Strategies for Practical Hybrid Attack Graph Generation and Analysis

被引:1
|
作者
Li, Ming [1 ]
Hawrylak, Peter [1 ]
Hale, John [1 ]
机构
[1] Univ Tulsa, Tandy Sch Comp Sci, J Newton Rayzor Hall,2 Floor,800 S Tucker Dr, Tulsa, OK 74104 USA
来源
关键词
Attack graph; high performance computing; cyber-physical system; breadth-first search;
D O I
10.1145/3491257
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As an analytical tool in cyber-security, an attack graph (AG) is capable of discovering multi-stage attack vectors on target computer networks. Cyber-physical systems (CPSs) comprise a special type of network that not only contains computing devices but also integrates components that operate in the continuous domain, such as sensors and actuators. Using AGs on CPSs requires that the system models and exploit patterns capture both token- and real-valued information. In this article, we describe a hybrid AG model for security analysis of CPSs and computer networks. Specifically, we focus on two issues related to applying the model in practice: efficient hybrid AG generation and techniques for information extraction from them. To address the first issue, we present an accelerated hybrid AG generator that employs parallel programming and high performance computing (HPC). We conduct performance tests on CPU and GPU platforms to characterize the efficiency of our parallel algorithms. To address the second issue, we introduce an analytical regimen based on centrality analysis and apply it to a hybrid AG generated for a target CPS system to discover effective vulnerability remediation solutions.
引用
收藏
页数:24
相关论文
共 50 条
  • [21] Practical Data-Only Attack Generation
    Johannesmeyer, Brian
    Slowinska, Asia
    Bos, Herbert
    Giuffrida, Cristiano
    PROCEEDINGS OF THE 33RD USENIX SECURITY SYMPOSIUM, SECURITY 2024, 2024, : 1401 - 1418
  • [22] Practical Data-Only Attack Generation
    Johannesmeyer, Brian
    Slowinska, Asia
    Bos, Herbert
    Giuffrida, Cristiano
    Proceedings of the 33rd USENIX Security Symposium, 2024, : 1401 - 1418
  • [23] An Attack Path Generation Methods Based on Graph Database
    Yuan, Bintao
    Pan, Zulie
    Shi, Fan
    Li, Zhenhan
    PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 1905 - 1910
  • [24] A Generation Method of Attack Graph Based on Evolutionary Computation
    Wang, Jiajia
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ENERGY, ENVIRONMENT AND CHEMICAL ENGINEERING (AEECE 2016), 2016, 89 : 28 - 31
  • [25] Attack Graph Generation with Machine Learning for Network Security
    Koo, Kijong
    Moon, Daesung
    Huh, Jun-Ho
    Jung, Se-Hoon
    Lee, Hansung
    ELECTRONICS, 2022, 11 (09)
  • [26] A taxonomy for attack graph generation and usage in network securitya
    Kaynar, Kerem
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2016, 29 : 27 - 56
  • [27] Depth-first method for attack graph generation
    Information Security Research Center, Harbin Engineering University, Harbin 150001, China
    不详
    Jilin Daxue Xuebao (Gongxueban), 2009, 2 (446-452):
  • [28] Identifying Interdependencies Using Attack Graph Generation Methods
    Lever, Kirsty E.
    Kifayat, Kashif
    Merabti, Madjid
    2015 11TH INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY (IIT), 2015, : 80 - 85
  • [29] Research on attack graph generation for network security situation
    Wang, Yanbo
    Wang, Huiqiang
    Zhao, Chao
    Zhang, Yushu
    Yu, Ming
    Advances in Intelligent Systems and Computing, 2013, 212 : 1147 - 1154
  • [30] An Attack Graph Generation Method Based on Parallel Computing
    Cao, Ningyuan
    Lv, Kun
    Hu, Changzhen
    SCIENCE OF CYBER SECURITY, SCISEC 2018, 2018, 11287 : 34 - 48