Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks

被引:20
|
作者
Stan, Orly [1 ]
Bitton, Ron [1 ]
Ezrets, Michal [1 ]
Dadon, Moran [1 ]
Inokuchi, Masaki [2 ]
Ohta, Yoshinobu [2 ]
Yagyu, Tomohiko [2 ]
Elovici, Yuval [1 ]
Shabtai, Asaf [1 ]
机构
[1] Ben Gurion Univ Negev, Dept Software & Informat Syst Engn, IL-8410501 Beer Sheva, Israel
[2] NEC Corp Ltd, Secur Res Labs, Tokyo 1088001, Japan
关键词
Protocols; Tools; Risk management; Software; Security; Databases; Computer architecture; Attack graph; MulVAL; network protocols; network attacks;
D O I
10.1109/TDSC.2020.3041999
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
An attack graph is a method used to enumerate the possible paths that an attacker can take in the organizational network. MulVAL is a known open-source framework used to automatically generate attack graphs. MulVAL's default modeling has two main shortcomings. First, it lacks the ability to represent network protocol vulnerabilities, and thus it cannot be used to model common network attacks, such as ARP poisoning. Second, it does not support advanced types of communication, such as wireless and bus communication, and thus it cannot be used to model cyber-attacks on networks that include IoT devices or industrial components. In this article, we present an extended network security model for MulVAL that: (1) considers the physical network topology, (2) supports short-range communication protocols, (3) models vulnerabilities in the design of network protocols, and (4) models specific industrial communication architectures. Using the proposed extensions, we were able to model multiple attack techniques including: spoofing, man-in-the-middle, and denial of service attacks, as well as attacks on advanced types of communication. We demonstrate the proposed model in a testbed which implements a simplified network architecture comprised of both IT and industrial components.
引用
收藏
页码:1936 / 1954
页数:19
相关论文
共 50 条
  • [21] Cooperative Systems in Presence of Cyber-Attacks: A Unified Framework for Resilient Control and Attack Identification
    Gusrialdi, Azwirman
    Qu, Zhihua
    [J]. 2022 AMERICAN CONTROL CONFERENCE, ACC, 2022, : 330 - 335
  • [22] Grouping and Determining Perceived Severity of Cyber-Attack Consequences: Gaining Information Needed to Sonify Cyber-Attacks
    Keith S. Jones
    Natalie R. Lodinger
    Benjamin P. Widlus
    Akbar Siami Namin
    Emily Maw
    Miriam Armstrong
    [J]. Journal on Multimodal User Interfaces, 2022, 16 : 399 - 412
  • [23] Grouping and Determining Perceived Severity of Cyber-Attack Consequences: Gaining Information Needed to Sonify Cyber-Attacks
    Jones, Keith S.
    Lodinger, Natalie R.
    Widlus, Benjamin P.
    Namin, Akbar Siami
    Maw, Emily
    Armstrong, Miriam
    [J]. JOURNAL ON MULTIMODAL USER INTERFACES, 2022, 16 (04) : 399 - 412
  • [24] Secure SCADA Communication Network for Detecting and Preventing Cyber-Attacks on Power Systems
    Chalamasetty, Goutham K.
    Mandal, Paras
    Tseng, Tzu-Liang
    [J]. 2016 CLEMSON UNIVERSITY POWER SYSTEMS CONFERENCE (PSC), 2016,
  • [25] Asynchronous attack tolerant control for Markov jump cyber-physical systems under hybrid cyber-attacks
    Wang, Lanxin
    Long, Yue
    Li, Tieshan
    Yang, Hanqing
    Chen, C. L. Philip
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2024, 470
  • [26] Detection of cyber-attacks on Wi-Fi networks by classification of spectral data
    Villain, Jonathan
    Deniau, Virginie
    Fleury, Anthony
    Gransart, Christophe
    Simon, Eric Pierre
    [J]. 2020 XXXIIIRD GENERAL ASSEMBLY AND SCIENTIFIC SYMPOSIUM OF THE INTERNATIONAL UNION OF RADIO SCIENCE, 2020,
  • [27] Development of Deep Learning Model to Detect Cyber-Attacks within Vehicular Networks
    Sandakelum, R. D.
    Liyanage, V. H.
    Chandrasekara, P. M.
    Logeeshan, V
    Kumarawadu, S.
    Wanigasekara, C.
    [J]. 2024 IEEE 5TH ANNUAL WORLD AI IOT CONGRESS, AIIOT 2024, 2024, : 0569 - 0574
  • [28] Artificial Intelligence techniques to mitigate cyber-attacks within vehicular networks: Survey?
    Haddaji, Achref
    Ayed, Samiha
    Fourati, Lamia Chaari
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2022, 104
  • [29] Evaluation of Naive Bayesian Algorithms for Cyber-Attacks Detection in Wireless Sensor Networks
    Ismail, Shereen
    Reza, Hassan
    [J]. 2022 IEEE WORLD AI IOT CONGRESS (AIIOT), 2022, : 283 - 289
  • [30] A Chaotic Complexity Measure for Cognitive Machine Classification of Cyber-Attacks on Computer Networks
    Khan, Muhammad Salman
    Ferens, Ken
    Kinsner, Witold
    [J]. INTERNATIONAL JOURNAL OF COGNITIVE INFORMATICS AND NATURAL INTELLIGENCE, 2014, 8 (03) : 45 - 69