State Space Explosion Mitigation for Large-Scale Attack and Compliance Graphs Using Synchronous Exploit Firing

نویسندگان

چکیده

Attack and compliance graphs are useful tools for cybersecurity regulatory or analysis. Thgraphs represent the state of a system set systems, can be used to identify all current future ways systems compromised at risk violating mandates. However, due their exhaustiveness thorough permutation checking, these suffer from space explosion - rapidly increase in total number states, likewise, generation time also increases. This turn slows analysis process. work introduces mitigation technique called synchronous firing, where graph users designers prevent infeasible states by firing exploits simultaneously through joining inseparable features like time. feature does not invalidate integrity resulting attack altering checking process, but rather jointly fires defined features.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cooperative Response Strategies for Large Scale Attack Mitigation

We introduce models for cooperativemitigating response strategies to suppress large scale Internet worm attack. In our models, cooperating members communicate with others using a “friend protocol” that spreads attack reports to potentially vulnerable uninfected sites. We use mathematical models for the simplest strategies and a simulation for more complex models of mitigation. We investigate th...

متن کامل

An Effective Attack-Resilient Kalman Filter-Based Approach for Dynamic State Estimation of Synchronous Machine

Kalman filtering has been widely considered for dynamic state estimation in smart grids. Despite its unique merits, the Kalman Filter (KF)-based dynamic state estimation can be undesirably influenced by cyber adversarial attacks that can potentially be launched against the communication links in the Cyber-Physical System (CPS). To enhance the security of KF-based state estimation, in this paper...

متن کامل

Fighting State Space Explosion: Review and Evaluation

In order to apply formal methods in practice, the practitioner has to comprehend a vast amount of research literature and realistically evaluate practical merits of different approaches. In this paper we focus on explicit finite state model checking and study this area from practitioner’s point of view. We provide a systematic overview of techniques for fighting state space explosion and we ana...

متن کامل

Using Binary Particle Swarm Optimization for Minimization Analysis of Large-Scale Network Attack Graphs

The aim of the minimization analysis of network attack graphs (NAGs) is to nd a minimum critical set of exploits so that by preventing them an intruder cannot reach his goal using any attack scenario. This problem is, in fact, a constrained optimization problem. In this paper, a binary particle swarm optimization algorithm, called SwarmNAG, is presented for the minimization analysis of large-sc...

متن کامل

Online State Space Model Parameter Estimation in Synchronous Machines

The purpose of this paper is to present a new approach based on the Least Squares Error method for estimating the unknown parameters of the nonlinear 3rd order synchronous generator model. The proposed method uses the mathematical relationships between the machine parameters and on-line input/output measurements to estimate the parameters of the nonlinear state space model. The field voltage is...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE open journal of the Computer Society

سال: 2023

ISSN: ['2644-1268']

DOI: https://doi.org/10.1109/ojcs.2023.3276370