Study on the Application of Graph Theory Algorithms and Attack Graphs in Cybersecurity Assessment

Jinghan Zhang, Wei Wang*, Enrico Zio

*Corresponding author for this work

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

5 Citations (Scopus)

Abstract

Postulating the behavior of attackers is important in the design of cybersecurity protection measures. Attack graph is a technique employed for this purpose, which aids in identifying and modeling the potential attack paths an attacker could take to gain unauthorized access to a cyber network, exploit vulnerabilities, and compromise the system's confidentiality, integrity, and availability. In this study, we propose a framework aimed at identifying potential attack paths and determining the shortest path with the highest probability of a successful attack. Meanwhile, based on the attack graph determine the minimum patch sets with the most severity to protect the network security. Common Vulnerability Scoring System (CVSS) is utilized to quantify the exploitability and severity of each vulnerability. The Dijkstra algorithm is utilized to calculate the shortest path with the highest probability, and the Stoer-Wagner algorithm is utilized to calculate the minimum patch sets with the most severity. To demonstrate the proposed framework, we apply it to a simplified SCADA system within a corporate network susceptible to cyber attacks. © 2023 IEEE.
Original languageEnglish
Title of host publication2023 7th International Conference on System Reliability and Safety (ICSRS)
PublisherIEEE
Pages558-564
ISBN (Electronic)979-8-3503-0605-7, 979-8-3503-0604-0
ISBN (Print)979-8-3503-0606-4
DOIs
Publication statusPublished - Nov 2023
Event7th International Conference on System Reliability and Safety (ICSRS 2023) - Bologna, Italy
Duration: 22 Nov 202324 Nov 2023

Publication series

NameInternational Conference on System Reliability and Safety, ICSRS

Conference

Conference7th International Conference on System Reliability and Safety (ICSRS 2023)
PlaceItaly
CityBologna
Period22/11/2324/11/23

Funding

This work was supported by National Natural Science Foundation of China (Project no. 72101221) and GRF – RGC General Research Fund CityU 11215323 (Project no. 9043545).

Research Keywords

  • attack graph
  • attack path
  • CVSS
  • cybersecurity
  • Dijkstra algorithm
  • patch set
  • Stoer-Wagner algorithm

Fingerprint

Dive into the research topics of 'Study on the Application of Graph Theory Algorithms and Attack Graphs in Cybersecurity Assessment'. Together they form a unique fingerprint.

Cite this