Visible to the public Verifying Attack Graphs through Simulation

TitleVerifying Attack Graphs through Simulation
Publication TypeConference Paper
Year of Publication2017
AuthorsHill, Z., Nichols, W. M., Papa, M., Hale, J. C., Hawrylak, P. J.
Conference Name2017 Resilience Week (RWS)
KeywordsAnalytical models, attack graph verification, Attack Graphs, composability, control systems, Cyber physical system, cyber physical system simulation, Cyber-physical systems, Data models, graph theory, hybrid attack graph, Inductors, Metrics, Nuclear Reactor, Predictive models, pubcrawl, resilience, Resiliency, security, security of data, simulated environment, simulation, Temperature sensors, time-consuming process
Abstract

Verifying attacks against cyber physical systems can be a costly and time-consuming process. By using a simulated environment, attacks can be verified quickly and accurately. By combining the simulation of a cyber physical system with a hybrid attack graph, the effects of a series of exploits can be accurately analysed. Furthermore, the use of a simulated environment to verify attacks may uncover new information about the nature of the attacks.

URLhttps://ieeexplore.ieee.org/document/8088649/
DOI10.1109/RWEEK.2017.8088649
Citation Keyhill_verifying_2017