Development of a System Vulnerability Analysis Tool for Assessment of Complex Mission Critical Systems

06/07/2023
by   Matthew Tassava, et al.
0

A system vulnerability analysis technique (SVAT) for complex mission critical systems (CMCS) was developed in response to the need to be able to conduct penetration testing on large industrial systems which cannot be taken offline or risk disablement or impairment for conventional penetration testing. SVAT-CMCS facilitates the use of known vulnerability and exploit information, incremental testing of system components and data analysis techniques to identify attack pathways in CMCSs. This data can be utilized for corrective activities or to target controlled manual follow-up testing. This paper presents the SVAT-CMCS paradigm and describes its implementation in a software tool, which was built using the Blackboard Architecture, that can be utilized for attack pathway identification. The performance of this tool is characterized using three example models. In particular, it explores the path generation speed and the impact of link cap restrictions on system operations, under different levels of network size and complexity. Accurate fact-rule processing is also tested using these models. The results show significant decreases in path generation efficiency as the link cap and network complexity increase; however, rule processing accuracy is not impacted.

READ FULL TEXT

page 8

page 13

page 14

research
03/10/2020

Predicting the vulnerability of spacecraft components: modelling debris impact effects through vulnerable-zones

The space environment around the Earth is populated by more than 130 mil...
research
06/07/2023

Development of a Multi-purpose Fuzzer to Perform Assessment as Input to a Cybersecurity Risk Assessment and Analysis System

Fuzzing is utilized for testing software and systems for cybersecurity r...
research
08/09/2017

Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance

As the size and complexity of software systems increase, the number and ...
research
06/14/2023

Vulnerability Assessment of Industrial Control System with an Improved CVSS

Cyberattacks on industrial control systems (ICS) have been drawing atten...
research
12/02/2021

A Grounded Theory Based Approach to Characterize Software Attack Surfaces

The notion of Attack Surface refers to the critical points on the bounda...
research
11/24/2022

Cutting Medusa's Path – Tackling Kill-Chains with Quantum Computing

This paper embarks upon exploration of quantum vulnerability analysis. B...

Please sign up or login with your details

Forgot password? Click here to reset