Attack Path Detection for IIoT Enabled Cyber Physical Systems: Revisited

计算机科学 脆弱性(计算) 路径(计算) 节点(物理) 网络拓扑 Python(编程语言) 数据挖掘 脆弱性评估 分布式计算 理论计算机科学 拓扑(电路) 计算机安全 计算机网络 数学 心理学 结构工程 心理弹性 工程类 心理治疗师 操作系统 组合数学
作者
Ferhat Arat,Sedat Akleylek
出处
期刊:Computers & Security [Elsevier]
卷期号:128: 103174-103174 被引量:7
标识
DOI:10.1016/j.cose.2023.103174
摘要

In this paper, we propose a generic vulnerability and risk assessment method for IIoT-enabled critical systems. We focus on reducing risk factors and vulnerable structures in order to provide security issues for the IIoT and enabled complex systems. In addition to the existing risk assessment and related methods, we represent the IIoT-enabled network topology as a directed graph, and we develop an attack tree-based approach using graph theory. We assume that each device is a potential critical node due to the existing vulnerabilities, which are defined in the National Vulnerability Database (NVD), and we establish directed relations between nodes, considering cyber and physical interactions. We improve existing attack path-identifying methods using the Depth First Search (DFS) algorithm to find all the paths from the source to the target nodes. In the generated topology, each node has the pre-assigned Common Vulnerability Scoring System (CVSS) scores acting as a weight. We also implement the Floyd-Warshall algorithm to identify path risk levels. Finally, we assess the identified vulnerable paths from varying source and target pairs via path and node-reducing procedures, considering risk thresholds. We perform our simulation on a custom Python simulator, considering the transportation and supply sectors. We compare our results with the previous ones. Simulation results show that our proposed methods and procedures outperform existing risk assessment and filtering methods in terms of running time and attack path identification and filtering.

科研通智能强力驱动
Strongly Powered by AbleSci AI
更新
大幅提高文件上传限制,最高150M (2024-4-1)

科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
大模型应助刘若昕采纳,获得20
刚刚
可爱的函函应助Electra采纳,获得10
1秒前
3秒前
麦子发布了新的文献求助10
3秒前
mermaid发布了新的文献求助10
3秒前
4秒前
chujun完成签到,获得积分10
4秒前
0626发布了新的文献求助10
4秒前
zm完成签到,获得积分10
5秒前
LabRat完成签到 ,获得积分10
6秒前
bkagyin应助haiwei采纳,获得10
7秒前
鄂惜霜完成签到,获得积分10
7秒前
满满完成签到,获得积分10
7秒前
8秒前
10秒前
善学以致用应助优雅沛文采纳,获得10
10秒前
psclib完成签到,获得积分10
10秒前
aaaan完成签到,获得积分10
11秒前
11秒前
13秒前
13秒前
Jasmine完成签到,获得积分10
15秒前
1234发布了新的文献求助10
15秒前
希梓晴完成签到,获得积分10
15秒前
16秒前
17秒前
18秒前
18秒前
林然完成签到 ,获得积分10
19秒前
19秒前
19秒前
19秒前
20秒前
20秒前
丰富的小甜瓜完成签到,获得积分10
21秒前
爱听歌的钢铁侠完成签到,获得积分10
21秒前
高不二完成签到,获得积分10
22秒前
蕙best完成签到,获得积分10
22秒前
nanus完成签到 ,获得积分10
22秒前
22秒前
高分求助中
좌파는 어떻게 좌파가 됐나:한국 급진노동운동의 형성과 궤적 2500
Sustainability in Tides Chemistry 1500
TM 5-855-1(Fundamentals of protective design for conventional weapons) 1000
CLSI EP47 Evaluation of Reagent Carryover Effects on Test Results, 1st Edition 800
Threaded Harmony: A Sustainable Approach to Fashion 799
Livre et militantisme : La Cité éditeur 1958-1967 500
Retention of title in secured transactions law from a creditor's perspective: A comparative analysis of selected (non-)functional approaches 500
热门求助领域 (近24小时)
化学 医学 生物 材料科学 工程类 有机化学 生物化学 物理 内科学 纳米技术 计算机科学 化学工程 复合材料 基因 遗传学 催化作用 物理化学 免疫学 量子力学 细胞生物学
热门帖子
关注 科研通微信公众号,转发送积分 3054259
求助须知:如何正确求助?哪些是违规求助? 2711253
关于积分的说明 7425350
捐赠科研通 2355845
什么是DOI,文献DOI怎么找? 1247387
科研通“疑难数据库(出版商)”最低求助积分说明 606388
版权声明 596048