Attack Path Detection for IIoT Enabled Cyber Physical Systems: Revisited

被引:14
|
作者
Arat, Ferhat [1 ]
Akleylek, Sedat [2 ,3 ,4 ]
机构
[1] Samsun Univ, Dept Software Engn, Samsun, Turkiye
[2] Ondokuz Mayis Univ, Dept Comp Engn, Samsun, Turkiye
[3] Ondokuz Mayis Univ, Cyber Secur & Informat Technol Res & Dev Ctr, Samsun, Turkiye
[4] Univ Tartu, Tartu, Estonia
关键词
Industrial IoT security; Vulnerability and risk assessment; Attack graph; Attack path; Path filtering; Cyber attacks; IOT; MANAGEMENT;
D O I
10.1016/j.cose.2023.103174
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a generic vulnerability and risk assessment method for IIoT-enabled critical sys-tems. We focus on reducing risk factors and vulnerable structures in order to provide security issues for the IIoT and enabled complex systems. In addition to the existing risk assessment and related methods, we represent the IIoT-enabled network topology as a directed graph, and we develop an attack tree-based approach using graph theory. We assume that each device is a potential critical node due to the existing vulnerabilities, which are defined in the National Vulnerability Database (NVD), and we establish directed relations between nodes, considering cyber and physical interactions. We improve existing attack path-identifying methods using the Depth First Search (DFS) algorithm to find all the paths from the source to the target nodes. In the generated topology, each node has the pre-assigned Common Vulnerability Scoring System (CVSS) scores acting as a weight. We also implement the Floyd-Warshall algorithm to identify path risk levels. Finally, we assess the identified vulnerable paths from varying source and target pairs via path and node-reducing procedures, considering risk thresholds. We perform our simulation on a custom Python simulator, considering the transportation and supply sectors. We compare our results with the previous ones. Simulation results show that our proposed methods and procedures outperform existing risk assessment and filtering methods in terms of running time and attack path identification and filtering. (c) 2023 Elsevier Ltd. All rights reserved.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] Actuator attack detection and power balance for cyber physical power systems
    Li, Jian
    Li, Hongliang
    Wang, Handong
    Su, Qingyu
    IET CONTROL THEORY AND APPLICATIONS, 2023, 17 (06): : 776 - 787
  • [22] Brief Survey on Attack Detection Methods for Cyber-Physical Systems
    Tan, Sen
    Guerrero, Josep M.
    Xie, Peilin
    Han, Renke
    Vasquez, Juan C.
    IEEE SYSTEMS JOURNAL, 2020, 14 (04): : 5329 - 5339
  • [23] Replay Attack Detection for Cyber-Physical Systems with Sensitive States
    Chen, Tao
    Wang, Lei
    Ren, Xiaoqiang
    Liu, Zhitao
    Su, Hongye
    2023 62ND IEEE CONFERENCE ON DECISION AND CONTROL, CDC, 2023, : 2821 - 2826
  • [24] SADCPS: Semi-supervised Attack Detection in Cyber Physical Systems
    Khalili, Abdullah
    Sami, Ashkan
    2017 18TH CSI INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND SOFTWARE ENGINEERING CONFERENCE (CSSE), 2017, : 12 - 17
  • [25] Recursive Filtering of Distributed Cyber-Physical Systems With Attack Detection
    Ding, Derui
    Han, Qing-Long
    Wang, Zidong
    Ge, Xiaohua
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (10): : 6466 - 6476
  • [26] Study on attack paths of cyber attack in cyber-physical power systems
    Chen, Lei
    Yue, Dong
    Dou, Chunxia
    Chen, Jianbo
    Cheng, Zihao
    IET GENERATION TRANSMISSION & DISTRIBUTION, 2020, 14 (12) : 2352 - 2360
  • [27] Adaptive and Lightweight Cyber-Attack Detection in Modern Automotive Cyber-Physical Systems
    Baek, Youngmi
    Park, Seo-Hee
    2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
  • [28] Swarm intelligence for IoT attack detection in fog-enabled cyber-physical system*
    Alohali, Manal Abdullah
    Elsadig, Muna
    Al-Wesabi, Fahd N.
    Al Duhayyim, Mesfer
    Hilal, Anwer Mustafa
    Motwakel, Abdelwahed
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 108
  • [29] Application of Artificial Neural Network for Cyber-Attack Detection in Water Distribution Systems as Cyber Physical Systems
    Min, Kyoung Won
    Choi, Young Hwan
    Al-Shamiri, Abobakr Khalil
    Kim, Joong Hoon
    ADVANCES IN HARMONY SEARCH, SOFT COMPUTING AND APPLICATIONS, 2020, 1063 : 82 - 88
  • [30] A Survey of Cyber Attack Detection Systems
    Singh, Shailendra
    Silakari, Sanjay
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (05): : 1 - 10