Characterizing attacker behavior with respect to Cyber-Physical Systems is important to assuring the security posture and resilience of these systems. Classical cyber vulnerability assessment approaches rely on the knowledge and experience of cyber-security experts to conduct security analyses and can be inconsistent where the experts' knowledge and experience are lacking. This paper proposes a flexible attacker modeling framework that aids in the security analysis process by simulating a diverse set of attacker behaviors to predict attack progression and provide consistent system vulnerability analysis. The model proposes an expanded architecture of vulnerability databases to maximize its effectiveness and consistency in detecting CPS vulnerabilities while being compatible with existing vulnerability databases. The model has the power to be implemented and simulated against an actual or virtual CPS. Execution of the attacker model is demonstrated against a simulated industrial control system architecture, resulting in a probabilistic prediction of attacker behavior.
翻译:典型的网络脆弱性评估方法依靠网络安全专家的知识和经验进行安全分析,在专家的知识和经验缺乏的地方可能不一致。本文件建议建立一个灵活的攻击者模型框架,通过模拟各种攻击者行为来预测攻击进展并提供一致的系统脆弱性分析,协助安全分析进程。模型建议扩大脆弱性数据库结构,以最大限度地提高发现CPS脆弱性的有效性和一致性,同时与现有脆弱性数据库兼容。模型具有实际或虚拟CPS实施和模拟的能力。执行攻击者模型是对模拟工业控制系统结构的证明,从而对攻击者行为作出概率预测。