Strategies for Practical Hybrid Attack Graph Generation and Analysis
نویسندگان
چکیده
As an analytical tool in cyber-security, attack graph (AG) is capable of discovering multi-stage vectors on target computer networks. Cyber-physical systems (CPSs) comprise a special type network that not only contains computing devices but also integrates components operate the continuous domain, such as sensors and actuators. Using AGs CPSs requires system models exploit patterns capture both token- real-valued information. In this article, we describe hybrid AG model for security analysis Specifically, focus two issues related to applying practice: efficient generation techniques information extraction from them. To address first issue, present accelerated generator employs parallel programming high performance (HPC). We conduct tests CPU GPU platforms characterize efficiency our algorithms. second introduce regimen based centrality apply it generated CPS discover effective vulnerability remediation solutions.
منابع مشابه
Attack Graph Analysis for Network Anti-Forensics
The development of technology in computer networks has boosted the percentage of cyber-attacks today. Hackers are now able to penetrate even the strongest IDS and firewalls. With the help of anti-forensic techniques, attackers defend themselves, from being tracked by destroying and distorting evidences. To detect and prevent network attacks, the main modus of operandi in network forensics is th...
متن کاملAn Atomic-Domains-Based Approach for Attack Graph Generation
Attack graph is an integral part of modeling the overview of network security. System administrators use attack graphs to determine how vulnerable their systems are and to determine what security measures to deploy to defend their systems. Previous methods on AGG(attack graphs generation) are aiming at the whole network, which makes the process of AGG complex and non-scalable. In this paper, we...
متن کاملParametric Attack Graph Construction and Analysis⋆
We present the first steps towards an implementation of attack graph construction and analysis technique based on inference rules. In our model, XML credentials describe basic attacks to the system, then inference rules allow composition of new attacks. We aim at modifying previously developed algorithm for the analysis of transitive trust models to the analysis of attack graphs. Important pecu...
متن کاملA practical algorithm for [r, s, t]-coloring of graph
Coloring graphs is one of important and frequently used topics in diverse sciences. In the majority of the articles, it is intended to find a proper bound for vertex coloring, edge coloring or total coloring in the graph. Although it is important to find a proper algorithm for graph coloring, it is hard and time-consuming too. In this paper, a new algorithm for vertex coloring, edge coloring an...
متن کاملAutomated Generation and Analysis of Attack Graphs
An integral part of modeling the global view of network security is constructing attack graphs. In practice, attack graphs are produced manually by Red Teams. Construction by hand, however, is tedious, error-prone, and impractical for attack graphs larger than a hundred nodes. In this paper we present an automated technique for generating and analyzing attack graphs. We base our technique on sy...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Digital threats
سال: 2022
ISSN: ['2692-1626', '2576-5337']
DOI: https://doi.org/10.1145/3491257