Cyber-Attack for BGP Systems Using CoPNet Model

被引:0
|
作者
El Bouchti, Abdelali [1 ]
Haqiq, Abdelkrim [1 ]
机构
[1] Hassan 1st Univ, Comp Networks Mobil & Modeling Lab, E NGN Res Grp, FST, Settat, Morocco
关键词
Vulnerability; Cyber-Attack; CoPNet; AT; Attack Modeling; BGP;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rise of cyber-attack activities in the recent years, research in this area has gained immense emphasis. One of such research efforts is modeling of cyber-attacks. In this context, several modeling approaches have been developed, such as approaches based on attack trees (AT). In this paper, we propose Colored Petri Net (CoPNet) modeling approach by extending the attack trees with new modeling constructs and analysis approaches. CoPNet based attack model is flexible enough to model Internet intrusion, including the static and dynamic features of the intrusion. The process and rules of building CoPNet based attack model from AT are also presented. In order to evaluate the risk of intrusion, some cost elements are added to CoPNet based attack modeling. We show how attack trees can be converted and analyzed in CoPNets. Finally, we provide a case study that illustrates the CoPNet approach.
引用
收藏
页码:10 / 15
页数:6
相关论文
共 50 条
  • [41] Cyber-Attack on a Power Plant using Bias Injected Measurements
    Kontouras, Efstathios
    Tzes, Anthony
    Dritsas, Leonidas
    2017 AMERICAN CONTROL CONFERENCE (ACC), 2017, : 5507 - 5512
  • [42] Automated cyber-attack scenario generation using the symbolic simulation
    Lee, JK
    Lee, MW
    Lee, JS
    Chi, SD
    Ohn, SY
    ARTIFICIAL INTELLIGENCE AND SIMULATION, 2004, 3397 : 380 - 389
  • [43] An explainable multi-modal model for advanced cyber-attack detection in industrial control systems
    Bahadoripour, Sepideh
    Karimipour, Hadis
    Jahromi, Amir Namavar
    Islam, Anik
    INTERNET OF THINGS, 2024, 25
  • [44] Application of Artificial Neural Network for Cyber-Attack Detection in Water Distribution Systems as Cyber Physical Systems
    Min, Kyoung Won
    Choi, Young Hwan
    Al-Shamiri, Abobakr Khalil
    Kim, Joong Hoon
    ADVANCES IN HARMONY SEARCH, SOFT COMPUTING AND APPLICATIONS, 2020, 1063 : 82 - 88
  • [45] Vulnerability Analysis of Power Systems Based on Cyber-Attack and Defense Models
    Hasan, Saqib
    Ghafouri, Amin
    Dubey, Abhishek
    Karsai, Gabor
    Koutsoukos, Xenofon
    2018 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2018,
  • [46] Estimating the Impact of Cyber-Attack Strategies for Stochastic Networked Control Systems
    Milosevic, Jezdimir
    Sandberg, Henrik
    Johansson, Karl Henrik
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2020, 7 (02): : 747 - 757
  • [47] Distributed cyber-attack isolation for large-scale interconnected systems
    Gallo, Alexander J.
    Boem, Francesca
    Parisini, Thomas
    2021 EUROPEAN CONTROL CONFERENCE (ECC), 2021, : 48 - 53
  • [48] Fast Algorithm for Cyber-Attack Estimation and Attack Path Extraction Using Attack Graphs with AND/OR Nodes
    Levner, Eugene
    Tsadikovich, Dmitry
    ALGORITHMS, 2024, 17 (11)
  • [49] KCAD: Kinetic Cyber-Attack Detection Method for Cyber-Physical Additive Manufacturing Systems
    Chhetri, Sujit Rokka
    Canedo, Arquimedes
    Al Faruque, Mohammad Abdullah
    2016 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2016,
  • [50] Protocols, Solutions, and Testbeds for Cyber-Attack Prevention in Industrial SCADA Systems
    Kumar A.
    Bhushan B.
    Malik A.
    Kumar R.
    Studies in Big Data, 2021, 99 : 355 - 380