Fast Algorithm for Cyber-Attack Estimation and Attack Path Extraction Using Attack Graphs with AND/OR Nodes

被引:0
|
作者
Levner, Eugene [1 ]
Tsadikovich, Dmitry [2 ]
机构
[1] Holon Inst Technol, Fac Sci, IL-58102 Holon, Israel
[2] Bar Ilan Univ, Dept Management, IL-5290002 Ramat Gan, Israel
关键词
cybersecurity; cyber-attack; cyclic attack graph; attack path; AND/OR graph; attack time assessment; attack path extraction; polynomial algorithm; GENERATION;
D O I
10.3390/a17110504
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper studies the security issues for cyber-physical systems, aimed at countering potential malicious cyber-attacks. The main focus is on solving the problem of extracting the most vulnerable attack path in a known attack graph, where an attack path is a sequence of steps that an attacker can take to compromise the underlying network. Determining an attacker's possible attack path is critical to cyber defenders as it helps identify threats, harden the network, and thwart attacker's intentions. We formulate this problem as a path-finding optimization problem with logical constraints represented by AND and OR nodes. We propose a new Dijkstra-type algorithm that combines elements from Dijkstra's shortest path algorithm and the critical path method. Although the path extraction problem is generally NP-hard, for the studied special case, the proposed algorithm determines the optimal attack path in polynomial time, O(nm), where n is the number of nodes and m is the number of edges in the attack graph. To our knowledge this is the first exact polynomial algorithm that can solve the path extraction problem for different attack graphs, both cycle-containing and cycle-free. Computational experiments with real and synthetic data have shown that the proposed algorithm consistently and quickly finds optimal solutions to the problem.
引用
收藏
页数:24
相关论文
共 50 条
  • [21] Stealthy Cyber-Attack Design Using Dynamic Programming
    Anandl, Sribalaji C.
    Teixeira, Andre M. H.
    2021 60TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2021, : 3474 - 3479
  • [22] Cyber-Attack for BGP Systems Using CoPNet Model
    El Bouchti, Abdelali
    Haqiq, Abdelkrim
    2012 SECOND INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGY (INTECH), 2012, : 10 - 15
  • [23] Cyber-attack Detection and Accommodation Algorithm for Energy Delivery Systems
    Mestha, Lalit K.
    Anubi, Olugbenga M.
    Abbaszadeh, Masoud
    2017 IEEE CONFERENCE ON CONTROL TECHNOLOGY AND APPLICATIONS (CCTA 2017), 2017, : 1326 - 1331
  • [24] Cyber-Attack Detection for Autonomous Driving Using Vehicle Dynamic State Estimation
    Dong Zhang
    Chen Lv
    Tianci Yang
    Peng Hang
    Automotive Innovation, 2021, 4 : 262 - 273
  • [25] Cyber-Attack Detection for Autonomous Driving Using Vehicle Dynamic State Estimation
    Zhang, Dong
    Lv, Chen
    Yang, Tianci
    Hang, Peng
    AUTOMOTIVE INNOVATION, 2021, 4 (03) : 262 - 273
  • [26] Rapid Cyber-Attack Detection System with Low Probability of Missed Attack Warnings
    Vidanapathirana, Dushani
    Mohammad, Azeem
    Halgamuge, Malka N.
    2022 IEEE 17TH CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA), 2022, : 1423 - 1429
  • [27] An Overview of Cyber-Attack Vectors on SCADA Systems
    Irmak, Erdal
    Erkek, Ismail
    2018 6TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2018, : 350 - 354
  • [28] Cyber-attack Detection Strategy Based on Distribution System State Estimation
    Huan Long
    Zhi Wu
    Chen Fang
    Wei Gu
    Xinchi Wei
    Huiyu Zhan
    JournalofModernPowerSystemsandCleanEnergy, 2020, 8 (04) : 669 - 678
  • [29] Optimization of Cyber-Attack Detection Using the Deep Learning Network
    Van Duong, Lai
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (07): : 159 - 163
  • [30] Cyber-attack risk low for medical devices
    Tse, Zion Tsz Ho
    Xu, Sheng
    Fung, Isaac Chun-Hai
    Wood, Bradford J.
    SCIENCE, 2015, 347 (6228) : 1323 - 1324