Identifying Interdependencies Using Attack Graph Generation Methods

被引:0
|
作者
Lever, Kirsty E. [1 ]
Kifayat, Kashif [1 ]
Merabti, Madjid [2 ]
机构
[1] Liverpool John Moores Univ, PROTECT Res Ctr Crit Infrastruct Comp Technol & P, Liverpool, Merseyside, England
[2] Univ Sharjah, Sharjah, U Arab Emirates
关键词
Interdependency; Cascading Failures; Attack Graphs; Collaborative Infrastructures; Internet of Things;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information and communication technologies have augmented interoperability and rapidly advanced varying industries, with vast complex interconnected networks being formed in areas such as safety-critical systems, which can be further categorised as critical infrastructures. What also must be considered is the paradigm of the Internet of Things which is rapidly gaining prevalence within the field of wireless communications, being incorporated into areas such as e-health and automation for industrial manufacturing. As critical infrastructures and the Internet of Things begin to integrate into much wider networks, their reliance upon communication assets by third parties to ensure collaboration and control of their systems will significantly increase, along with system complexity and the requirement for improved security metrics. We present a critical analysis of the risk assessment methods developed for generating attack graphs. The failings of these existing schemas include the inability to accurately identify the relationships and interdependencies between the risks and the reduction of attack graph size and generation complexity. Many existing methods also fail due to the heavy reliance upon the input, identification of vulnerabilities, and analysis of results by human intervention. Conveying our work, we outline our approach to modelling interdependencies within large heterogeneous collaborative infrastructures, proposing a distributed schema which utilises network modelling and attack graph generation methods, to provide a means for vulnerabilities, exploits and conditions to be represented within a unified model.
引用
收藏
页码:80 / 85
页数:6
相关论文
共 50 条
  • [41] Identifying missing relationships of CAPEC attack patterns by transformer models and graph structure
    Miyata, Rikuho
    Washizaki, Hironori
    Sumoto, Kensuke
    Yoshioka, Nobukazu
    Fukazawa, Yoshiaki
    Okubo, Takao
    2023 IEEE/ACM 1ST INTERNATIONAL WORKSHOP ON SOFTWARE VULNERABILITY, SVM, 2023, : 14 - 17
  • [42] Computerized generation of motion equations using variational graph-theoretic methods
    Richard, M. J.
    McPhee, J. J.
    Anderson, R. J.
    APPLIED MATHEMATICS AND COMPUTATION, 2007, 192 (01) : 135 - 156
  • [43] Subdomain cluster generation for domain decomposition methods using graph partitioning optimization
    Charmpis, DC
    Papadrakakis, M
    ENGINEERING COMPUTATIONS, 2003, 20 (7-8) : 932 - 963
  • [44] Automatic Discovery of Attack Messages and Pre- and Post-Conditions for Attack Graph Generation
    Carvalho, Marco
    Teng, Choh Man
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 378 - 387
  • [45] Fetal monitoring: identifying the relevant biosignals interdependencies
    Hurezeanu, Bogdan
    Nicolae, Irina-Emilia
    Taralunga, Dragos
    Strungaru, Rodica
    Wolf, Werner
    Gussi, Ilinca
    Ungureanu, Mihaela
    2015 E-HEALTH AND BIOENGINEERING CONFERENCE (EHB), 2015,
  • [46] Positive Energy Districts: Identifying Challenges and Interdependencies
    Krangsas, Savis Gohari
    Steemers, Koen
    Konstantinou, Thaleia
    Soutullo, Silvia
    Liu, Mingming
    Giancola, Emanuela
    Prebreza, Bahri
    Ashrafian, Touraj
    Murauskaite, Lina
    Maas, Nienke
    SUSTAINABILITY, 2021, 13 (19)
  • [47] Identifying, understanding, and analyzing critical infrastructure interdependencies
    Rinaldi, Steven M.
    Peerenboom, James P.
    Kelly, Terrence K.
    IEEE Control Systems Magazine, 2001, 21 (06): : 11 - 25
  • [48] Unemployment, institutions, and interdependencies: identifying successful reforms
    Sachs, Andreas
    JOURNAL OF ECONOMIC POLICY REFORM, 2015, 18 (01) : 34 - 50
  • [49] Identifying, understanding, and analyzing critical infrastructure interdependencies
    Rinaldi, SA
    Peerenboom, JP
    Kelly, TK
    IEEE CONTROL SYSTEMS MAGAZINE, 2001, 21 (06): : 11 - 25
  • [50] A Survey on Deep Graph Generation: Methods and Applications
    Zhu, Yanqiao
    Du, Yuanqi
    Wang, Yinkai
    Xu, Yichen
    Zhang, Jieyu
    Liu, Qiang
    Wu, Shu
    LEARNING ON GRAPHS CONFERENCE, VOL 198, 2022, 198