Strategies for Practical Hybrid Attack Graph Generation and Analysis

被引:1
|
作者
Li, Ming [1 ]
Hawrylak, Peter [1 ]
Hale, John [1 ]
机构
[1] Univ Tulsa, Tandy Sch Comp Sci, J Newton Rayzor Hall,2 Floor,800 S Tucker Dr, Tulsa, OK 74104 USA
来源
关键词
Attack graph; high performance computing; cyber-physical system; breadth-first search;
D O I
10.1145/3491257
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As an analytical tool in cyber-security, an attack graph (AG) is capable of discovering multi-stage attack vectors on target computer networks. Cyber-physical systems (CPSs) comprise a special type of network that not only contains computing devices but also integrates components that operate in the continuous domain, such as sensors and actuators. Using AGs on CPSs requires that the system models and exploit patterns capture both token- and real-valued information. In this article, we describe a hybrid AG model for security analysis of CPSs and computer networks. Specifically, we focus on two issues related to applying the model in practice: efficient hybrid AG generation and techniques for information extraction from them. To address the first issue, we present an accelerated hybrid AG generator that employs parallel programming and high performance computing (HPC). We conduct performance tests on CPU and GPU platforms to characterize the efficiency of our parallel algorithms. To address the second issue, we introduce an analytical regimen based on centrality analysis and apply it to a hybrid AG generated for a target CPS system to discover effective vulnerability remediation solutions.
引用
收藏
页数:24
相关论文
共 50 条
  • [41] PyCG: Practical Call Graph Generation in Python']Python
    Salis, Vitalis
    Sotiropoulos, Thodoris
    Louridas, Panos
    Spinellis, Diomidis
    Mitropoulos, Dimitris
    2021 IEEE/ACM 43RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2021), 2021, : 1646 - 1657
  • [42] An atomic-domains-based approach for attack graph generation
    Chen, Fangfang
    Wang, Chunlu
    Tian, Zhihong
    Jin, Shuyuan
    Zhang, Tianle
    World Academy of Science, Engineering and Technology, 2009, 32 : 775 - 781
  • [43] MAGD: Minimal Attack Graph Generation Dynamically in Cyber Security
    Mohammadzad, Maryam
    Karimpour, Jaber
    Mahan, Farnaz
    COMPUTER NETWORKS, 2023, 236
  • [44] Attack Graph Generation Method Based on Privilege Escalation Matrix
    Qin H.
    Wang J.-L.
    Peng X.-Y.
    Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2019, 39 (01): : 101 - 105
  • [45] An Attack Graph Generation Method Based on Heuristic Searching Strategy
    Wang, Shuo
    Tang, Guangming
    Kou, Guang
    Chao, Yong
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 1180 - 1185
  • [46] Attack Hypotheses Generation Based on Threat Intelligence Knowledge Graph
    Kaiser, Florian Klaus
    Dardik, Uriel
    Elitzur, Aviad
    Zilberman, Polina
    Daniel, Nir
    Wiens, Marcus
    Schultmann, Frank
    Elovici, Yuval
    Puzis, Rami
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (06) : 4793 - 4809
  • [47] QUANTUMHAMMER: A Practical Hybrid Attack on he LUOV Signature Scheme
    Mus, Koksal
    Islam, Saad
    Sunar, Berk
    CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, : 1071 - 1084
  • [48] TAG: Topological Attack Graph Analysis Tool
    Malowidzki, Marek
    Hermanowski, Damian
    Berezinski, Przemyslaw
    2019 3RD CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2019,
  • [49] Automatic Discovery of Attack Messages and Pre- and Post-Conditions for Attack Graph Generation
    Carvalho, Marco
    Teng, Choh Man
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 378 - 387
  • [50] Practical Cyber Attack Detection With Continuous Temporal Graph in Dynamic Network System
    Duan, Guanghan
    Lv, Hongwu
    Wang, Huiqiang
    Feng, Guangsheng
    Li, Xiaoli
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 4851 - 4864