Critical Attacks Set Identification in Attack Graphs for Computer and SCADA/ICS Networks

被引:6
作者
Al Ghazo, Alaa T. [1 ]
Kumar, Ratnesh [2 ]
机构
[1] Hashemite Univ, Fac Engn, Dept Mechatron Engn, Zarqa 13133, Jordan
[2] Iowa State Univ, Dept Elect & Comp Engn, Ames, IA 50014 USA
来源
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS | 2023年 / 53卷 / 09期
基金
美国国家科学基金会;
关键词
Approximation algorithms; Internet of Things; NP-complete problem; Industrial control; Directed graphs; Cybernetics; Cyberattack; Attack graph; critical attacks set; Index terms; cyber-physical systems; industrial control systems (ICSs); Internet of Things (IoT); min label cut (MLC); SCADA systems; security;
D O I
10.1109/TSMC.2023.3274613
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Supervisory control and data acquisition/industrial control systems (SCADA/ICSs) networks are becoming more vulnerable to attacks that exploit the interdependence of security weaknesses at the atomic level to compromise system-level security. Attack graphs are an effective approach to depict these complex attack scenarios, assisting security administrators in determining how to best safeguard their systems. However, due to time and financial constraints, it is frequently not possible to address all atomic-level flaws at the same time. In this article, we propose a method for automatically detecting a minimal set of critical attacks that, when defended against, render the system secure. Finding a minimal label cut is typically an NP-complete problem. However, we propose a linear complexity approximation that uses the attack graph's strongly connected components (SCCs) to create a simplified version of the graph in the form of a tree over the SCCs. Then, we perform an iterative backward search over this tree to find a set of backward-reachable SCCs, as well as their outward edges and labels, in order to find a cut of the tree with the fewest labels, which is a critical attack set. We put our proposed method to the test on real-world case studies, such as IT and SCADA networks for a cyber-physical system for water treatment, and outperformed previous state-of-the-art algorithms in terms of approximation accuracy and/or computational speed. Our solution provides security administrators with a practical and efficient method for prioritizing efforts to address vulnerabilities in SCADA/ICS networks.
引用
收藏
页码:5604 / 5613
页数:10
相关论文
共 23 条
[1]  
Al Ghazo A.T., 2018, Proceedings of the 1st ACM MobiHoc Workshop on Mobile IoT Sensing, Security, and Privacy, P3
[2]   A2G2V: Automatic Attack Graph Generation and Visualization and Its Applications to Computer and SCADA Networks [J].
Al Ghazo, Alaa T. ;
Ibrahim, Mariam ;
Ren, Hao ;
Kumar, Ratnesh .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2020, 50 (10) :3488-3498
[3]  
Al Ghazo AT, 2019, 2019 IFIP/IEEE SYMPOSIUM ON INTEGRATED NETWORK AND SERVICE MANAGEMENT (IM)
[4]   Queryable Semantics to Detect Cyber-Attacks: A Flow-Based Detection Approach [J].
AlEroud, Ahmed F. ;
Karabatis, George .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2018, 48 (02) :207-223
[5]  
Alhomidi M., 2013, Computer Applications Technology (ICCAT), 2013 International Conference on, P1
[6]  
[Anonymous], 2019, SEC WAT TREATM TES
[7]  
[Anonymous], 2018, About us
[8]  
[Anonymous], 2017, Belknap Press of Harvard University Press Publ.
[9]  
[Anonymous], 2018, MOR 40 ICS COMP WER
[10]   Cyberphysical Security and Dependability Analysis of Digital Control Systems in Nuclear Power Plants [J].
Cho, Chi-Shiang ;
Chung, Wei-Ho ;
Kuo, Sy-Yen .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2016, 46 (03) :356-369