Identifying Interdependencies Using Attack Graph Generation Methods

被引:0
|
作者
Lever, Kirsty E. [1 ]
Kifayat, Kashif [1 ]
Merabti, Madjid [2 ]
机构
[1] Liverpool John Moores Univ, PROTECT Res Ctr Crit Infrastruct Comp Technol & P, Liverpool, Merseyside, England
[2] Univ Sharjah, Sharjah, U Arab Emirates
关键词
Interdependency; Cascading Failures; Attack Graphs; Collaborative Infrastructures; Internet of Things;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information and communication technologies have augmented interoperability and rapidly advanced varying industries, with vast complex interconnected networks being formed in areas such as safety-critical systems, which can be further categorised as critical infrastructures. What also must be considered is the paradigm of the Internet of Things which is rapidly gaining prevalence within the field of wireless communications, being incorporated into areas such as e-health and automation for industrial manufacturing. As critical infrastructures and the Internet of Things begin to integrate into much wider networks, their reliance upon communication assets by third parties to ensure collaboration and control of their systems will significantly increase, along with system complexity and the requirement for improved security metrics. We present a critical analysis of the risk assessment methods developed for generating attack graphs. The failings of these existing schemas include the inability to accurately identify the relationships and interdependencies between the risks and the reduction of attack graph size and generation complexity. Many existing methods also fail due to the heavy reliance upon the input, identification of vulnerabilities, and analysis of results by human intervention. Conveying our work, we outline our approach to modelling interdependencies within large heterogeneous collaborative infrastructures, proposing a distributed schema which utilises network modelling and attack graph generation methods, to provide a means for vulnerabilities, exploits and conditions to be represented within a unified model.
引用
收藏
页码:80 / 85
页数:6
相关论文
共 50 条
  • [31] Generation of Colon Tissue Graph for Identifying Deformed Images
    Thomas, Rintu Mariya
    Kumar, K. G. Satheeh
    Joseph, Almaria
    Joseph, Greeshma
    Soney, Ann Mary
    2014 ANNUAL INTERNATIONAL CONFERENCE ON EMERGING RESEARCH AREAS: MAGNETICS, MACHINES AND DRIVES (AICERA/ICMMD), 2014,
  • [32] AI planning-based approach of attack graph generation
    Chen, Feng
    Su, Jin-Shu
    Han, Wen-Bao
    Jiefangjun Ligong Daxue Xuebao/Journal of PLA University of Science and Technology (Natural Science Edition), 2008, 9 (05): : 460 - 465
  • [33] Design Procedure of Knowledge Base for Practical Attack Graph Generation
    Inokuchi, Masaki
    Ohta, Yoshinobu
    Kinoshita, Shunichi
    Yagyu, Tomohiko
    Stan, Orly
    Bitton, Ron
    Elovici, Yuval
    Shabtai, Asaf
    PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19), 2019, : 594 - 601
  • [34] Research on Automatic Generation and Analysis Technology of Network Attack Graph
    Hu, Wenhui
    Zhang, Long
    Liu, Xueyang
    Huang, Yu
    Zhang, Minghui
    Xing, Liang
    2020 IEEE 6TH INT CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / 6TH IEEE INT CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) / 5TH IEEE INT CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2020, : 133 - 139
  • [35] An atomic-domains-based approach for attack graph generation
    Chen, Fangfang
    Wang, Chunlu
    Tian, Zhihong
    Jin, Shuyuan
    Zhang, Tianle
    World Academy of Science, Engineering and Technology, 2009, 32 : 775 - 781
  • [36] MAGD: Minimal Attack Graph Generation Dynamically in Cyber Security
    Mohammadzad, Maryam
    Karimpour, Jaber
    Mahan, Farnaz
    COMPUTER NETWORKS, 2023, 236
  • [37] Attack Graph Generation Method Based on Privilege Escalation Matrix
    Qin H.
    Wang J.-L.
    Peng X.-Y.
    Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2019, 39 (01): : 101 - 105
  • [38] An Attack Graph Generation Method Based on Heuristic Searching Strategy
    Wang, Shuo
    Tang, Guangming
    Kou, Guang
    Chao, Yong
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 1180 - 1185
  • [39] Attack Hypotheses Generation Based on Threat Intelligence Knowledge Graph
    Kaiser, Florian Klaus
    Dardik, Uriel
    Elitzur, Aviad
    Zilberman, Polina
    Daniel, Nir
    Wiens, Marcus
    Schultmann, Frank
    Elovici, Yuval
    Puzis, Rami
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (06) : 4793 - 4809
  • [40] SCADA Attack Modeling Using Bond Graph
    Zerdazi, Imene
    Fezari, Mohamed
    2019 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES FOR DISASTER MANAGEMENT (ICT-DM 2019), 2019,