Cyber-physical attack graphs (CPAGs): Composable and scalable attack graphs for cyber-physical systems

被引:6
作者
Barrere, Martin [1 ,2 ]
Hankin, Chris [2 ]
O'Reilly, Dean [3 ]
机构
[1] Univ Surrey, Surrey Ctr Cyber Secur, Guildford, England
[2] Imperial Coll London, Inst Secur Sci & Technol, London, England
[3] Natl Cyber Secur Ctr NCSC, London, England
关键词
Cyber-physical attack graphs; CPAGs; Cyber security; Cyber-physical systems; CPS; Critical national infrastructure; Industrial control systems; ICS; Risk analysis; Bayesian networks; Smart farming; GENERATION; SECURITY;
D O I
10.1016/j.cose.2023.103348
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attack graphs are a fundamental security tool focused on depicting how multi-stage attacks can be car-ried out through a network to compromise specific assets and systems. While attack graphs have been widely utilised in the IT cyber domain, their use in Operational Technology (OT) environments requires new approaches able to properly model and analyse Cyber-Physical Systems (CPS). In this paper, we in-troduce Cyber-Physical Attack Graphs (CPAGs) as a class of attack graphs able to cover both cyber and physical aspects. CPAGs aim at extending the reach of standard attack graphs to cyber-physical networks typically observed in industrial environments and critical infrastructure systems, analyse how an attacker can move within the network, and understand the impact that these actions may have on the system. We propose a constructive methodology to design CPAGs backed up by a formal rule-based approach that specifies how integral parts of the model can be generated and later composed to build more com-plex CPAGs. We then explore the semantics of CPAGs associated to cyber and physical attack actions as well as their impact on CPS environments. We also discuss potential CPAG-based analysis techniques and focus on risk analysis using Bayesian CPAGs. Finally, we show the application of the proposed model over a realistic scenario on smart farming using our open source tool T-CITY.& COPY; 2023 Published by Elsevier Ltd.
引用
收藏
页数:13
相关论文
共 63 条
[1]   Deployment Optimization of IoT Devices through Attack Graph Analysis [J].
Agmon, Noga ;
Shabtai, Asaf ;
Puzis, Rami .
PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), 2019, :192-202
[2]  
Ammann P., 2002, Proceedings of 9th ACM Conference on Computer and Communications Security (ACM-CCS 2002), P217, DOI [10.1145/586110.586140, DOI 10.1145/586110.586140]
[3]  
[Anonymous], 2017, Attackers Deploy New ICS Attack Framework "TRITON"and Cause Operational Disruption to Critical Infrastructure
[4]  
Assante M.J., 2015, The Industrial Control System Cyber Kill Chain
[5]  
Barre⠁re M., 2017, 2017 13 INT C NETWOR, P1
[6]  
Barrere M., 2023, T CITY CYBER PHYS AT
[7]   Analysing Mission-critical Cyber-physical Systems with AND/OR Graphs and MaxSAT [J].
Barrere, Martin ;
Hankin, Chris .
ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS, 2021, 5 (03)
[8]   Measuring cyber-physical security in industrial control systems via minimum-effort attack strategies [J].
Barrere, Martin ;
Hankin, Chris ;
Nicolaou, Nicolas ;
Eliades, Demetrios G. ;
Parisini, Thomas .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 52
[9]  
Barrère M, 2017, IEEE CONF COMM NETW, P378, DOI 10.1109/CNS.2017.8228667
[10]  
Bopche GS, 2014, COMM COM INF SC, V467, P379