Fast Algorithm for Cyber-Attack Estimation and Attack Path Extraction Using Attack Graphs with AND/OR Nodes
<p>The flow chart of the proposed algorithm.</p> "> Figure 2
<p>(<b>a</b>) Example 1 adapted from [<a href="#B41-algorithms-17-00504" class="html-bibr">41</a>]. (<b>b</b>) Extracted minimum-length attack path.</p> "> Figure 3
<p>(<b>a</b>) Acyclic attack graph equipped with the node times. (<b>b</b>) Extracted minimum-length attack path for Example 2.</p> "> Figure 4
<p>(<b>a</b>) Attack graph with cycles. (<b>b</b>) Extracted minimum-length attack path.</p> "> Figure 5
<p>(<b>a</b>) The unweighted attack graph with cycles. (<b>b</b>) Extracted minimum-length attack path.</p> "> Figure 6
<p>Attack graph with cycles without an attack path.</p> "> Figure 7
<p>The extended attack graph with the start node (adapted from [<a href="#B20-algorithms-17-00504" class="html-bibr">20</a>]).</p> "> Figure 8
<p>Extracted minimum-length attack path for the attack graph in <a href="#algorithms-17-00504-f007" class="html-fig">Figure 7</a>.</p> "> Figure 9
<p>A scheme of defenders’ response to a malicious attack.</p> ">
Abstract
:1. Introduction
- : the start node in the graph, which has no predecessors;
- : the set of AND nodes with a conjunctive relationship between their predecessors. That is, all predecessors of an AND node must be accessed before this parent node can be accessed;
- : the set of OR nodes, where at least one predecessor of such node must be accessed so the parent node can be accessed;
- A particular node, either of AND or OR type, is specified as a target of an intruder.
2. Literature Review
3. The Algorithm for Extracting Attack Paths
Algorithm 1. Minimum path extraction | |
Initialization. Set , for and . Step 1. [Calculate the shortest times for AND-nodes] Choose an arbitrary yet-unvisited AND node such that all its immediate predecessors, denoted , are in the set If there is no such AND-node in the attack graph, go to Step 2; otherwise, set the permanent completion time of node as follows: | |
(4) | |
Modify the set as follows: , and return to Step 1. Step 2. [Calculate the temporal of OR nodes. To do this, use two alternative ways, denoted Step 2.1 and Step 2.2 below] Step 2.1 Choose an arbitrary unvisited OR-node such that some of its immediate predecessors (either of type AND or of type OR) are in the set . Define the temporal time of node as follows: | |
(5) | |
Step 2.2. Choose an arbitrary unvisited OR-node such that at least one of its immediate predecessors, denoted , is of type OR, does not belong to the set and has already obtained a finite temporal time value at some earlier step of the algorithm. Define the temporal time of node as follows: | |
(6) | |
Considering that either of the two cases can occur in the graph under consideration, define and select the OR node, or , that has the smaller value of the temporal time, , in (5–6). If none of the OR-nodes in the graph under study satisfies (5) or (6) at this step, then the problem has no solution. Repeat Step 2 for unvisited OR nodes as long as some nodes can change their temporal times according to (5–6). Then go to Step 3. Step 3. [Calculate the permanent earliest time of an OR-node and revise ]. Choose an OR node that has the minimum temporal time among all OR nodes defined in Step 2 as follows: | |
; ). | (7) |
Set . If, at this step, multiple OR nodes have the same minimum temporary time label , assign each of them a permanent time label and add them all to the set . Go to Step 1. Repeat Steps 1–3 cyclically until either (a) all the nodes of the given attack graph will be in the set , or (b) a permanent time label for the target node will be determined, or (c) neither (5) nor (6) in Steps 2 is satisfied, in which case the problem is unsolvable. |
4. Numerical Examples and Their Analysis
5. A Case Study
6. Cyber-Defense and Countermeasures Against Attack Paths
7. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Appendix A
Term | Meaning of the Term |
---|---|
attack, or cyber-attack | any unwanted, deliberate attempt to steal, disclose, alter, disable, or destroy programs, data, applications, or other assets through unauthorized access to a CFS, computer network, system, or digital device. |
attack graphs (AG) | visual models of network insecurities that show in graphical form possible paths of where and how an attacker has completed a successful breach and compromised a computer network, system, or host computer. Two AG formalisms are best studied for modeling CPS from a cybersecurity perspective: exploit-dependency graphs and AND/OR attack graphs. |
attack path | a visual representation of an attacker’s specific journey to access sensitive data or leverage system access to exploit vulnerabilities. An attack path is an acyclic subgraph of a given attack graph in which all nodes satisfy conditions (iii–iv) of the definition of an attack path given in Section 1. |
attack path extraction | a systematic review of the components, connections, and interactions within a given cyber–physical system to infer/map potential sequences of actions that an attacker might exploit. By reproducing these pathways, defenders can assess the potential impact and risk of multiple attack scenarios and ultimately prioritize their risk mitigation efforts more effectively. |
attacker (or intruder) | person or group committing malicious acts with intent to destroy, alter, steal data, gain unauthorized access, or make unauthorized use of an asset. |
accessible (reachable) node | a node for which there exists an attack path from the start node to the target. |
AND/OR graph (AOG) | a directed graph consisting of two types of nodes: AND and OR nodes. The nodes in AOG generally represent different components of the CPS, such as host computers, sensors, routers, and controllers. In this type of graph, the nodes may also optionally represent conditions of an attack graph. |
AND/OR nodes | AND nodes have conjunctive, whereas OR nodes have disjunctive relationships with their predecessors. More specifically, if all predecessors must be accessed before the considered node is attacked, such a node is called an AND node. If executing/accessing any predecessor is sufficient to achieve the considered node, then such a node is called an OR node. |
condition | a specific prerequisite must be fulfilled or achieved for a successful exploit. |
cyber–physical system (CPS) | a network of interconnected physical and computer components to securely, flexibly, and effectively manage integrated computing, networking, and physical processes. |
cybersecurity | the state of the network being free from danger or threat. |
cyber-defense | the action of defending from or resisting attack. |
data exfiltration | a type of security breach that includes unauthorized copying, transfer, or retrieval of data from either a server or an individual’s computer without proper authorization with malicious intent. |
defender | an application or an individual that monitors in real-time for malware, viruses, and other security threats. |
exploit | a piece of software/data or a set of commands that use a vulnerability to cause unintended or unanticipated behavior in a CPS’s software or hardware. Exploits allow attackers to gain remote access to a target network and penetrate deeper into the network. |
exploit-dependency graph (EDG) | a directed attack graph composed of two types of nodes: exploit nodes and condition nodes. An exploit node corresponds to an exploit in the considered network; a condition node denotes that a specific host is reachable by an intruder, this host has a vulnerability, and an attacker compromises the host. Edges run from condition nodes to exploit nodes or from exploit nodes to condition nodes, i.e., the exploit-dependency graph is bipartite. |
hardening a system | see network hardening. |
hostile attack | a form of a cyber warfare that has a goal of espionage, where information or data are stolen via the Internet, or of sabotage, such as compromising a node. The attacks usually come in the form of a computer virus or through a coordinated attack by a network of hostile computer systems. |
intruder | see attacker. |
leverages access to exploit vulnerability | to effectively use system access to exploit vulnerabilities. |
leverage attack paths | to use different paths to access sensitive information and exploit a vulnerable configuration or resource. |
malware | intentionally designed malicious software to cause disruption or damage, steal data, damage or destroy computers and computer systems; the types of malware include viruses, worms, trojans, spyware, and ransomware. |
monotonicity | an assumption that if a network component is compromised by an attacker once, it will remain compromised then and forever after. The monotonicity allows for a significant reduction in the AG size. |
network hardening | implementing cyber-security actions and measures to strengthen a network’s defenses and protect sensitive data. It includes vulnerability assessments, securing open ports, and predicting an attacker’s likely paths. |
parent node, child | a node v that has an edge leading to it from an immediately preceding node w is called the parent node (or successor), while w is a predecessor or child of v. |
privilege | a permission/right to perform a computer operation or access a database. |
vulnerability | an instance of one or more weaknesses in a computer system that an attacker can exploit to carry out a successful malicious attack, causing a negative impact on confidentiality, integrity, or availability of the system. It can happen due to user flaws or errors, and attackers will exploit any of them. |
vulnerability analysis | methodology that is systematically carried out to identify, classify, prioritize, and mitigate vulnerabilities and security risks |
weaponization (in cybersecurity) | creating or modifying malware to exploit specific vulnerabilities; weaponization enhances the effectiveness of cyber-attacks, making them more sophisticated and harder to detect. |
Appendix B
Notation | Description |
---|---|
Index of an OR node in the attack graph | |
Index of an AND node in the attack graph | |
Starting and target nodes | |
Set of nodes | |
Set of edges | |
The set of all OR nodes (respectively, all AND nodes) in the graph | |
The predecessor set of node | |
A temporal earliest completion time on the node | |
A permanent earliest completion time on the node (decision variable) | |
A permanent earliest completion time on the node (decision variable) | |
The set of nodes for which the permanent times are defined; any of these nodes is called visited | |
Time (duration) of the attacker’s compromise action in edge from node to node | |
Duration of the attacker’s compromise action in node |
Appendix C. The Proof of Claim 1
References
- Almansoori, A.; Al-Emran, M.; Shaalan, K. Exploring the Frontiers of Cybersecurity Behavior: A Systematic Review of Studies and Theories. Appl. Sci. 2023, 13, 5700. [Google Scholar] [CrossRef]
- Taherdoost, H. Insights into Cybercrime Detection and Response: A Review of Time Factor. Information 2024, 15, 273. [Google Scholar] [CrossRef]
- Wang, W.; Sun, D.; Jiang, F.; Chen, X.; Zhu, C. Research and Challenges of Reinforcement Learning in Cyber Defense Decision-Making for Intranet Security. Algorithms 2022, 15, 134. [Google Scholar] [CrossRef]
- Phillips, C.; Swiler, L.P. A Graph-Based System for Network-Vulnerability Analysis. In Proceedings of the 1998 Workshop on New Security Paradigms, Charlottesville, VA, USA, 22–25 September 1998; pp. 71–79. [Google Scholar]
- Ammann, P.; Wijesekera, D.; Kaushik, S. Scalable, Graph-Based Network Vulnerability Analysis. In Proceedings of the ACM Conference on Computer and Communications Security, Washington, DC, USA, 18–22 November 2002; pp. 217–224. [Google Scholar] [CrossRef]
- Sheyner, O.; Haines, J.; Jha, S.; Lippmann, R.; Wing, J.M. Automated Generation and Analysis of Attack Graphs. In Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 12–15 May 2002; IEEE: Piscataway, NJ, USA, 2002; pp. 273–284. [Google Scholar] [CrossRef]
- Jajodia, S.; Noel, S.; O’berry, B. Topological Analysis of Network Attack Vulnerability. In Managing Cyber Threats: Issues, Approaches, and Challenges; Springer: Berlin/Heidelberg, Germany, 2005; pp. 247–266. [Google Scholar]
- Noel, S.; Jajodia, S. Managing Attack Graph Complexity through Visual Hierarchical Aggregation. In Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security (VizSEC/DMSEC’04), Washington, DC, USA, 29 October 2004; pp. 109–118. [Google Scholar] [CrossRef]
- Noel, S.; Robertson, E.; Jajodia, S. Correlating Intrusion Events and Building Attack Scenarios through Attack Graph Distances. In Proceedings of the Annual Computer Security Applications Conference (ACSAC), Tucson, AZ, USA, 6–10 December 2004; IEEE: Piscataway, NJ, USA, 2004; pp. 350–359. [Google Scholar] [CrossRef]
- Wang, L.; Noel, S.; Jajodia, S. Minimum-Cost Network Hardening Using Attack Graphs. Comput. Commun. 2006, 29, 3812–3824. [Google Scholar] [CrossRef]
- Ingols, K.; Lippmann, R.; Piwowarski, K. Practical Attack Graph Generation for Network Defense. In Proceedings of the Annual Computer Security Applications Conference (ACSAC), Miami Beach, FL, USA, 11–15 December 2006; IEEE: Piscataway, NJ, USA, 2006; pp. 121–130. [Google Scholar] [CrossRef]
- Lippmann, R.P.; Ingols, K.W. An Annotated Review of Past Papers on Attack Graphs; No. PR-IA-1; Citeseer: Princeton, NJ, USA, 2005. [Google Scholar]
- Kaynar, K. A Taxonomy for Attack Graph Generation and Usage in Network Security. J. Inf. Secur. Appl. 2016, 29, 27–56. [Google Scholar] [CrossRef]
- Lallie, H.S.; Debattista, K.; Bal, J. A Review of Attack Graph and Attack Tree Visual Syntax in Cyber Security. Comput. Sci. Rev. 2020, 35, 100219. [Google Scholar] [CrossRef]
- Zenitani, K. Attack Graph Analysis: An Explanatory Guide. Comput. Secur. 2023, 126, 103081. [Google Scholar] [CrossRef]
- Wachter, J. Graph Models for Cybersecurity—A Survey. arXiv 2023, arXiv:2311.10050. [Google Scholar]
- Zeng, J.; Wu, S.; Chen, Y.; Zeng, R.; Wu, C. Survey of Attack Graph Analysis Methods from the Perspective of Data and Knowledge Processing. Secur. Commun. Netw. 2019, 2019, 2031063. [Google Scholar] [CrossRef]
- Ou, X.; Boyer, W.F.; McQueen, M.A. A Scalable Approach to Attack Graph Generation. In Proceedings of the ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 30 October–3 November 2006; pp. 336–345. [Google Scholar] [CrossRef]
- Wang, L.; Islam, T.; Long, T.; Singhal, A.; Jajodia, S. An Attack Graph-Based Probabilistic Security Metric. In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Springer: Berlin/Heidelberg, Germany, 2008; Volume 5094, LNCS; pp. 283–296. [Google Scholar] [CrossRef]
- Homer, J. A Comprehensive Approach To Enterprise Network Security Management; Kansas State University: Manhattan, KS, USA, 2009. [Google Scholar]
- Homer, J.; Zhang, S.; Ou, X.; Schmidt, D.; Du, Y.; Rajagopalan, S.R.; Singhal, A. Aggregating Vulnerability Metrics in Enterprise Networks Using Attack Graphs. J. Comput. Secur. 2013, 21, 561–597. [Google Scholar] [CrossRef]
- Matthews, I. Machine Learning and Probabilistic Methods for Network Security Assessment. Newcastle University. 2022. Available online: https://theses.ncl.ac.uk/jspui/handle/10443/5677 (accessed on 21 August 2024).
- Barrère, M.; Hankin, C. Analysing Mission-Critical Cyber-Physical Systems with AND/OR Graphs and MaxSAT. ACM Trans. Cyber-Phys. Syst. 2021, 5, 1–29. [Google Scholar] [CrossRef]
- Zenitani, K. A Scalable Algorithm for Network Reachability Analysis with Cyclic Attack Graphs. J. Comput. Secur. 2023, 31, 29–55. [Google Scholar] [CrossRef]
- Sadeghian, A. Detecting the Most Vulnerable Nodes in the AND-OR Graph Using MITRE ATT&CK; Laval University Library: Québec, QC, Canada, 2024. [Google Scholar]
- Ingoldsby, T.R. Attack Tree Threat Risk Analysis; Amenaza Technol. Ltd.: Calgary, AB, Canada, 2013; p. 36. [Google Scholar]
- Desmedt, Y.; Wang, Y. Analyzing Vulnerabilities of Critical Infrastructures Using Flows and Critical Vertices in and/or Graphs. Int. J. Found. Comput. Sci. 2004, 15, 107–125. [Google Scholar] [CrossRef]
- Adelson-Velsky, G.M.; Levner, E. Project Scheduling in AND-OR Graphs: A Generalization of Dijkstra’s Algorithm. Math. Oper. Res. 2002, 27, 504–517. [Google Scholar] [CrossRef]
- Adelson-Velsky, G.M.; Gelbukh, A.; Levner, E. On Fast Pathfinding Algorithms in AND-OR Graphs. Math. Probl. Eng. 2002, 8, 283–293. [Google Scholar] [CrossRef]
- Ou, X.; Govindavajhala, S.; Appel, A.W. MulVAL: A Logic-Based Network Security Analyzer. In Proceedings of the USENIX Security Symposium, Baltimore, MD, USA, 31 July–5 August 2005; Volume 8, pp. 113–128. [Google Scholar]
- Zhang, J.; Wang, W.; Zio, E. Study on the Application of Graph Theory Algorithms and Attack Graphs in Cybersecurity Assessment. In Proceedings of the 2023 7th International Conference on System Reliability and Safety (ICSRS), Bologna, Italy, 22–24 November 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 558–564. [Google Scholar] [CrossRef]
- Mishra, S.; Alotaibi, W.B.; Alshehri, M.; Saxena, S. Cyber-Attacks Visualisation and Prediction in Complex Multi-Stage Network. Int. J. Comput. Appl. Technol. 2022, 68, 345–356. [Google Scholar] [CrossRef]
- Arat, F.; Akleylek, S. Attack Path Detection for IIoT Enabled Cyber Physical Systems: Revisited. Comput. Secur. 2023, 128, 103174. [Google Scholar] [CrossRef]
- Noel, S.; Jajodia, S.; O’Berry, B.; Jacobs, M. Efficient Minimum-Cost Network Hardening via Exploit Dependency Graphs. In Proceedings of the Annual Computer Security Applications Conference (ACSAC), Las Vegas, NV, USA, 8–12 December 2003; IEEE: Piscataway, NJ, USA, 2003; pp. 86–95. [Google Scholar] [CrossRef]
- De Mello, L.S.H.; Sanderson, A.C. AND/OR Graph Representation of Assembly Plans. IEEE Trans. Robot. Autom. 1990, 6, 188–199. [Google Scholar] [CrossRef]
- Wang, T.; Liu, D.X. Scheduling AND/OR Precedence Constraints Jobs to Minimize the Makespan by Mapping from CPM to AND/OR Network. In Proceedings of the 11th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, Hong Kong, China, 17–19 August 2005; IEEE: Piscataway, NJ, USA, 2005; pp. 169–172. [Google Scholar] [CrossRef]
- dos Santos Souza, U.; Protti, F. Tractability, Hardness, and Kernelization Lower Bound for and/or Graph Solution. Discret. Appl. Math. 2017, 232, 125–133. [Google Scholar] [CrossRef]
- Souza, U.D.S.; Protti, F.; Dantas Da Silva, M. Revisiting the Complexity of and/or Graph Solution. J. Comput. Syst. Sci. 2013, 79, 1156–1163. [Google Scholar] [CrossRef]
- Sotskov, Y.N. Assembly and Production Line Designing, Balancing and Scheduling with Inaccurate Data: A Survey and Perspectives. Algorithms 2023, 16, 100. [Google Scholar] [CrossRef]
- Dinic, E.A. The Fastest Algorithm for the PERT Problem with AND-and OR-Nodes (the New-Product-New-Technology Problem). In Proceedings of the 1st Integer Programming and Combinatorial Optimization Conference, Waterloo, ON, Canada, 28–30 May 1990; pp. 185–187. [Google Scholar]
- Chauvet, F.; Levner, E.; Proth, J.-M. On PERT Networks with Alternatives; INRIA: Le Chesnay-Rocquencourt, France, 1998. [Google Scholar]
- Zhang, K.; Liu, J. Review on the Application of Knowledge Graph in Cyber Security Assessment. In IOP Conference Series: Materials Science and Engineering; IOP Publishing: Bristol, UK, 2020; Volume 768, p. 52103. [Google Scholar] [CrossRef]
- Xue, B.; Zou, L. Knowledge Graph Quality Management: A Comprehensive Survey. IEEE Trans. Knowl. Data Eng. 2023, 35, 4969–4988. [Google Scholar] [CrossRef]
- Liu, K.; Wang, F.; Ding, Z.; Liang, S.; Yu, Z.; Zhou, Y. Recent Progress of Using Knowledge Graph for Cybersecurity. Electronics 2022, 11, 2287. [Google Scholar] [CrossRef]
- Noel, S.; Harley, E.; Tam, K.H.; Limiero, M.; Share, M. CyGraph: Graph-Based Analytics and Visualization for Cybersecurity. In Handbook of Statistics; Elsevier: Amsterdam, The Netherlands, 2016; Volume 35, pp. 117–167. [Google Scholar] [CrossRef]
- Noel, S.; Purdy, S.; O’Rourke, A.; Overly, E.; Chen, B.; DiFonzo, C.; Chen, J.; Sakellis, G.; Hegde, M.; Sapra, M.; et al. Graph Analytics and Visualization for Cyber Situational Understanding. J. Def. Model. Simul. 2023, 20, 81–95. [Google Scholar] [CrossRef]
- Wang, W.; Han, L.; Ge, G.; Yang, Z. An Algorithm of Optimal Penetration Path Generation under Unknown Attacks of Electric Power WEB System Based on Knowledge Graph. In Proceedings of the 2021 2nd International Conference on Computer Communication and Network Security (CCNS), Xining, China, 30 July–1 August 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 141–144. [Google Scholar] [CrossRef]
- Liu, R.; Fu, R.; Xu, K.; Shi, X.; Ren, X. A Review of Knowledge Graph-Based Reasoning Technology in the Operation of Power Systems. Appl. Sci. 2023, 13, 4357. [Google Scholar] [CrossRef]
- Byers, R.; Turner, C.T.B. National Vulnerability Database; NIST (National Institute of Standards and Technology): Gaithersburg, MD, USA, 2020. [Google Scholar]
Node | Start | 2 | 3 | 4 | 5 | 6 | |
---|---|---|---|---|---|---|---|
Step | |||||||
Initial | |||||||
(1) | |||||||
(2) | |||||||
(3) | |||||||
(1) |
Node | Start | 2 | 3 | 4 | 5 | 6 | |
---|---|---|---|---|---|---|---|
Step | |||||||
Initial | |||||||
(1) | |||||||
(2) | |||||||
(3) | |||||||
(1) | |||||||
(2) | |||||||
(3) | |||||||
(1) |
Node | Start | 2 | 3 | 4 | 5 | 6 | |
---|---|---|---|---|---|---|---|
Step | |||||||
Initial | |||||||
(1) | |||||||
(2) | |||||||
(3) | |||||||
(1) | |||||||
(2) | |||||||
(3) | |||||||
(1) | |||||||
(2) | |||||||
(3) |
Node | Start | 2 | 3 | 5 | 6 | 7 | |
---|---|---|---|---|---|---|---|
Step | |||||||
Initial | |||||||
(1) | |||||||
(2) | |||||||
(3) | |||||||
(1) | |||||||
(2) | |||||||
(3) |
Node | Start | 2 | 3 | 5 | 6 | 7 | |
---|---|---|---|---|---|---|---|
Step | |||||||
Initial | |||||||
(1) | |||||||
(2) | |||||||
(3) | |||||||
(1) | |||||||
(2) | |||||||
(3) | |||||||
(1) | |||||||
(2) |
Node ID (#1) | Node Description (#2) | Compromising Time (in Minutes) (#3) |
---|---|---|
A | Initial access obtained (e.g., phishing, exploiting an external service) | 30 |
B | Privilege escalation | 15 |
C | Gained Remote Code Execution (RCE) privileges | 60 |
D | Gaining access to restricted or high-privilege resources | 15 |
E | Execution of unauthorized or harmful operations | 20 |
F | Gaining administrative privileges | 1 |
G | Stealing sensitive data | 30 |
Node ID (#1) | Vulnerability (#2) | CVE Reference (#3) | Compromising Time (in Minutes) (#4) |
---|---|---|---|
1 | Microsoft’s Windows Print Spooler service vulnerability | CVE-2021-34527 | 10 |
2 | Windows Netlogon Service vulnerability | CVE-2020-1472 | 20 |
3 | Remote desktop services’ vulnerability | CVE-2019-0708 | 30 |
5 | Microsoft’s Windows certificate vulnerability | CVE-2020-0601 | 50 |
6 | Unix mail transfer vulnerability | CVE-2018-6789 | 20 |
7 | Microsoft’s Windows SMB protocol vulnerability | CVE-2017-0144 | 10 |
8 | Enterprise network infrastructure vulnerability | CVE-2021-22986 | 45 |
9 | HTTP Protocol vulnerability | CVE-2021-31166 | 60 |
10 | Windows name resolution server vulnerability | CVE-2020-1350 | 10 |
11 | Web application vulnerability | CVE-2017-5638 | 5 |
12 | Microsoft .NET Framework vulnerability | CVE-2017-8759 | 60 |
13 | Microsoft Office Memory Corruption Vulnerability | CVE-2017-11882 | 6 |
Node | Start | 1 | 2 | 3 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | A | B | C | D | E | F | G | |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Step | ||||||||||||||||||||
Initial | ||||||||||||||||||||
(1) | ||||||||||||||||||||
(2) | ||||||||||||||||||||
(3) | ||||||||||||||||||||
(1) | ||||||||||||||||||||
(2) | ||||||||||||||||||||
(3) | ||||||||||||||||||||
(1) | ||||||||||||||||||||
(2) | ||||||||||||||||||||
(3) | ||||||||||||||||||||
(1) | ||||||||||||||||||||
(2) | ||||||||||||||||||||
(3) | ||||||||||||||||||||
(1) | ||||||||||||||||||||
(2) | ||||||||||||||||||||
(3) | ||||||||||||||||||||
(1) | ||||||||||||||||||||
(2) | ||||||||||||||||||||
(3) | ||||||||||||||||||||
(1) | ||||||||||||||||||||
(2) | ||||||||||||||||||||
(3) |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Levner, E.; Tsadikovich, D. Fast Algorithm for Cyber-Attack Estimation and Attack Path Extraction Using Attack Graphs with AND/OR Nodes. Algorithms 2024, 17, 504. https://doi.org/10.3390/a17110504
Levner E, Tsadikovich D. Fast Algorithm for Cyber-Attack Estimation and Attack Path Extraction Using Attack Graphs with AND/OR Nodes. Algorithms. 2024; 17(11):504. https://doi.org/10.3390/a17110504
Chicago/Turabian StyleLevner, Eugene, and Dmitry Tsadikovich. 2024. "Fast Algorithm for Cyber-Attack Estimation and Attack Path Extraction Using Attack Graphs with AND/OR Nodes" Algorithms 17, no. 11: 504. https://doi.org/10.3390/a17110504
APA StyleLevner, E., & Tsadikovich, D. (2024). Fast Algorithm for Cyber-Attack Estimation and Attack Path Extraction Using Attack Graphs with AND/OR Nodes. Algorithms, 17(11), 504. https://doi.org/10.3390/a17110504