Fast Algorithm for Cyber-Attack Estimation and Attack Path Extraction Using Attack Graphs with AND/OR Nodes

被引:0
|
作者
Levner, Eugene [1 ]
Tsadikovich, Dmitry [2 ]
机构
[1] Holon Inst Technol, Fac Sci, IL-58102 Holon, Israel
[2] Bar Ilan Univ, Dept Management, IL-5290002 Ramat Gan, Israel
关键词
cybersecurity; cyber-attack; cyclic attack graph; attack path; AND/OR graph; attack time assessment; attack path extraction; polynomial algorithm; GENERATION;
D O I
10.3390/a17110504
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper studies the security issues for cyber-physical systems, aimed at countering potential malicious cyber-attacks. The main focus is on solving the problem of extracting the most vulnerable attack path in a known attack graph, where an attack path is a sequence of steps that an attacker can take to compromise the underlying network. Determining an attacker's possible attack path is critical to cyber defenders as it helps identify threats, harden the network, and thwart attacker's intentions. We formulate this problem as a path-finding optimization problem with logical constraints represented by AND and OR nodes. We propose a new Dijkstra-type algorithm that combines elements from Dijkstra's shortest path algorithm and the critical path method. Although the path extraction problem is generally NP-hard, for the studied special case, the proposed algorithm determines the optimal attack path in polynomial time, O(nm), where n is the number of nodes and m is the number of edges in the attack graph. To our knowledge this is the first exact polynomial algorithm that can solve the path extraction problem for different attack graphs, both cycle-containing and cycle-free. Computational experiments with real and synthetic data have shown that the proposed algorithm consistently and quickly finds optimal solutions to the problem.
引用
收藏
页数:24
相关论文
共 50 条
  • [31] Thwarting cyber-attack reconnaissance with inconsistency and deception
    Rowe, Neil C.
    Goh, Han C.
    2007 IEEE INFORMATION ASSURANCE WORKSHOP, 2007, : 151 - +
  • [32] Telecom links provide cyber-attack route
    Fulghum, DA
    AVIATION WEEK & SPACE TECHNOLOGY, 1999, 151 (19): : 81 - 83
  • [33] Counterplanning deceptions to foil cyber-attack plans
    Rowe, NC
    IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 221 - 228
  • [34] Modeling Cyber-Attack for SCADA Systems Using CoPNet Approach
    El Bouchti, Abdelali
    Haqiq, Abdelkrim
    PROCEEDINGS OF 2012 INTERNATIONAL CONFERENCE ON COMPLEX SYSTEMS (ICCS12), 2012, : 481 - 486
  • [35] Predictive model for multistage cyber-attack simulation
    Kour, Ravdeep
    Thaduri, Adithya
    Karim, Ramin
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2020, 11 (03) : 600 - 613
  • [36] Data Mining Based Cyber-Attack Detection
    TIANFIELD Huaglory
    系统仿真技术, 2017, 13 (02) : 90 - 104
  • [37] Studying The Impacts of Cyber-attack On Smart Grid
    Meraj, Tanzim
    Sharmin, Shaela
    Mahmud, Asif
    2015 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL INFORMATION AND COMMUNICATION TECHNOLOGY (EICT), 2015, : 461 - 466
  • [38] Predictive model for multistage cyber-attack simulation
    Ravdeep Kour
    Adithya Thaduri
    Ramin Karim
    International Journal of System Assurance Engineering and Management, 2020, 11 : 600 - 613
  • [39] Cyber-attack Detection Strategy Based on Distribution System State Estimation
    Long, Huan
    Wu, Zhi
    Fang, Chen
    Gu, Wei
    Wei, Xinchi
    Zhan, Huiyu
    JOURNAL OF MODERN POWER SYSTEMS AND CLEAN ENERGY, 2020, 8 (04) : 669 - 678
  • [40] Counterplanning deceptions to foil cyber-attack plans
    Rowe, NC
    IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 203 - 210