Strategies for Practical Hybrid Attack Graph Generation and Analysis

被引:1
|
作者
Li, Ming [1 ]
Hawrylak, Peter [1 ]
Hale, John [1 ]
机构
[1] Univ Tulsa, Tandy Sch Comp Sci, J Newton Rayzor Hall,2 Floor,800 S Tucker Dr, Tulsa, OK 74104 USA
来源
关键词
Attack graph; high performance computing; cyber-physical system; breadth-first search;
D O I
10.1145/3491257
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As an analytical tool in cyber-security, an attack graph (AG) is capable of discovering multi-stage attack vectors on target computer networks. Cyber-physical systems (CPSs) comprise a special type of network that not only contains computing devices but also integrates components that operate in the continuous domain, such as sensors and actuators. Using AGs on CPSs requires that the system models and exploit patterns capture both token- and real-valued information. In this article, we describe a hybrid AG model for security analysis of CPSs and computer networks. Specifically, we focus on two issues related to applying the model in practice: efficient hybrid AG generation and techniques for information extraction from them. To address the first issue, we present an accelerated hybrid AG generator that employs parallel programming and high performance computing (HPC). We conduct performance tests on CPU and GPU platforms to characterize the efficiency of our parallel algorithms. To address the second issue, we introduce an analytical regimen based on centrality analysis and apply it to a hybrid AG generated for a target CPS system to discover effective vulnerability remediation solutions.
引用
收藏
页数:24
相关论文
共 50 条
  • [1] Concurrency Strategies for Attack Graph Generation
    Li, Ming
    Hawrylak, Peter J.
    Hale, John
    2019 2ND INTERNATIONAL CONFERENCE ON DATA INTELLIGENCE AND SECURITY (ICDIS 2019), 2019, : 174 - 179
  • [2] Practical attack graph generation for network defense
    Ingols, Kyle
    Lippmann, Richard
    Piwowarski, Keith
    22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 121 - +
  • [3] Attack Graph Generation and Analysis Techniques
    Barik, Mridul Sankar
    Sengupta, Anirban
    Mazumdar, Chandan
    DEFENCE SCIENCE JOURNAL, 2016, 66 (06) : 559 - 567
  • [4] Design Procedure of Knowledge Base for Practical Attack Graph Generation
    Inokuchi, Masaki
    Ohta, Yoshinobu
    Kinoshita, Shunichi
    Yagyu, Tomohiko
    Stan, Orly
    Bitton, Ron
    Elovici, Yuval
    Shabtai, Asaf
    PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19), 2019, : 594 - 601
  • [5] Generation and Risk Analysis of Network Attack Graph
    Prasad, Keshav
    Kumar, Santosh
    Negi, Anuradha
    Mahanti, Aniket
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2015, 2016, 404 : 507 - 516
  • [6] Attack Graph Generation, Visualization and Analysis: Issues and Challenges
    Bopche, Ghanshyam S.
    Mehtre, Babu M.
    SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 379 - 390
  • [7] Automatic Hybrid Attack Graph (AHAG) Generation for Complex Engineering Systems
    Ibrahim, Mariam
    Alsheikh, Ahmad
    PROCESSES, 2019, 7 (11)
  • [8] Distributed Attack Graph Generation
    Kaynar, Kerem
    Sivrikaya, Fikret
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (05) : 519 - 532
  • [9] A Hybrid Attack Graph Analysis Method based on Model Checking
    Ge, Yaogang
    Shen, Xiaomeng
    Xu, Bingfeng
    He, Gaofeng
    2022 TENTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA, CBD, 2022, : 258 - 263
  • [10] Research on Automatic Generation and Analysis Technology of Network Attack Graph
    Hu, Wenhui
    Zhang, Long
    Liu, Xueyang
    Huang, Yu
    Zhang, Minghui
    Xing, Liang
    2020 IEEE 6TH INT CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / 6TH IEEE INT CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) / 5TH IEEE INT CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2020, : 133 - 139