Identifying Interdependencies Using Attack Graph Generation Methods

被引:0
|
作者
Lever, Kirsty E. [1 ]
Kifayat, Kashif [1 ]
Merabti, Madjid [2 ]
机构
[1] Liverpool John Moores Univ, PROTECT Res Ctr Crit Infrastruct Comp Technol & P, Liverpool, Merseyside, England
[2] Univ Sharjah, Sharjah, U Arab Emirates
关键词
Interdependency; Cascading Failures; Attack Graphs; Collaborative Infrastructures; Internet of Things;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information and communication technologies have augmented interoperability and rapidly advanced varying industries, with vast complex interconnected networks being formed in areas such as safety-critical systems, which can be further categorised as critical infrastructures. What also must be considered is the paradigm of the Internet of Things which is rapidly gaining prevalence within the field of wireless communications, being incorporated into areas such as e-health and automation for industrial manufacturing. As critical infrastructures and the Internet of Things begin to integrate into much wider networks, their reliance upon communication assets by third parties to ensure collaboration and control of their systems will significantly increase, along with system complexity and the requirement for improved security metrics. We present a critical analysis of the risk assessment methods developed for generating attack graphs. The failings of these existing schemas include the inability to accurately identify the relationships and interdependencies between the risks and the reduction of attack graph size and generation complexity. Many existing methods also fail due to the heavy reliance upon the input, identification of vulnerabilities, and analysis of results by human intervention. Conveying our work, we outline our approach to modelling interdependencies within large heterogeneous collaborative infrastructures, proposing a distributed schema which utilises network modelling and attack graph generation methods, to provide a means for vulnerabilities, exploits and conditions to be represented within a unified model.
引用
收藏
页码:80 / 85
页数:6
相关论文
共 50 条
  • [21] Attack Graph Generation with Machine Learning for Network Security
    Koo, Kijong
    Moon, Daesung
    Huh, Jun-Ho
    Jung, Se-Hoon
    Lee, Hansung
    ELECTRONICS, 2022, 11 (09)
  • [22] A taxonomy for attack graph generation and usage in network securitya
    Kaynar, Kerem
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2016, 29 : 27 - 56
  • [23] Depth-first method for attack graph generation
    Information Security Research Center, Harbin Engineering University, Harbin 150001, China
    不详
    Jilin Daxue Xuebao (Gongxueban), 2009, 2 (446-452):
  • [24] Research on attack graph generation for network security situation
    Wang, Yanbo
    Wang, Huiqiang
    Zhao, Chao
    Zhang, Yushu
    Yu, Ming
    Advances in Intelligent Systems and Computing, 2013, 212 : 1147 - 1154
  • [25] An Attack Graph Generation Method Based on Parallel Computing
    Cao, Ningyuan
    Lv, Kun
    Hu, Changzhen
    SCIENCE OF CYBER SECURITY, SCISEC 2018, 2018, 11287 : 34 - 48
  • [26] Attack Graph Generation and Visualization for Industrial Control Network
    Feng, Yanli
    Sun, Gongliang
    Liu, Zhiyao
    Wu, Chenrui
    Zhu, Xiaoyang
    Wang, Zibo
    Wang, Bailing
    PROCEEDINGS OF THE 39TH CHINESE CONTROL CONFERENCE, 2020, : 7655 - 7660
  • [27] Graph models of critical infrastructure interdependencies
    Svendsen, Nils Kalstad
    Wolthusen, Stephen D.
    INTER-DOMAIN MANAGEMENT, PROCEEDINGS, 2007, 4543 : 208 - +
  • [28] A network attack path prediction method using attack graph
    Liu, Xuguang
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020,
  • [29] RecGraph: Graph Recovery Attack using Variational Graph Autoencoders
    Tian, Jing
    Liu, Chang
    Gou, Gaopeng
    Li, Zhen
    Xiong, Gang
    Guan, Yangyang
    2021 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE (IPCCC), 2021,
  • [30] Review on scene graph generation methods
    Monesh, S.
    Senthilkumar, N. C.
    MULTIAGENT AND GRID SYSTEMS, 2024, 20 (02) : 129 - 160