Strategies for Practical Hybrid Attack Graph Generation and Analysis

被引:1
|
作者
Li, Ming [1 ]
Hawrylak, Peter [1 ]
Hale, John [1 ]
机构
[1] Univ Tulsa, Tandy Sch Comp Sci, J Newton Rayzor Hall,2 Floor,800 S Tucker Dr, Tulsa, OK 74104 USA
来源
关键词
Attack graph; high performance computing; cyber-physical system; breadth-first search;
D O I
10.1145/3491257
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As an analytical tool in cyber-security, an attack graph (AG) is capable of discovering multi-stage attack vectors on target computer networks. Cyber-physical systems (CPSs) comprise a special type of network that not only contains computing devices but also integrates components that operate in the continuous domain, such as sensors and actuators. Using AGs on CPSs requires that the system models and exploit patterns capture both token- and real-valued information. In this article, we describe a hybrid AG model for security analysis of CPSs and computer networks. Specifically, we focus on two issues related to applying the model in practice: efficient hybrid AG generation and techniques for information extraction from them. To address the first issue, we present an accelerated hybrid AG generator that employs parallel programming and high performance computing (HPC). We conduct performance tests on CPU and GPU platforms to characterize the efficiency of our parallel algorithms. To address the second issue, we introduce an analytical regimen based on centrality analysis and apply it to a hybrid AG generated for a target CPS system to discover effective vulnerability remediation solutions.
引用
收藏
页数:24
相关论文
共 50 条
  • [31] Attack Graph Generation and Visualization for Industrial Control Network
    Feng, Yanli
    Sun, Gongliang
    Liu, Zhiyao
    Wu, Chenrui
    Zhu, Xiaoyang
    Wang, Zibo
    Wang, Bailing
    PROCEEDINGS OF THE 39TH CHINESE CONTROL CONFERENCE, 2020, : 7655 - 7660
  • [32] Generation of Cyber-security Reinforcement Strategies for Smart Grid Based on the Attribute-based Attack Graph
    Zhang, Bo
    Li, Qianmu
    Zhang, Yiying
    Liu, Xuan
    Ni, Zhen
    JOURNAL OF POWER TECHNOLOGIES, 2016, 96 (03): : 170 - 177
  • [33] A Novel Approach for Analysis of Attack Graph
    Yousefi, Mehdi
    Mtetwa, Nhamo
    Zhang, Yan
    Tianfield, Huaglory
    2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2017, : 7 - 12
  • [34] A Reinforcementearning Approach for Attack Graph Analysis
    Yousefi, Mehdi
    Mtetwa, Nhamo
    Zhang, Yan
    Tianfield, Huaglory
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 212 - 217
  • [35] Attack graph analysis: An explanatory guide
    Zenitani, Kengo
    COMPUTERS & SECURITY, 2023, 126
  • [36] Attack Intent Analysis Method Based on Attack Path Graph
    Li, Shijin
    Zhu, Minchen
    Qiu, Yanbin
    ICCNS 2018: PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORK SECURITY, 2018, : 27 - 31
  • [37] Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis
    Nguyen, Thanh H.
    Wright, Mason
    Wellman, Michael P.
    Singh, Satinder
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [38] ANALYSIS OF AN ASTHMATIC ATTACK - PRACTICAL DEDUCTIONS
    BONNAUD, F
    EICHLER, B
    GERMOUTY, J
    GAZETTE MEDICALE DE FRANCE, 1980, 87 (24): : 3069 - 3072
  • [39] Generation and Analysis of Attack Graphs
    Wang, Chunying
    Du, Ning
    Yang, Huijing
    2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 : 4053 - 4057
  • [40] AI planning-based approach of attack graph generation
    Chen, Feng
    Su, Jin-Shu
    Han, Wen-Bao
    Jiefangjun Ligong Daxue Xuebao/Journal of PLA University of Science and Technology (Natural Science Edition), 2008, 9 (05): : 460 - 465