Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3064814.3064826acmotherconferencesArticle/Chapter ViewAbstractPublication PagescisrcConference Proceedingsconference-collections
short-paper

Introducing priority into hybrid attack graphs

Published: 04 April 2017 Publication History
  • Get Citation Alerts
  • Abstract

    With the cybersecurity of critical infrastructures becoming increasingly significant, methods for testing the security of cyber-physical systems are still under development. One promising method is hybrid attack graph (HAG) analysis. HAGs extend attack graphs to model the hybrid behavior of cyber-physical systems (CPSs). Generating these graphs is computationally intensive, as the system state space is enormous, yet many states may not be physically realizable. This paper introduces the concept of priorities to hybrid attack graphs, which is designed to reduce state explosion while preserving all relevant attack paths. While designed for hybrid attack graphs, priorities can be applied to traditional attack graphs as well.

    References

    [1]
    X. Ou, W. F. Boyer and M. A. McQueen, "A Scalable Approach to Attack Graph Generation," in Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, Virginia, 2006.
    [2]
    L. P. R. and K. W. Ingols, " An Annotated Review of Past Papers on Attack Graphs," Massachusetts Institute of Technology Lexington Lincon Lab, 2005.
    [3]
    S. Zonouz, K. M. Rogers, R. Berthier, R. B. Bobba, W. H. Sanders and T. J. Overbye, "SCPSE: Security-Oriented Cyber-Physical State Estimation for Power Grid Critical Infrastructures," IEEE Transactions on Smart Grid, vol. 3, no. 4, pp. 1790--1799, 2012.
    [4]
    P. Ammann, D. Wijesekera and S. Kaushik, "Scalable, Graph-Based Network Vulnerability Analysis," in Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington D.C., 2002.
    [5]
    V. Rafe, M. Rahmani and K. Rashidi, "A Survey on Coping with the State Space Explosion Problem in Model Checking," International Research Journal of Applied and Basic Sciences, vol. 4, no. 6, pp. 1379--1384, 2013.
    [6]
    K. Cook, T. Shaw, P. Hawrylak and J. Hale, "Scalable Attack Graph Generation," in Proceedings of the 11th Annual Cyber and Information Security Research Conference, Oak Ridge, Tennessee, 2016.
    [7]
    L. Wang, T. Islam, T. Long, A. Singhal and S. Jajodia, "An Attack Graph-Based Probabilistic Security Metric," in IFIP Annual Conference on Data and Applications Security and Privacy, Berlin, Heidelberg, 2008.
    [8]
    Forum of Incident Response and Security Teams, "CVSS 3.0 Specification Document," {Online}.
    [9]
    G. Louthan, M. Haney, P. Hardwicke, P. Hawrylak and J. Hale, "Hybrid Extensions for Stateful Attack Graphs," in Proceedings of the 9th Annual Cyber and Information Security Research Conference, Oak Ridge, Tennessee, 2014.
    [10]
    G. Louthan, Hybird Attack Graphs for Modelling Cyber-Physical Systems, Tulsa, OK, 2011.

    Cited By

    View all
    • (2022)A Hybrid Attack Graph Analysis Method based on Model Checking2022 Tenth International Conference on Advanced Cloud and Big Data (CBD)10.1109/CBD58033.2022.00053(258-263)Online publication date: Nov-2022
    • (2019)Automatic Hybrid Attack Graph (AHAG) Generation for Complex Engineering SystemsProcesses10.3390/pr71107877:11(787)Online publication date: 1-Nov-2019
    • (2019)Automatic Identification of Critical Digital Assets2019 2nd International Conference on Data Intelligence and Security (ICDIS)10.1109/ICDIS.2019.00040(219-224)Online publication date: Jun-2019
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    CISRC '17: Proceedings of the 12th Annual Conference on Cyber and Information Security Research
    April 2017
    106 pages
    ISBN:9781450348553
    DOI:10.1145/3064814
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 04 April 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. cyber-physical network security
    2. hybrid attack graph

    Qualifiers

    • Short-paper

    Conference

    CISRC'17

    Acceptance Rates

    CISRC '17 Paper Acceptance Rate 8 of 22 submissions, 36%;
    Overall Acceptance Rate 69 of 136 submissions, 51%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)16
    • Downloads (Last 6 weeks)3
    Reflects downloads up to

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)A Hybrid Attack Graph Analysis Method based on Model Checking2022 Tenth International Conference on Advanced Cloud and Big Data (CBD)10.1109/CBD58033.2022.00053(258-263)Online publication date: Nov-2022
    • (2019)Automatic Hybrid Attack Graph (AHAG) Generation for Complex Engineering SystemsProcesses10.3390/pr71107877:11(787)Online publication date: 1-Nov-2019
    • (2019)Automatic Identification of Critical Digital Assets2019 2nd International Conference on Data Intelligence and Security (ICDIS)10.1109/ICDIS.2019.00040(219-224)Online publication date: Jun-2019
    • (2018)Methodology to Estimate Attack Graph System State from a Simulation of a Nuclear Research Reactor2018 Resilience Week (RWS)10.1109/RWEEK.2018.8473465(84-87)Online publication date: Aug-2018
    • (2018)Automatic Generation of Attack Scripts from Attack Graphs2018 1st International Conference on Data Intelligence and Security (ICDIS)10.1109/ICDIS.2018.00050(267-274)Online publication date: Apr-2018
    • (2017)Verifying attack graphs through simulation2017 Resilience Week (RWS)10.1109/RWEEK.2017.8088649(64-67)Online publication date: Sep-2017

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media