Attack Path Detection for IIoT Enabled Cyber Physical Systems: Revisited

被引:14
|
作者
Arat, Ferhat [1 ]
Akleylek, Sedat [2 ,3 ,4 ]
机构
[1] Samsun Univ, Dept Software Engn, Samsun, Turkiye
[2] Ondokuz Mayis Univ, Dept Comp Engn, Samsun, Turkiye
[3] Ondokuz Mayis Univ, Cyber Secur & Informat Technol Res & Dev Ctr, Samsun, Turkiye
[4] Univ Tartu, Tartu, Estonia
关键词
Industrial IoT security; Vulnerability and risk assessment; Attack graph; Attack path; Path filtering; Cyber attacks; IOT; MANAGEMENT;
D O I
10.1016/j.cose.2023.103174
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a generic vulnerability and risk assessment method for IIoT-enabled critical sys-tems. We focus on reducing risk factors and vulnerable structures in order to provide security issues for the IIoT and enabled complex systems. In addition to the existing risk assessment and related methods, we represent the IIoT-enabled network topology as a directed graph, and we develop an attack tree-based approach using graph theory. We assume that each device is a potential critical node due to the existing vulnerabilities, which are defined in the National Vulnerability Database (NVD), and we establish directed relations between nodes, considering cyber and physical interactions. We improve existing attack path-identifying methods using the Depth First Search (DFS) algorithm to find all the paths from the source to the target nodes. In the generated topology, each node has the pre-assigned Common Vulnerability Scoring System (CVSS) scores acting as a weight. We also implement the Floyd-Warshall algorithm to identify path risk levels. Finally, we assess the identified vulnerable paths from varying source and target pairs via path and node-reducing procedures, considering risk thresholds. We perform our simulation on a custom Python simulator, considering the transportation and supply sectors. We compare our results with the previous ones. Simulation results show that our proposed methods and procedures outperform existing risk assessment and filtering methods in terms of running time and attack path identification and filtering. (c) 2023 Elsevier Ltd. All rights reserved.
引用
收藏
页数:13
相关论文
共 50 条
  • [31] Anti-Honeypot Enabled Optimal Attack Strategy for Industrial Cyber-Physical Systems
    Li, Beibei
    Xiao, Yue
    Shi, Yaxin
    Kong, Qinglei
    Wu, Yuhao
    Bao, Haiyong
    IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2020, 1 : 250 - 261
  • [32] Attack Detection and Prevention in the Cyber Physical System
    Nutjahan
    Nizam, Farhana
    Chaki, Shudarshon
    Al Mamun, Shamim
    Kaiser, M. Shamim
    2016 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2016,
  • [33] Interpretable Detection of Distribution Shifts in Learning Enabled Cyber-Physical Systems
    Yang, Yahan
    Kaur, Ramneet
    Dutta, Souradeep
    Lee, Insup
    2022 13TH ACM/IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS (ICCPS 2022), 2022, : 225 - 235
  • [34] Detection and Classification of Anomalies in WSN-Enabled Cyber-Physical Systems
    Gutierrez-Rojas, Daniel
    Kalalas, Charalampos
    Christou, Ioannis
    Almeida, Gustavo
    Eldeeb, Eslam
    Bakri, Sihem
    Marchetti, Nicola
    Sant'Ana, Jean M. S.
    Lopez, Onel L. Alcaraz
    Alves, Hirley
    Papadias, Constantinos
    Haroon Tariq, Muhammad
    Nardelli, Pedro H. J.
    IEEE SENSORS JOURNAL, 2025, 25 (04) : 7193 - 7204
  • [35] Dynamic Data Injection Attack Detection of Cyber Physical Power Systems With Uncertainties
    Wang, Huaizhi
    Ruan, Jiaqi
    Zhou, Bin
    Li, Canbing
    Wu, Qiuwei
    Raza, Muhammad Qamar
    Cao, Guang-Zhong
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (10) : 5505 - 5518
  • [36] Robust Covert Attack Strategies and Their Detection for Switched Cyber-Physical Systems
    Kazemi, MohamadGhasem
    Khorasani, Khashayar
    2023 31ST MEDITERRANEAN CONFERENCE ON CONTROL AND AUTOMATION, MED, 2023, : 389 - 394
  • [37] TFDPM: Attack detection for cyber-physical systems with diffusion probabilistic models
    Yan, Tijin
    Zhou, Tong
    Zhan, Yufeng
    Xia, Yuanqing
    KNOWLEDGE-BASED SYSTEMS, 2022, 255
  • [38] Robust performance based multiplicative attack detection for cyber-physical systems
    Zhao, Zhen-Gen
    Li, Yu-Zhe
    Kongzhi Lilun Yu Yingyong/Control Theory and Applications, 2022, 39 (10): : 1952 - 1960
  • [39] Fusion-Based FDI Attack Detection in Cyber-Physical Systems
    Gao, Lingjie
    Chen, Bo
    Yu, Li
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2020, 67 (08) : 1487 - 1491
  • [40] Joint attack detection and secure state estimation of cyber-physical systems
    Forti, Nicola
    Battistelli, Giorgio
    Chisci, Luigi
    Sinopoli, Bruno
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2020, 30 (11) : 4303 - 4330