Visible to the public Assessing Level of Resilience Using Attack Graphs

TitleAssessing Level of Resilience Using Attack Graphs
Publication TypeConference Paper
Year of Publication2018
AuthorsIbrahim, M., Alsheikh, A.
Conference Name2018 10th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)
KeywordsAADL, Analytical models, architecture analysis-&-design language, attack graph, Attack Graphs, Communication networks, cyber-attacks, cyber-physical-systems, faults, generated attack scenarios, generated attack sequences, generated network models, graph theory, JKind model checker integrated tool, Local area networks, possible attack instances, program verification, program visualisation, pubcrawl, resilience, resilience level assessment, Resiliency, Resilient Security Architectures, security, security of data, security property, stability, Stability analysis, system resiliency, Tools, Unity software
AbstractCyber-Physical-Systems are subject to cyber-attacks due to existing vulnerabilities in the various components constituting them. System Resiliency is concerned with the extent the system is able to bounce back to a normal state under attacks. In this paper, two communication Networks are analyzed, formally described, and modeled using Architecture Analysis & Design Language (AADL), identifying their architecture, connections, vulnerabilities, resources, possible attack instances as well as their pre-and post-conditions. The generated network models are then verified against a security property using JKind model checker integrated tool. The union of the generated attack sequences/scenarios resulting in overall network compromise (given by its loss of stability) is the Attack graph. The generated Attack graph is visualized graphically using Unity software, and then used to assess the worst Level of Resilience for both networks.
DOI10.1109/ECAI.2018.8679044
Citation Keyibrahim_assessing_2018