Automated Enrichment of Logical Attack Graphs via Formal Ontologies

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Attack graphs represent the possible actions of adversaries to attack a system. Cybersecurity experts use them to make decisions concerning remediation and recovery plans. There are different attack graph-building approaches. We focus on logical attack graphs. Networks and vulnerabilities constantly change; we propose an attack graph enrichment approach based on semantic augmentation post-processing of the logic predicates. Mapping attack graphs with alerts from a monitored system allows for confirming successful attack actions and updating according to network and vulnerability changes. The predicates get periodically updated based on attack evidence and ontology knowledge, allowing us to verify whether changes lead the attacker to the initial goals or cause further damage to the system not anticipated in the initial graphs. We illustrate our approach using a specific cyber-physical scenario affecting smart cities.

Original languageEnglish
Title of host publicationICT Systems Security and Privacy Protection - 38th IFIP TC 11 International Conference, SEC 2023, Revised Selected Papers
EditorsNorbert Meyer, Anna Grocholewska-Czuryło
PublisherSpringer Science and Business Media Deutschland GmbH
Pages59-72
Number of pages14
ISBN (Print)9783031563256
DOIs
Publication statusPublished - 1 Jan 2024
Event38th IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection, SEC 2023 - Poznan, Poland
Duration: 14 Jun 202316 Jun 2023

Publication series

NameIFIP Advances in Information and Communication Technology
Volume679 IFIPAICT
ISSN (Print)1868-4238
ISSN (Electronic)1868-422X

Conference

Conference38th IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection, SEC 2023
Country/TerritoryPoland
CityPoznan
Period14/06/2316/06/23

Keywords

  • Attack Graph
  • Cybsersecurity
  • Defense Graph
  • Ontology

Fingerprint

Dive into the research topics of 'Automated Enrichment of Logical Attack Graphs via Formal Ontologies'. Together they form a unique fingerprint.

Cite this