Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks

被引:20
|
作者
Stan, Orly [1 ]
Bitton, Ron [1 ]
Ezrets, Michal [1 ]
Dadon, Moran [1 ]
Inokuchi, Masaki [2 ]
Ohta, Yoshinobu [2 ]
Yagyu, Tomohiko [2 ]
Elovici, Yuval [1 ]
Shabtai, Asaf [1 ]
机构
[1] Ben Gurion Univ Negev, Dept Software & Informat Syst Engn, IL-8410501 Beer Sheva, Israel
[2] NEC Corp Ltd, Secur Res Labs, Tokyo 1088001, Japan
关键词
Protocols; Tools; Risk management; Software; Security; Databases; Computer architecture; Attack graph; MulVAL; network protocols; network attacks;
D O I
10.1109/TDSC.2020.3041999
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
An attack graph is a method used to enumerate the possible paths that an attacker can take in the organizational network. MulVAL is a known open-source framework used to automatically generate attack graphs. MulVAL's default modeling has two main shortcomings. First, it lacks the ability to represent network protocol vulnerabilities, and thus it cannot be used to model common network attacks, such as ARP poisoning. Second, it does not support advanced types of communication, such as wireless and bus communication, and thus it cannot be used to model cyber-attacks on networks that include IoT devices or industrial components. In this article, we present an extended network security model for MulVAL that: (1) considers the physical network topology, (2) supports short-range communication protocols, (3) models vulnerabilities in the design of network protocols, and (4) models specific industrial communication architectures. Using the proposed extensions, we were able to model multiple attack techniques including: spoofing, man-in-the-middle, and denial of service attacks, as well as attacks on advanced types of communication. We demonstrate the proposed model in a testbed which implements a simplified network architecture comprised of both IT and industrial components.
引用
收藏
页码:1936 / 1954
页数:19
相关论文
共 50 条
  • [1] Analysis of Cyber-Attacks on IEC 61850 Networks
    Elgargouri, Ahmed
    Elmusrati, Mohammed
    [J]. 2017 11TH IEEE INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT 2017), 2017, : 252 - 255
  • [2] A System for Detecting Targeted Cyber-Attacks Using Attack Patterns
    Herwono, Ian
    El-Moussa, Fadi Ali
    [J]. INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, 867 : 20 - 34
  • [3] A Control and Attack Detection Scheme for Fuzzy Systems against Cyber-attacks
    Zhang, Haili
    Li, Linlin
    Qiao, Liang
    [J]. 2023 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, FUZZ, 2023,
  • [4] Deep-Learning Based Detection for Cyber-Attacks in IoT Networks: A Distributed Attack Detection Framework
    Olivia Jullian
    Beatriz Otero
    Eva Rodriguez
    Norma Gutierrez
    Héctor Antona
    Ramon Canal
    [J]. Journal of Network and Systems Management, 2023, 31
  • [5] Deep-Learning Based Detection for Cyber-Attacks in IoT Networks: A Distributed Attack Detection Framework
    Jullian, Olivia
    Otero, Beatriz
    Rodriguez, Eva
    Gutierrez, Norma
    Antona, Hector
    Canal, Ramon
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2023, 31 (02)
  • [6] Resilient average consensus on general directed graphs in presence of cyber-attacks
    Sadabadi, Mahdieh S.
    Gusrialdi, Azwirman
    [J]. EUROPEAN JOURNAL OF CONTROL, 2022, 68
  • [7] Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges
    Achaal, Batoul
    Adda, Mehdi
    Berger, Maxime
    Ibrahim, Hussein
    Awde, Ali
    [J]. CYBERSECURITY, 2024, 7 (01):
  • [8] Research on secure control and communication for cyber-physical systems under cyber-attacks
    Li, Wei
    Shi, Yahong
    Li, Yajie
    [J]. TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL, 2019, 41 (12) : 3421 - 3437
  • [9] A Probabilistic Risk Mitigation Model for Cyber-Attacks to PMU Networks
    Mousavian, Seyedamirabbas
    Valenzuela, Jorge
    Wang, Jianhui
    [J]. IEEE TRANSACTIONS ON POWER SYSTEMS, 2015, 30 (01) : 156 - 165
  • [10] Improving Attack Trees Analysis using Petri Net modeling of Cyber-Attacks
    Pasandideh, Shabnam
    Gomes, Luis
    Malo, Pedro
    [J]. 2019 IEEE 28TH INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS (ISIE), 2019, : 1644 - 1649