Attack Path Detection for IIoT Enabled Cyber Physical Systems: Revisited

计算机科学 脆弱性(计算) 路径(计算) 节点(物理) 网络拓扑 Python(编程语言) 数据挖掘 脆弱性评估 分布式计算 理论计算机科学 拓扑(电路) 计算机安全 计算机网络 数学 工程类 心理弹性 组合数学 操作系统 结构工程 心理治疗师 心理学
作者
Ferhat Arat,Sedat Akleylek
出处
期刊:Computers & Security [Elsevier]
卷期号:128: 103174-103174 被引量:7
标识
DOI:10.1016/j.cose.2023.103174
摘要

In this paper, we propose a generic vulnerability and risk assessment method for IIoT-enabled critical systems. We focus on reducing risk factors and vulnerable structures in order to provide security issues for the IIoT and enabled complex systems. In addition to the existing risk assessment and related methods, we represent the IIoT-enabled network topology as a directed graph, and we develop an attack tree-based approach using graph theory. We assume that each device is a potential critical node due to the existing vulnerabilities, which are defined in the National Vulnerability Database (NVD), and we establish directed relations between nodes, considering cyber and physical interactions. We improve existing attack path-identifying methods using the Depth First Search (DFS) algorithm to find all the paths from the source to the target nodes. In the generated topology, each node has the pre-assigned Common Vulnerability Scoring System (CVSS) scores acting as a weight. We also implement the Floyd-Warshall algorithm to identify path risk levels. Finally, we assess the identified vulnerable paths from varying source and target pairs via path and node-reducing procedures, considering risk thresholds. We perform our simulation on a custom Python simulator, considering the transportation and supply sectors. We compare our results with the previous ones. Simulation results show that our proposed methods and procedures outperform existing risk assessment and filtering methods in terms of running time and attack path identification and filtering.
最长约 10秒,即可获得该文献文件

科研通智能强力驱动
Strongly Powered by AbleSci AI

祝大家在新的一年里科研腾飞
更新
大幅提高文件上传限制,最高150M (2024-4-1)

科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
1秒前
爆米花应助徐妙菱采纳,获得50
2秒前
3秒前
英俊的铭应助David采纳,获得10
4秒前
繁荣的雅香完成签到,获得积分10
5秒前
6秒前
研友_Z343J8完成签到 ,获得积分10
7秒前
8秒前
Tristan发布了新的文献求助10
9秒前
思源应助繁荣的雅香采纳,获得10
10秒前
充电宝应助nenoaowu采纳,获得10
11秒前
年轻就要气盛完成签到,获得积分20
12秒前
12秒前
孙小球发布了新的文献求助10
13秒前
zzn发布了新的文献求助10
13秒前
atom完成签到,获得积分10
14秒前
16秒前
yangzhuang发布了新的文献求助10
18秒前
sff发布了新的文献求助10
21秒前
CodeCraft应助ardejiang采纳,获得10
22秒前
wjh完成签到,获得积分10
25秒前
25秒前
乐乐乐乐乐乐应助zzn采纳,获得10
27秒前
28秒前
31秒前
31秒前
晓晓发布了新的文献求助10
31秒前
31秒前
jdio完成签到,获得积分10
32秒前
乐乐应助漫画采纳,获得10
32秒前
33秒前
35秒前
冷静柜子发布了新的文献求助30
35秒前
Zeger116完成签到,获得积分10
35秒前
钟山发布了新的文献求助10
37秒前
37秒前
39秒前
ZW完成签到 ,获得积分10
40秒前
41秒前
41秒前
高分求助中
Востребованный временем 2500
Les Mantodea de Guyane 1000
Very-high-order BVD Schemes Using β-variable THINC Method 970
Field Guide to Insects of South Africa 660
Foucault's Technologies Another Way of Cutting Reality 500
Forensic Chemistry 400
Toward personalized care for insomnia in the US Army: a machine learning model to predict response to cognitive behavioral therapy for insomnia 300
热门求助领域 (近24小时)
化学 医学 生物 材料科学 工程类 有机化学 生物化学 物理 内科学 纳米技术 计算机科学 化学工程 复合材料 基因 遗传学 物理化学 催化作用 细胞生物学 免疫学 冶金
热门帖子
关注 科研通微信公众号,转发送积分 3392438
求助须知:如何正确求助?哪些是违规求助? 3003056
关于积分的说明 8807330
捐赠科研通 2689817
什么是DOI,文献DOI怎么找? 1473309
科研通“疑难数据库(出版商)”最低求助积分说明 681528
邀请新用户注册赠送积分活动 674351