Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3064814.3064826acmotherconferencesArticle/Chapter ViewAbstractPublication PagescisrcConference Proceedingsconference-collections
short-paper

Introducing priority into hybrid attack graphs

Published: 04 April 2017 Publication History

Abstract

With the cybersecurity of critical infrastructures becoming increasingly significant, methods for testing the security of cyber-physical systems are still under development. One promising method is hybrid attack graph (HAG) analysis. HAGs extend attack graphs to model the hybrid behavior of cyber-physical systems (CPSs). Generating these graphs is computationally intensive, as the system state space is enormous, yet many states may not be physically realizable. This paper introduces the concept of priorities to hybrid attack graphs, which is designed to reduce state explosion while preserving all relevant attack paths. While designed for hybrid attack graphs, priorities can be applied to traditional attack graphs as well.

References

[1]
X. Ou, W. F. Boyer and M. A. McQueen, "A Scalable Approach to Attack Graph Generation," in Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, Virginia, 2006.
[2]
L. P. R. and K. W. Ingols, " An Annotated Review of Past Papers on Attack Graphs," Massachusetts Institute of Technology Lexington Lincon Lab, 2005.
[3]
S. Zonouz, K. M. Rogers, R. Berthier, R. B. Bobba, W. H. Sanders and T. J. Overbye, "SCPSE: Security-Oriented Cyber-Physical State Estimation for Power Grid Critical Infrastructures," IEEE Transactions on Smart Grid, vol. 3, no. 4, pp. 1790--1799, 2012.
[4]
P. Ammann, D. Wijesekera and S. Kaushik, "Scalable, Graph-Based Network Vulnerability Analysis," in Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington D.C., 2002.
[5]
V. Rafe, M. Rahmani and K. Rashidi, "A Survey on Coping with the State Space Explosion Problem in Model Checking," International Research Journal of Applied and Basic Sciences, vol. 4, no. 6, pp. 1379--1384, 2013.
[6]
K. Cook, T. Shaw, P. Hawrylak and J. Hale, "Scalable Attack Graph Generation," in Proceedings of the 11th Annual Cyber and Information Security Research Conference, Oak Ridge, Tennessee, 2016.
[7]
L. Wang, T. Islam, T. Long, A. Singhal and S. Jajodia, "An Attack Graph-Based Probabilistic Security Metric," in IFIP Annual Conference on Data and Applications Security and Privacy, Berlin, Heidelberg, 2008.
[8]
Forum of Incident Response and Security Teams, "CVSS 3.0 Specification Document," {Online}.
[9]
G. Louthan, M. Haney, P. Hardwicke, P. Hawrylak and J. Hale, "Hybrid Extensions for Stateful Attack Graphs," in Proceedings of the 9th Annual Cyber and Information Security Research Conference, Oak Ridge, Tennessee, 2014.
[10]
G. Louthan, Hybird Attack Graphs for Modelling Cyber-Physical Systems, Tulsa, OK, 2011.

Cited By

View all
  • (2022)A Hybrid Attack Graph Analysis Method based on Model Checking2022 Tenth International Conference on Advanced Cloud and Big Data (CBD)10.1109/CBD58033.2022.00053(258-263)Online publication date: Nov-2022
  • (2019)Automatic Hybrid Attack Graph (AHAG) Generation for Complex Engineering SystemsProcesses10.3390/pr71107877:11(787)Online publication date: 1-Nov-2019
  • (2019)Automatic Identification of Critical Digital Assets2019 2nd International Conference on Data Intelligence and Security (ICDIS)10.1109/ICDIS.2019.00040(219-224)Online publication date: Jun-2019
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
CISRC '17: Proceedings of the 12th Annual Conference on Cyber and Information Security Research
April 2017
106 pages
ISBN:9781450348553
DOI:10.1145/3064814
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 April 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cyber-physical network security
  2. hybrid attack graph

Qualifiers

  • Short-paper

Conference

CISRC'17

Acceptance Rates

CISRC '17 Paper Acceptance Rate 8 of 22 submissions, 36%;
Overall Acceptance Rate 69 of 136 submissions, 51%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)14
  • Downloads (Last 6 weeks)2
Reflects downloads up to 03 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2022)A Hybrid Attack Graph Analysis Method based on Model Checking2022 Tenth International Conference on Advanced Cloud and Big Data (CBD)10.1109/CBD58033.2022.00053(258-263)Online publication date: Nov-2022
  • (2019)Automatic Hybrid Attack Graph (AHAG) Generation for Complex Engineering SystemsProcesses10.3390/pr71107877:11(787)Online publication date: 1-Nov-2019
  • (2019)Automatic Identification of Critical Digital Assets2019 2nd International Conference on Data Intelligence and Security (ICDIS)10.1109/ICDIS.2019.00040(219-224)Online publication date: Jun-2019
  • (2018)Methodology to Estimate Attack Graph System State from a Simulation of a Nuclear Research Reactor2018 Resilience Week (RWS)10.1109/RWEEK.2018.8473465(84-87)Online publication date: Aug-2018
  • (2018)Automatic Generation of Attack Scripts from Attack Graphs2018 1st International Conference on Data Intelligence and Security (ICDIS)10.1109/ICDIS.2018.00050(267-274)Online publication date: Apr-2018
  • (2017)Verifying attack graphs through simulation2017 Resilience Week (RWS)10.1109/RWEEK.2017.8088649(64-67)Online publication date: Sep-2017

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media