A Hybrid Attack Graph Analysis Method based on Model Checking

被引:1
作者
Ge, Yaogang [1 ]
Shen, Xiaomeng [1 ]
Xu, Bingfeng [1 ,2 ]
He, Gaofeng [3 ]
机构
[1] Nanjing Forestry Univ, Coll Informat Sci & Technol, Nanjing 210037, Peoples R China
[2] Nanjing Univ Aeronaut & Astronaut, Minist Ind & Informat Technol, Key Lab Safety Crit Software, Nanjing 211106, Peoples R China
[3] Nanjing Univ Posts & Telecommun, Sch Internet Things, Nanjing 210003, Peoples R China
来源
2022 TENTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA, CBD | 2022年
基金
中国国家自然科学基金;
关键词
cyber security; model checking; hybrid attack graph; timed automata; model transformation; INDUSTRIAL INTERNET; GENERATION;
D O I
10.1109/CBD58033.2022.00053
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attack graph is an essential tool for the security assessment of industrial Internet systems. Unfortunately, the traditional attack graph mainly focuses on discrete information and cannot handle continuous information such as temperature and humidity. These continuous data represent the states of the industrial Internet and are also indicators of attacks, which should be included in the attack graph. To this end, this paper presents a hybrid attack graph model, which can simultaneously describe the discrete and continuous information of the system. Based on the hybrid attack graph model, a security analysis method is presented. Firstly, the transformation rule from hybrid attack graph to timed automata is established. Secondly, the security attribute of the system is described by sequential logic of continuous interval, and then the model checker TACK is used to complete the analysis of the system. Finally, an example is analyzed and verified by a smart home system to illustrate the method's effectiveness. The method in this paper provides a new idea for attack graph construction and analysis for industrial Internet systems.
引用
收藏
页码:258 / 263
页数:6
相关论文
共 19 条
[1]   Attack Graph Generation and Analysis Techniques [J].
Barik, Mridul Sankar ;
Sengupta, Anirban ;
Mazumdar, Chandan .
DEFENCE SCIENCE JOURNAL, 2016, 66 (06) :559-567
[2]  
Boyanov P., 2018, ASS SCI APPL RES, V14, P34
[3]  
Case D. U., 2016, ELECTRICITY INFORM S, V388, P1
[4]   Intelligent manufacturing production line data monitoring system for industrial internet of things [J].
Chen, Wei .
COMPUTER COMMUNICATIONS, 2020, 151 :31-41
[5]  
Hawrylak P. J., 2012, Proceedings of the 2012 5th International Symposium on Resilient Control Systems (ISRCS), P161, DOI 10.1109/ISRCS.2012.6309311
[6]   Automatic Hybrid Attack Graph (AHAG) Generation for Complex Engineering Systems [J].
Ibrahim, Mariam ;
Alsheikh, Ahmad .
PROCESSES, 2019, 7 (11)
[7]   Practical attack graph generation for network defense [J].
Ingols, Kyle ;
Lippmann, Richard ;
Piwowarski, Keith .
22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, :121-+
[8]   A review of attack graph and attack tree visual syntax in cyber security [J].
Lallie, Harjinder Singh ;
Debattista, Kurt ;
Bal, Jay .
COMPUTER SCIENCE REVIEW, 2020, 35
[9]   Industrial Internet: A Survey on the Enabling Technologies, Applications, and Challenges [J].
Li, Jian-Qiang ;
Yu, F. Richard ;
Deng, Genqiang ;
Luo, Chengwen ;
Ming, Zhong ;
Yan, Qiao .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (03) :1504-1526
[10]  
Li M, 2022, DIGITAL THREATS RES