressing vulnerabilities within complex network systems such as those found in governmental entities like the Department of Transportation.
Created on 26 May. 2024

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.