Fast Algorithm for Cyber-Attack Estimation and Attack Path Extraction Using Attack Graphs with AND/OR Nodes

被引:0
|
作者
Levner, Eugene [1 ]
Tsadikovich, Dmitry [2 ]
机构
[1] Holon Inst Technol, Fac Sci, IL-58102 Holon, Israel
[2] Bar Ilan Univ, Dept Management, IL-5290002 Ramat Gan, Israel
关键词
cybersecurity; cyber-attack; cyclic attack graph; attack path; AND/OR graph; attack time assessment; attack path extraction; polynomial algorithm; GENERATION;
D O I
10.3390/a17110504
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper studies the security issues for cyber-physical systems, aimed at countering potential malicious cyber-attacks. The main focus is on solving the problem of extracting the most vulnerable attack path in a known attack graph, where an attack path is a sequence of steps that an attacker can take to compromise the underlying network. Determining an attacker's possible attack path is critical to cyber defenders as it helps identify threats, harden the network, and thwart attacker's intentions. We formulate this problem as a path-finding optimization problem with logical constraints represented by AND and OR nodes. We propose a new Dijkstra-type algorithm that combines elements from Dijkstra's shortest path algorithm and the critical path method. Although the path extraction problem is generally NP-hard, for the studied special case, the proposed algorithm determines the optimal attack path in polynomial time, O(nm), where n is the number of nodes and m is the number of edges in the attack graph. To our knowledge this is the first exact polynomial algorithm that can solve the path extraction problem for different attack graphs, both cycle-containing and cycle-free. Computational experiments with real and synthetic data have shown that the proposed algorithm consistently and quickly finds optimal solutions to the problem.
引用
收藏
页数:24
相关论文
共 50 条
  • [1] An Empirical Evaluation of the Effectiveness of Attack Graphs and Fault Trees in Cyber-Attack Perception
    Lallie, Harjinder Singh
    Debattista, Kurt
    Bal, Jay
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (05) : 1110 - 1122
  • [2] Cyber-Attack Attributes
    Kadivar, Mehdi
    TECHNOLOGY INNOVATION MANAGEMENT REVIEW, 2014, : 22 - 27
  • [3] The Law of Cyber-Attack
    Hathaway, Oona A.
    Crootof, Rebecca
    Levitz, Philip
    Nix, Haley
    Nowlan, Aileen
    Perdue, William
    Spiegel, Julia
    CALIFORNIA LAW REVIEW, 2012, 100 (04) : 817 - 885
  • [4] Cyber-attack group analysis method based on association of cyber-attack information
    Son, Kyung-ho
    Kim, Byung-ik
    Lee, Tae-jin
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (01): : 260 - 280
  • [5] From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks
    Polatidis, Nikolaos
    Pimenidis, Elias
    Pavlidis, Michalis
    Papastergiou, Spyridon
    Mouratidis, Haralambos
    EVOLVING SYSTEMS, 2020, 11 (03) : 479 - 490
  • [6] From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks
    Nikolaos Polatidis
    Elias Pimenidis
    Michalis Pavlidis
    Spyridon Papastergiou
    Haralambos Mouratidis
    Evolving Systems, 2020, 11 : 479 - 490
  • [7] Understanding of Cyber-Attack Vulnerabilities During Natural Disasters and Discussing A Cyber-Attack Resiliency Framework
    Chakraborty, Suryadip
    Mombeshora, Elton M.
    Clark, Kyra P.
    Mbavarira, Tanaka S.
    SOUTHEASTCON 2024, 2024, : 466 - 471
  • [8] Attack Analysis Framework for Cyber-Attack and Defense Test Platform
    Qi, Yulu
    Jiang, Rong
    Jia, Yan
    Li, Aiping
    ELECTRONICS, 2020, 9 (09) : 1 - 18
  • [9] A Flow Attack Strategy based on Critical Links for Cyber-attack
    Qi, Jiming
    Zhang, Jiazheng
    Liu, Qingxia
    Wang, Bang
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 913 - 920
  • [10] Optimal Linear Cyber-Attack on Remote State Estimation
    Guo, Ziyang
    Shi, Dawei
    Johansson, Karl Henrik
    Shi, Ling
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (01): : 4 - 13