Attack Path Detection for IIoT Enabled Cyber Physical Systems: Revisited

被引:14
|
作者
Arat, Ferhat [1 ]
Akleylek, Sedat [2 ,3 ,4 ]
机构
[1] Samsun Univ, Dept Software Engn, Samsun, Turkiye
[2] Ondokuz Mayis Univ, Dept Comp Engn, Samsun, Turkiye
[3] Ondokuz Mayis Univ, Cyber Secur & Informat Technol Res & Dev Ctr, Samsun, Turkiye
[4] Univ Tartu, Tartu, Estonia
关键词
Industrial IoT security; Vulnerability and risk assessment; Attack graph; Attack path; Path filtering; Cyber attacks; IOT; MANAGEMENT;
D O I
10.1016/j.cose.2023.103174
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a generic vulnerability and risk assessment method for IIoT-enabled critical sys-tems. We focus on reducing risk factors and vulnerable structures in order to provide security issues for the IIoT and enabled complex systems. In addition to the existing risk assessment and related methods, we represent the IIoT-enabled network topology as a directed graph, and we develop an attack tree-based approach using graph theory. We assume that each device is a potential critical node due to the existing vulnerabilities, which are defined in the National Vulnerability Database (NVD), and we establish directed relations between nodes, considering cyber and physical interactions. We improve existing attack path-identifying methods using the Depth First Search (DFS) algorithm to find all the paths from the source to the target nodes. In the generated topology, each node has the pre-assigned Common Vulnerability Scoring System (CVSS) scores acting as a weight. We also implement the Floyd-Warshall algorithm to identify path risk levels. Finally, we assess the identified vulnerable paths from varying source and target pairs via path and node-reducing procedures, considering risk thresholds. We perform our simulation on a custom Python simulator, considering the transportation and supply sectors. We compare our results with the previous ones. Simulation results show that our proposed methods and procedures outperform existing risk assessment and filtering methods in terms of running time and attack path identification and filtering. (c) 2023 Elsevier Ltd. All rights reserved.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] Intelligent Sensor Attack Detection and Identification for Automotive Cyber-Physical Systems
    Shin, Jongho
    Baek, Youngmi
    Eun, Yongsoon
    Son, Sang Hyuk
    2017 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI), 2017, : 3380 - 3387
  • [42] A Survey of Physics-Based Attack Detection in Cyber-Physical Systems
    Giraldo, Jairo
    Urbina, David
    Cardenas, Alvaro
    Valente, Junia
    Faisal, Mustafa
    Ruths, Justin
    Tippenhauer, Nils Ole
    Sandberg, Henrik
    Candell, Richard
    ACM COMPUTING SURVEYS, 2018, 51 (04)
  • [43] Adaptive robust FDI attack detection for cyber-physical systems with disturbance
    Li, Lu
    Chen, Yong
    Li, Meng
    Liu, Yuezhi
    ICT EXPRESS, 2023, 9 (04): : 656 - 663
  • [44] Performance based attack detection and security analysis for cyber-physical systems
    Zhao, Zhengen
    Xu, Yunsong
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2023, 33 (05) : 3267 - 3284
  • [45] A survey on attack detection, estimation and control of industrial cyber-physical systems
    Zhang, Dan
    Wang, Qing-Guo
    Feng, Gang
    Shi, Yang
    Vasilakos, Athanasios V.
    ISA TRANSACTIONS, 2021, 116 : 1 - 16
  • [46] A survey on security control and attack detection for industrial cyber-physical systems
    Ding, Derui
    Han, Qing-Long
    Xiang, Yang
    Ge, Xiaohua
    Zhang, Xian-Ming
    NEUROCOMPUTING, 2018, 275 : 1674 - 1683
  • [47] Feasibility and Detection of Replay Attack in Networked Constrained Cyber-Physical Systems
    Hosseinzadeh, Mehdi
    Sinopoli, Bruno
    Garone, Emanuele
    2019 57TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2019, : 712 - 717
  • [48] Toward Detection and Attribution of Cyber-Attacks in IoT-Enabled Cyber-Physical Systems
    Jahromi, Amir Namavar
    Karimipour, Hadis
    Dehghantanha, Ali
    Choo, Kim-Kwang Raymond
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (17) : 13712 - 13722
  • [49] KCAD: Kinetic Cyber-Attack Detection Method for Cyber-Physical Additive Manufacturing Systems
    Chhetri, Sujit Rokka
    Canedo, Arquimedes
    Al Faruque, Mohammad Abdullah
    2016 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2016,
  • [50] Development of IIoT Monitoring and Control Security Scheme for Cyber Physical Systems
    Wadsworth, Anthony
    Thanoon, Mohammed, I
    McCurry, Charles
    Sabatto, Saleh Zein
    2019 IEEE SOUTHEASTCON, 2019,