Strategies for Practical Hybrid Attack Graph Generation and Analysis

نویسندگان

چکیده

As an analytical tool in cyber-security, attack graph (AG) is capable of discovering multi-stage vectors on target computer networks. Cyber-physical systems (CPSs) comprise a special type network that not only contains computing devices but also integrates components operate the continuous domain, such as sensors and actuators. Using AGs CPSs requires system models exploit patterns capture both token- real-valued information. In this article, we describe hybrid AG model for security analysis Specifically, focus two issues related to applying practice: efficient generation techniques information extraction from them. To address first issue, present accelerated generator employs parallel programming high performance (HPC). We conduct tests CPU GPU platforms characterize efficiency our algorithms. second introduce regimen based centrality apply it generated CPS discover effective vulnerability remediation solutions.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attack Graph Analysis for Network Anti-Forensics

The development of technology in computer networks has boosted the percentage of cyber-attacks today. Hackers are now able to penetrate even the strongest IDS and firewalls. With the help of anti-forensic techniques, attackers defend themselves, from being tracked by destroying and distorting evidences. To detect and prevent network attacks, the main modus of operandi in network forensics is th...

متن کامل

An Atomic-Domains-Based Approach for Attack Graph Generation

Attack graph is an integral part of modeling the overview of network security. System administrators use attack graphs to determine how vulnerable their systems are and to determine what security measures to deploy to defend their systems. Previous methods on AGG(attack graphs generation) are aiming at the whole network, which makes the process of AGG complex and non-scalable. In this paper, we...

متن کامل

Parametric Attack Graph Construction and Analysis⋆

We present the first steps towards an implementation of attack graph construction and analysis technique based on inference rules. In our model, XML credentials describe basic attacks to the system, then inference rules allow composition of new attacks. We aim at modifying previously developed algorithm for the analysis of transitive trust models to the analysis of attack graphs. Important pecu...

متن کامل

A practical algorithm for [r, s, t]-coloring of graph

Coloring graphs is one of important and frequently used topics in diverse sciences. In the majority of the articles, it is intended to find a proper bound for vertex coloring, edge coloring or total coloring in the graph. Although it is important to find a proper algorithm for graph coloring, it is hard and time-consuming too. In this paper, a new algorithm for vertex coloring, edge coloring an...

متن کامل

Automated Generation and Analysis of Attack Graphs

An integral part of modeling the global view of network security is constructing attack graphs. In practice, attack graphs are produced manually by Red Teams. Construction by hand, however, is tedious, error-prone, and impractical for attack graphs larger than a hundred nodes. In this paper we present an automated technique for generating and analyzing attack graphs. We base our technique on sy...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Digital threats

سال: 2022

ISSN: ['2692-1626', '2576-5337']

DOI: https://doi.org/10.1145/3491257