Verifying Attack Graphs through Simulation
Title | Verifying Attack Graphs through Simulation |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Hill, Z., Nichols, W. M., Papa, M., Hale, J. C., Hawrylak, P. J. |
Conference Name | 2017 Resilience Week (RWS) |
Keywords | Analytical models, attack graph verification, Attack Graphs, composability, control systems, Cyber physical system, cyber physical system simulation, Cyber-physical systems, Data models, graph theory, hybrid attack graph, Inductors, Metrics, Nuclear Reactor, Predictive models, pubcrawl, resilience, Resiliency, security, security of data, simulated environment, simulation, Temperature sensors, time-consuming process |
Abstract | Verifying attacks against cyber physical systems can be a costly and time-consuming process. By using a simulated environment, attacks can be verified quickly and accurately. By combining the simulation of a cyber physical system with a hybrid attack graph, the effects of a series of exploits can be accurately analysed. Furthermore, the use of a simulated environment to verify attacks may uncover new information about the nature of the attacks. |
URL | https://ieeexplore.ieee.org/document/8088649/ |
DOI | 10.1109/RWEEK.2017.8088649 |
Citation Key | hill_verifying_2017 |
- Metrics
- time-consuming process
- Temperature sensors
- simulation
- simulated environment
- security of data
- security
- Resiliency
- resilience
- pubcrawl
- Predictive models
- Nuclear Reactor
- Analytical models
- Inductors
- hybrid attack graph
- graph theory
- Data models
- cyber-physical systems
- cyber physical system simulation
- Cyber Physical System
- control systems
- composability
- attack graphs
- attack graph verification