Attack Path Detection for IIoT Enabled Cyber Physical Systems: Revisited

被引:14
|
作者
Arat, Ferhat [1 ]
Akleylek, Sedat [2 ,3 ,4 ]
机构
[1] Samsun Univ, Dept Software Engn, Samsun, Turkiye
[2] Ondokuz Mayis Univ, Dept Comp Engn, Samsun, Turkiye
[3] Ondokuz Mayis Univ, Cyber Secur & Informat Technol Res & Dev Ctr, Samsun, Turkiye
[4] Univ Tartu, Tartu, Estonia
关键词
Industrial IoT security; Vulnerability and risk assessment; Attack graph; Attack path; Path filtering; Cyber attacks; IOT; MANAGEMENT;
D O I
10.1016/j.cose.2023.103174
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a generic vulnerability and risk assessment method for IIoT-enabled critical sys-tems. We focus on reducing risk factors and vulnerable structures in order to provide security issues for the IIoT and enabled complex systems. In addition to the existing risk assessment and related methods, we represent the IIoT-enabled network topology as a directed graph, and we develop an attack tree-based approach using graph theory. We assume that each device is a potential critical node due to the existing vulnerabilities, which are defined in the National Vulnerability Database (NVD), and we establish directed relations between nodes, considering cyber and physical interactions. We improve existing attack path-identifying methods using the Depth First Search (DFS) algorithm to find all the paths from the source to the target nodes. In the generated topology, each node has the pre-assigned Common Vulnerability Scoring System (CVSS) scores acting as a weight. We also implement the Floyd-Warshall algorithm to identify path risk levels. Finally, we assess the identified vulnerable paths from varying source and target pairs via path and node-reducing procedures, considering risk thresholds. We perform our simulation on a custom Python simulator, considering the transportation and supply sectors. We compare our results with the previous ones. Simulation results show that our proposed methods and procedures outperform existing risk assessment and filtering methods in terms of running time and attack path identification and filtering. (c) 2023 Elsevier Ltd. All rights reserved.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Cybersecurity knowledge graph enabled attack chain detection for cyber-physical systems
    Qi, Yulu
    Gu, Zhaoquan
    Li, Aiping
    Zhang, Xiaojuan
    Shafiq, Muhammad
    Mei, Yangyang
    Lin, Kaihan
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 108
  • [2] Attack Detection for Securing Cyber Physical Systems
    Yan, Weizhong
    Mestha, Lalit K.
    Abbaszadeh, Masoud
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) : 8471 - 8481
  • [3] Cyber attack estimation and detection for cyber-physical power systems
    Li, Lei
    Wang, Wenting
    Ma, Qiang
    Pan, Kunpeng
    Liu, Xin
    Lin, Lin
    Li, Jian
    APPLIED MATHEMATICS AND COMPUTATION, 2021, 400
  • [4] Cyber-Attack Detection for Automotive Cyber-Physical Systems
    Lee, Suyun
    Jung, Sunjae
    Baek, Youngmi
    BUILDSYS'21: PROCEEDINGS OF THE 2021 ACM INTERNATIONAL CONFERENCE ON SYSTEMS FOR ENERGY-EFFICIENT BUILT ENVIRONMENTS, 2021, : 214 - 215
  • [5] Setpoint Attack Detection in Cyber-Physical Systems
    Lucia, Walter
    Gheitasi, Kian
    Ghaderi, Mohsen
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (05) : 2332 - 2338
  • [6] Attack Detection and Identification in Cyber-Physical Systems
    Pasqualetti, Fabio
    Doerfler, Florian
    Bullo, Francesco
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2013, 58 (11) : 2715 - 2729
  • [7] Exploration of Ensemble Methods for Cyber Attack Detection in Cyber-Physical Systems
    Acquaah, Yaa Takyiwaa
    Kaushik, Roy
    ARTIFICIAL INTELLIGENCE APPLICATIONS AND INNOVATIONS, PT I, AIAI 2024, 2024, 711 : 330 - 347
  • [8] NFC-enabled Attack on Cyber Physical Systems: A Practical Case Study
    Dang, Fan
    Zhou, Pengfei
    Li, Zhenhua
    Liu, Yunhao
    2017 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2017, : 289 - 294
  • [9] Secure estimation and attack detection in cyber-physical systems with switching attack
    Martynova, Dina
    Zhang, Ping
    2018 EUROPEAN CONTROL CONFERENCE (ECC), 2018, : 357 - 362
  • [10] Intelligent Checkers to Improve Attack Detection in Cyber Physical Systems
    Sabaliauskaite, Giedre
    Mathur, Aditya P.
    2013 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2013, : 27 - 30