Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1007/978-3-030-64330-0_2guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Attack Path Analysis for Cyber Physical Systems

Published: 14 September 2020 Publication History

Abstract

The identification and analysis of potential paths that an adversary may exploit to attack Cyber Physical Systems comprising sub-systems enables the comprehensive understanding of the attacks and the impact that may have to the overall system, thus facilitating the definition of appropriate countermeasures that will satisfy the pertinent security requirements. To this end, several attack modelling techniques can be employed, the attack graph being the most prevalent among them. Unfortunately, the discovery and analysis of all possible attack paths in an attack graph is not possible in systems even of a moderate size. In this work we propose a novel systematic method for discovering and analyzing attack paths in real-world scale interconnected Cyber Physical Systems. The method considers the criticality of each sub-system in discovering paths and the risk to the overall system that each path presents to analyze and prioritize paths. We illustrate the workings of the method by applying to the navigational Cyber Physical Systems of the Cyber-Enabled Ship to identify and analyze highly critical attack paths originating from the Automatic Identification System (AIS) and targeting the Autonomous Navigation System (ANS).

References

[1]
Al-Mhiqani MN, Ahmad R, Yassin W, Hassan A, Abidin ZZ, Ali NS, and Abdulkareem KH Cyber-security incidents: a review cases in cyber-physical systems Int. J. Adv. Comput. Sci. Appl. 2018 9 1 499-508
[2]
Kavallieratos G, Katsikas S, and Gkioulos V Nguyen NT, Jearanaitanakij K, Selamat A, Trawiński B, and Chittayasothorn S Modelling shipping 4.0: a reference architecture for the cyber-enabled ship Intelligent Information and Database Systems 2020 Cham Springer 202-217
[3]
Emad, G.R., Khabir, M., Shahbakhsh, M.: Shipping 4.0 and training seafarers for the future autonomous and unmanned ships. In: Proceedings of the 21th Marine Industries Conference (MIC 2019), pp. 202–217(2020)
[4]
Chang, C.H., Wenming, S., Wei, Z., Changki, P., Kontovas, C.A.: Evaluating cybersecurity risks in the maritime industry: a literature review. In: Proceedings of the International Association of Maritime Universities (IAMU) Conference (2019)
[5]
Silgado, D.M.: Cyber-attacks: a digital threat reality affecting the maritime industry (2018)
[6]
Hassani, V., Crasta, N., Pascoal, A.M.: Cyber security issues in navigation systems of marine vessels from a control perspective. In: Proceedings of the ASME: 36th International Conference on Ocean, p. 2017. American Society of Mechanical Engineers Digital Collection, Offshore and Arctic Engineering (2017)
[7]
Kavallieratos G, Katsikas S, and Gkioulos V Katsikas SK, Cuppens F, Cuppens N, Lambrinoudakis C, Antón A, Gritzalis S, Mylopoulos J, and Kalloniatis C Cyber-attacks against the autonomous ship Computer Security 2019 Cham Springer 20-36
[8]
Chen, Y.C., Mooney, V., Grijalva, S.: A survey of attack models for cyber-physical security assessment in electricity grid. In: Proceedings of the 2019 IFIP/IEEE 27th International Conference on Very Large Scale Integration (VLSI-SoC), pp. 242–243. IEEE (2019)
[9]
Lallie HS, Debattista K, and Bal J A review of attack graph and attack tree visual syntax in cyber security Comput. Sci. Rev. 2020 35 100219
[10]
Al-Mohannadi, H., Mirza, Q., Namanya, A., Awan, I., Cullen, A., Disso, J.: Cyber-attack modeling analysis techniques: an overview. In: Proceedings of the 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), pp. 69–76. IEEE (2016)
[11]
Hong JB and Kim DS Janczewski LJ, Wolfe HB, and Shenoi S Performance analysis of scalable attack representation models Security and Privacy Protection in Information Processing Systems 2013 Heidelberg Springer 330-343
[12]
Xie, A., Cai, Z., Tang, C., Hu, J., Chen, Z.: Evaluating network security with two-layer attack graphs. In: Proceedings of the 2009 Annual Computer Security Applications Conference, pp. 127–136 (2009)
[13]
Ou, X., Boyer, W.F., McQueen, M.A.: A scalable approach to attack graph generation. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, pp. 336–345. Association for Computing Machinery, New York, NY, USA (2006)
[14]
Sheyner, O., Haines, J., Jha, S., Lippmann, R., Wing, J.M.: Automated generation and analysis of attack graphs. In: Proceedings 2002 IEEE Symposium on Security and Privacy, pp. 273–284 (2002)
[15]
Dacier M, Deswarte Y, and Kaâniche M Models and tools for quantitative assessment of operational security Information Systems Security 1996 Boston, MA Springer 177-186
[16]
Dacier, M.: Towards Quantitative Evaluation of Computer Security. Ph.D. thesis, Institut National Polytechnique de Toulouse (1994)
[17]
Dacier M and Deswarte Y Gollmann D Privilege graph: an extension to the typed access matrix model Computer Security — ESORICS 1994 1994 Heidelberg Springer 319-334
[18]
Phillips, C., Swiler, L.P.: A graph-based system for network-vulnerability analysis. In Proceedings of the 1998 Workshop on New Security Paradigms, NSPW 1998, pp. 71–79. Association for Computing Machinery, New York, NY, USA (1998)
[19]
Khaitan S and Raheja S Finding optimal attack path using attack graphs: a survey Int. J. Soft Comput. Eng. 2011 1 3 2231-2307
[20]
Ou X and Singhal A Ou X and Singhal A Quantitative security risk assessment of enterprise networks Attack Graph Techniques 2011 New York Springer 5-8
[21]
Swiler, L.P., Phillips, C., Ellis, D., Chakerian, S.: Computer-attack graph generation tool. In: Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX 2001, Vol. 2, pp. 307–321 (2001)
[22]
Ou, X., Govindavajhala, S., Appel, A.: MulVAL: a logic-based network security analyzer. In: Proceedings of the USENIX Security Symposium 2005, pp. 113–127 (2005)
[23]
Jajodia S, Noel S, and O’Berry B Kumar V, Srivastava J, and Lazarevic A Topological analysis of network attack vulnerability Managing Cyber Threats Massive Computing 2005 Boston, MA Springer 244-266
[24]
Ammann, P., Wijesekera, D., Kaushik, S.: Scalable, graph-based network vulnerability analysis. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, pp. 217–224. Association for Computing Machinery, New York, NY, USA (2002)
[25]
Zeng J, Wu S, Chen Y, Zeng R, and Wu C Survey of attack graph analysis methods from the perspective of data and knowledge processing Secur. Commun. Netw. 2019 2019 1-17
[26]
Hsu LH and Lin CK Graph Theory and Interconnection Networks 2019 Boca Raton CRC Press
[27]
Ingols, K., Lippmann, R., Piwowarski, K.: Practical attack graph generation for network defense. In: Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC2006), pp. 121–130 (2006)
[28]
Kaynar K and Sivrikaya F Distributed attack graph generation IEEE Trans. Depend. Secur. Comput. 2016 13 5 519-532
[29]
Bi K, Han D, and Jun W K maximum probability attack paths dynamic generation algorithm Comput. Sci. Inform. Syst. 2016 13 2 677-689
[30]
Poolsappasit N, Dewri R, and Ray I Dynamic security risk management using Bayesian attack graphs IEEE Trans. Depend. Secur. Comput. 2012 9 1 61-74
[31]
Jehyun L., Heejo L., Peter, H.: Scalable attack graph for risk assessment. In: Proceedings of the International Conference on Information Networking, pp. 1–5 (2009)
[32]
Dai F, Hu Y, Zheng K, and Wu B Exploring risk flow attack graph for security risk assessment IET Inform. Secur. 2015 9 6 344-353
[33]
Castellanos, J.H., Ochoa, M., Zhou, J.: Finding dependencies between cyber-physical domains for security testing of industrial control systems. In: Proceedings of the 34th Annual Computer Security Applications Conference, pp. 582–594 (2018)
[34]
Polatidis N, Pavlidis M, and Mouratidis H Cyber-attack path discovery in a dynamic supply chain maritime risk management system Comput. Stand. Interf. 2018 56 74-82
[35]
Mouratidis H and Diamantopoulou V A security analysis method for industrial internet of things IEEE Trans. Indust. Inform. 2018 14 9 4093-4100
[36]
Ibrahim M, Al-Hindawi Q, Elhafiz R, Alsheikh A, and Alquq O Attack graph implementation and visualization for cyber physical systems Processes 2020 8 1 12
[37]
Bolbot, V., Theotokatos, G., Boulougouris, E., Vassalos, D.: Safety related cyber-attacks identification and assessment for autonomous inland ships. In: Proceedings of the International Seminar on Safety and Security of Autonomous Vessels (ISSAV) (2019)
[38]
Akbarzadeh, A., Katsikas, S.: Identifying critical components in large scale cyber physical systems. In: Proceedings of the 1st International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS) (2020)
[39]
Shostack A Threat modeling: Designing for security 2014 New Jersey John Wiley & Sons
[41]
Zinsmaier, S.D., Langweg, H., Waldvogel, M.: A practical approach to stakeholder-driven determination of security requirements based on the GDPR and common criteria. In: Proceedings of the International Conference on Information Systems Security and Privacy ICISSP, pp. 473–480 (2020)
[43]
Guide for conducting risk assessments. NIST SP 800–30 Rev. 1, National Institute of Standards and Technology, Gaithersburg MD, USA (2012)
[44]
Kavallieratos G, Diamantopoulou V, and Katsikas SK Shipping 4.0: Security requirements for the cyber-enabled ship IEEE Trans. Indust. Inform. 2020 16 10 6617-6625

Cited By

View all
  • (2024)It is Time To Steer: A Scalable Framework for Analysis-Driven Attack Graph GenerationComputer Security – ESORICS 202410.1007/978-3-031-70903-6_12(229-250)Online publication date: 16-Sep-2024
  • (2021)Attack Path Analysis and Cost-Efficient Selection of Cybersecurity Controls for Complex Cyberphysical SystemsComputer Security. ESORICS 2021 International Workshops10.1007/978-3-030-95484-0_5(74-90)Online publication date: 4-Oct-2021

Index Terms

  1. Attack Path Analysis for Cyber Physical Systems
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image Guide Proceedings
      Computer Security: ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14–18, 2020, Revised Selected Papers
      Sep 2020
      274 pages
      ISBN:978-3-030-64329-4
      DOI:10.1007/978-3-030-64330-0

      Publisher

      Springer-Verlag

      Berlin, Heidelberg

      Publication History

      Published: 14 September 2020

      Author Tags

      1. Cyber physical systems
      2. Attack path analysis
      3. Navigational system
      4. Autonomous ships

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 02 Oct 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)It is Time To Steer: A Scalable Framework for Analysis-Driven Attack Graph GenerationComputer Security – ESORICS 202410.1007/978-3-031-70903-6_12(229-250)Online publication date: 16-Sep-2024
      • (2021)Attack Path Analysis and Cost-Efficient Selection of Cybersecurity Controls for Complex Cyberphysical SystemsComputer Security. ESORICS 2021 International Workshops10.1007/978-3-030-95484-0_5(74-90)Online publication date: 4-Oct-2021

      View Options

      View options

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media