Analysis of the Benefits and Efficacy of the Addition of Variants and Reality Paths to the Blackboard Architecture

06/20/2023
by   Ben Clark, et al.
0

While the Blackboard Architecture has been in use since the 1980s, it has recently been proposed for modeling computer networks to assess their security. To do this, it must account for complex network attack patterns involving multiple attack routes and possible mid-attack system state changes. This paper proposes a data structure which can be used to model paths from an ingress point to a given egress point in Blackboard Architecture-modeled computer networks. It is designed to contain the pertinent information required for a systematic traversal through a changing network. This structure, called a reality path, represents a single potential pathway through the network with a given set of facts in a particular sequence of states. Another structure, called variants, is used during traversal of nodes (called containers) modeled in the network. The two structures - reality paths and variants - facilitate the use of a traversal algorithm, which will find all possible attack paths in Blackboard Architecture-modeled networks. This paper introduces and assesses the efficacy of variants and reality paths

READ FULL TEXT

page 9

page 19

research
06/11/2020

How to Document Computer Networks

Documenting networks is an essential tool for troubleshooting network pr...
research
04/15/2021

Discover the Hidden Attack Path in Multi-domain Cyberspace Based on Reinforcement Learning

In this work, we present a learning-based approach to analysis cyberspac...
research
10/15/2022

Dynamics-aware Adversarial Attack of Adaptive Neural Networks

In this paper, we investigate the dynamics-aware adversarial attack prob...
research
06/07/2023

Introduction and Assessment of the Addition of Links and Containers to the Blackboard Architecture

The Blackboard Architecture provides a mechanism for storing data and lo...
research
07/09/2020

Weakness Analysis of Cyberspace Configuration Based on Reinforcement Learning

In this work, we present a learning-based approach to analysis cyberspac...
research
10/22/2019

Simplification of networks via conservation of path diversity and minimisation of the search information

Alternative paths in a network play an important role in its functionali...
research
10/25/2018

Sorry: Ambient Tactical Deception Via Malware-Based Social Engineering

In this paper we argue, drawing from the perspectives of cybersecurity a...

Please sign up or login with your details

Forgot password? Click here to reset