Attack Graph Generation and Visualization for Industrial Control Network

被引:0
|
作者
Feng, Yanli [1 ,2 ]
Sun, Gongliang [1 ,2 ]
Liu, Zhiyao [3 ]
Wu, Chenrui [1 ,2 ]
Zhu, Xiaoyang [1 ,2 ]
Wang, Zibo [1 ,2 ]
Wang, Bailing [1 ,2 ]
机构
[1] Harbin Inst Technol Weihai, Sch Comp Sci & Technol, Weihai 264200, Peoples R China
[2] Harbin Inst Technol Weihai, Res Inst CyberSpace Secur, Weihai 264209, Peoples R China
[3] China Ind Control Syst Cyber Emergency Response T, Beijing 100040, Peoples R China
基金
国家重点研发计划;
关键词
Industrial control network; attack graph; vulnerability classification and correlation; large-scale visualization;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attack graph is an effective way to analyze the vulnerabilities for industrial control networks. We develop a vulnerability correlation method and a practical visualization technology for industrial control network. First of all, we give a complete attack graph analysis for industrial control network, which focuses on network model and vulnerability context. Particularly, a practical attack graph algorithm is proposed, including preparing environments and vulnerability classification and correlation. Finally, we implement a three-dimensional interactive attack graph visualization tool. The experimental results show validation and verification of the proposed method.
引用
收藏
页码:7655 / 7660
页数:6
相关论文
共 50 条
  • [1] Overview on Attack Graph Generation and Visualization Technology
    Yi, Shengwei
    Peng, Yong
    Xiong, Qi
    Wang, Ting
    Dai, Zhonghua
    Gao, Haihui
    Xu, Junfeng
    Wang, Jiteng
    Xu, Lijuan
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION (ASID), 2013,
  • [2] Attack Graph Generation, Visualization and Analysis: Issues and Challenges
    Bopche, Ghanshyam S.
    Mehtre, Babu M.
    [J]. SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 379 - 390
  • [3] Naggen: a Network Attack Graph GENeration Tool
    Barrere, Martin
    Lupu, Emil C.
    [J]. 2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 378 - 379
  • [4] Practical attack graph generation for network defense
    Ingols, Kyle
    Lippmann, Richard
    Piwowarski, Keith
    [J]. 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 121 - +
  • [5] Generation and Risk Analysis of Network Attack Graph
    Prasad, Keshav
    Kumar, Santosh
    Negi, Anuradha
    Mahanti, Aniket
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2015, 2016, 404 : 507 - 516
  • [6] ENHANCING INDUSTRIAL CONTROL NETWORK SECURITY THROUGH VULNERABILITY DETECTION AND ATTACK GRAPH ANALYSIS
    Liao, Yan
    [J]. SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (01): : 65 - 74
  • [7] Research on attack graph generation for network security situation
    College of Computer Science and Technology Harbin Engineering University, Harbin, China
    不详
    [J]. Adv. Intell. Sys. Comput., (1147-1154):
  • [8] A taxonomy for attack graph generation and usage in network securitya
    Kaynar, Kerem
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2016, 29 : 27 - 56
  • [9] Attack Graph Generation with Machine Learning for Network Security
    Koo, Kijong
    Moon, Daesung
    Huh, Jun-Ho
    Jung, Se-Hoon
    Lee, Hansung
    [J]. ELECTRONICS, 2022, 11 (09)
  • [10] Security risk control of water power generation industrial control network based on attack and defense map
    Dong, Xiao
    Zhang, Jing
    Li, Qianmu
    Hou, Jun
    Liu, Yonzong
    [J]. 2019 IEEE FIFTH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING SERVICE AND APPLICATIONS (IEEE BIGDATASERVICE 2019), 2019, : 232 - 236