PDDLAssistant: A tool for assisting construction and maintenance of attack graphs using PDDL

نویسندگان

  • Kushagra Tiwary
  • Sachini Weerawardhana
  • Indrajit Ray
  • Adele Howe
چکیده

Attack graph is a well-known representation for computer security vulnerabilities, which captures how malicious activities can lead to a system compromise. A key weakness in the attack graph representation is that it scales poorly, particularly in large domains where the graph needs to enumerate both user and system interactions. One way to address this problem is to translate the attack graph model into a Planner Domain Definition Language (PDDL) representation, which can then be used by an AI planner to derive attack paths. Building the PDDL representation for large attack graphs is an incremental process, which demands a lot of time and effort mainly due to the lack of automated tools to assist developers in debugging and maintenance. In this paper, we introduce a methodology and a tool, PDDLAssistant, designed to promote incremental development of PDDL representations for cyber-security domain. PDDLAssistant attempts to reconcile different versions of PDDL representations by generating explanations for changes in plans resulting from running the representation against an AI planner. In addition, PDDLAssistant constructs abstract syntax trees (AST) for the PDDL representation, which may be used to visualize the representation itself and planning problems. We evaluate the usability of PDDLAssistant against our attack graph, PAG (Personalized Attack Graph). CCS CONCEPTS • Security and privacy → Formal security models; Logic and verification; Vulnerability management; • Computing methodologies→ Planning and scheduling; Planning for deterministic actions;Modelingmethodologies; Knowledge representation and reasoning; Model verification and validation;

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attack Planning in the Real World

Assessing network security is a complex and difficult task. Attack graphs have been proposed as a tool to help network administrators understand the potential weaknesses of their networks. However, a problem has not yet been addressed by previous work on this subject; namely, how to actually execute and validate the attack paths resulting from the analysis of the attack graph. In this paper we ...

متن کامل

A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs

To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper, we consider cost-sensitive attack graphs (CAGs) for network vulnerability analysis. In these attack graphs, a weight is assigned to each countermeasure to represent the cost of its implementation. There may be multiple countermeasures with different weights for preventing a single exploit. Also,...

متن کامل

An Ant Colony Optimization Algorithm for Network Vulnerability Analysis

Intruders often combine exploits against multiple vulnerabilities in order to break into the system. Each attack scenario is a sequence of exploits launched by an intruder that leads to an undesirable state such as access to a database, service disruption, etc. The collection of possible attack scenarios in a computer network can be represented by a directed graph, called network attack gra...

متن کامل

طراحی بهینه‌ موج‌شکن مرکب کیسونی تحت اثر امواج غیرخطی

Breakwaters are the important and the costly ones of the marine structures. Composite breakwater is one of the common types in the world. Because of the progress in marine industry in Iran in recent years, designers have noticed this structure. Because of the sensitivity of composite breakwater to environmental conditions, also construction costs, difficulty of repair and maintenance and import...

متن کامل

Real-Time Building Information Modeling (BIM) Synchronization Using Radio Frequency Identification Technology and Cloud Computing System

The online observation of a construction site and processes bears significant advantage to all business sector. BIM is the combination of a 3D model of the project and a project-planning program which improves the project planning model by up to 6D (Adding Time, Cost and Material Information dimensions to the model). RFID technology is an appropriate information synchronization tool between the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017