Fast Algorithm for Cyber-Attack Estimation and Attack Path Extraction Using Attack Graphs with AND/OR Nodes

被引:0
|
作者
Levner, Eugene [1 ]
Tsadikovich, Dmitry [2 ]
机构
[1] Holon Inst Technol, Fac Sci, IL-58102 Holon, Israel
[2] Bar Ilan Univ, Dept Management, IL-5290002 Ramat Gan, Israel
关键词
cybersecurity; cyber-attack; cyclic attack graph; attack path; AND/OR graph; attack time assessment; attack path extraction; polynomial algorithm; GENERATION;
D O I
10.3390/a17110504
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper studies the security issues for cyber-physical systems, aimed at countering potential malicious cyber-attacks. The main focus is on solving the problem of extracting the most vulnerable attack path in a known attack graph, where an attack path is a sequence of steps that an attacker can take to compromise the underlying network. Determining an attacker's possible attack path is critical to cyber defenders as it helps identify threats, harden the network, and thwart attacker's intentions. We formulate this problem as a path-finding optimization problem with logical constraints represented by AND and OR nodes. We propose a new Dijkstra-type algorithm that combines elements from Dijkstra's shortest path algorithm and the critical path method. Although the path extraction problem is generally NP-hard, for the studied special case, the proposed algorithm determines the optimal attack path in polynomial time, O(nm), where n is the number of nodes and m is the number of edges in the attack graph. To our knowledge this is the first exact polynomial algorithm that can solve the path extraction problem for different attack graphs, both cycle-containing and cycle-free. Computational experiments with real and synthetic data have shown that the proposed algorithm consistently and quickly finds optimal solutions to the problem.
引用
收藏
页数:24
相关论文
共 50 条
  • [41] A systematic classification scheme for cyber-attack taxonomy
    Kim, S.
    Shin, J.
    Heo, G.
    Song, J. G.
    SAFETY AND RELIABILITY - SAFE SOCIETIES IN A CHANGING WORLD, 2018, : 3013 - 3019
  • [42] Impact of Cyber-Attack on Isolated Power System
    Sahabuddin, Md.
    Dutta, Bilash
    Hassan, Mehedi
    2016 3RD INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION & COMMUNICATION TECHNOLOGY (ICEEICT), 2016,
  • [43] Labour calls for inquiry into NHS cyber-attack
    O'Dowd, Adrian
    BMJ-BRITISH MEDICAL JOURNAL, 2017, 357
  • [44] Infrastructure Cyber-Attack Awareness Training: Effective or Not?
    White, Garry L.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2022, 16 (01)
  • [45] Secured Cyber-Attack Signatures Distribution using Blockchain Technology
    Ajayi, Oluwaseyi
    Cherian, Melvin
    Saadawi, Tarek
    2019 22ND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (IEEE CSE 2019) AND 17TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (IEEE EUC 2019), 2019, : 482 - 488
  • [46] Cyber-Attack Modeling Analysis Techniques: An Overview
    AL-Mohannadi, Hamad
    Mirza, Qublai
    Namanya, Anitta
    Awan, Irfan
    Cullen, Andrea
    Disso, Jules
    2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW), 2016, : 69 - 76
  • [47] Cyber-Attack as a Menace to Effective Governance in Nigeria
    Fayomi, Oluyemi
    Ndubisi, Oly Nelson
    Ayo, Charles
    Chidozie, Felix
    Ajayi, Lady
    Okorie, Uchechukwu
    PROCEEDINGS OF THE 15TH EUROPEAN CONFERENCE ON EGOVERNMENT, 2015, : 107 - 116
  • [48] Cyber-Attack on a Power Plant using Bias Injected Measurements
    Kontouras, Efstathios
    Tzes, Anthony
    Dritsas, Leonidas
    2017 AMERICAN CONTROL CONFERENCE (ACC), 2017, : 5507 - 5512
  • [49] Automated cyber-attack scenario generation using the symbolic simulation
    Lee, JK
    Lee, MW
    Lee, JS
    Chi, SD
    Ohn, SY
    ARTIFICIAL INTELLIGENCE AND SIMULATION, 2004, 3397 : 380 - 389
  • [50] Cyber-Attack Detection for Automotive Cyber-Physical Systems
    Lee, Suyun
    Jung, Sunjae
    Baek, Youngmi
    BUILDSYS'21: PROCEEDINGS OF THE 2021 ACM INTERNATIONAL CONFERENCE ON SYSTEMS FOR ENERGY-EFFICIENT BUILT ENVIRONMENTS, 2021, : 214 - 215