Automatic Hybrid Attack Graph (AHAG) Generation for Complex Engineering Systems

被引:9
|
作者
Ibrahim, Mariam [1 ]
Alsheikh, Ahmad [1 ,2 ]
机构
[1] German Jordanian Univ, Fac Appl Tech Sci, Dept Mechatron Engn, Amman 11180, Jordan
[2] Deggendorf Inst Technol, Dept Mech Engn & Mechatron, D-94469 Deggendorf, Germany
关键词
Hybrid Attack Graph; Level-of-Resilience; stability; topology; FAULT-DIAGNOSIS;
D O I
10.3390/pr7110787
中图分类号
TQ [化学工业];
学科分类号
0817 ;
摘要
Complex Engineering Systems are subject to cyber-attacks due to inherited vulnerabilities in the underlying entities constituting them. System Resiliency is determined by its ability to return to a normal state under attacks. In order to analyze the resiliency under various attacks compromising the system, a new concept of Hybrid Attack Graph (HAG) is introduced. A HAG is a graph that captures the evolution of both logical and real values of system parameters under attack and recovery actions. The HAG is generated automatically and visualized using Java based tools. The results are illustrated through a communication network example.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Strategies for Practical Hybrid Attack Graph Generation and Analysis
    Li, Ming
    Hawrylak, Peter
    Hale, John
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2022, 3 (04):
  • [2] Research on Automatic Generation and Analysis Technology of Network Attack Graph
    Hu, Wenhui
    Zhang, Long
    Liu, Xueyang
    Huang, Yu
    Zhang, Minghui
    Xing, Liang
    2020 IEEE 6TH INT CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / 6TH IEEE INT CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) / 5TH IEEE INT CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2020, : 133 - 139
  • [3] Automatic Attack Signature Generation Systems: A Review
    Kaur, Sanmeet
    Singh, Maninder
    IEEE SECURITY & PRIVACY, 2013, 11 (06) : 54 - 61
  • [4] Automatic Discovery of Attack Messages and Pre- and Post-Conditions for Attack Graph Generation
    Carvalho, Marco
    Teng, Choh Man
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 378 - 387
  • [5] Attack Detection and Identification for Automatic Generation Control Systems
    Ameli, Amir
    Hooshyar, Ali
    El-Saadany, Ehab F.
    Youssef, Amr M.
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2018, 33 (05) : 4760 - 4774
  • [6] Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios
    Godefroy, Erwan
    Totel, Eric
    Hurfin, Michel
    Majorczyk, Frederic
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2015, 10 (03): : 100 - 110
  • [7] Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios
    Godefroy, Erwan
    Totel, Eric
    Hurfin, Michel
    Majorczyk, Frederic
    2014 10TH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY (IAS), 2014, : 23 - 28
  • [8] Automatic Generation of Attack Strategy for Multiple Vulnerabilities Based on Domain Knowledge Graph
    Chen, Xiaosheng
    Shen, Wendi
    Yang, Genke
    IECON 2021 - 47TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2021,
  • [9] Automatic Generation of Graph Models for Complex Networks by Genetic Programming
    Bailey, Alexander
    Ventresca, Mario
    Ombuki-Berman, Beatrice
    PROCEEDINGS OF THE FOURTEENTH INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, 2012, : 711 - 718
  • [10] Distributed Attack Graph Generation
    Kaynar, Kerem
    Sivrikaya, Fikret
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (05) : 519 - 532