-
MaxSAT Evaluation 2020 -- Benchmark: Identifying Maximum Probability Minimal Cut Sets in Fault Trees
Abstract: This paper presents a MaxSAT benchmark focused on the identification of Maximum Probability Minimal Cut Sets (MPMCSs) in fault trees. We address the MPMCS problem by transforming the input fault tree into a weighted logical formula that is then used to build and solve a Weighted Partial MaxSAT problem. The benchmark includes 80 cases with fault trees of different size and composition as well as th… ▽ More
Submitted 16 July, 2020; originally announced July 2020.
Comments: 5 pages, 1 figure. To appear in Proceedings of the MaxSAT Evaluation 2020 (MSE'20). https://maxsat-evaluations.github.io/2020/
MSC Class: 68M15; 05C05; 94C15; 68R10; 90B25; 93B20; 90C27; 90C35; 68U07; 03B05 ACM Class: B.8; C.4; G.2.2; F.4.1; J.6; J.7; B.6.3; D.4.5; D.4.6; J.2
-
Fault Tree Analysis: Identifying Maximum Probability Minimal Cut Sets with MaxSAT
Abstract: In this paper, we present a novel MaxSAT-based technique to compute Maximum Probability Minimal Cut Sets (MPMCSs) in fault trees. We model the MPMCS problem as a Weighted Partial MaxSAT problem and solve it using a parallel SAT-solving architecture. The results obtained with our open source tool indicate that the approach is effective and efficient.
Submitted 5 May, 2020; originally announced May 2020.
Comments: Accepted for publication at the 50th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2020), Fast Abstracts Track, 2020
MSC Class: 68M15; 05C05; 94C15; 68R10; 90B25; 93B20; 90C27; 90C35; 68U07; 03B05 ACM Class: B.8; C.4; G.2.2; F.4.1; J.6; J.7; B.6.3; D.4.5; D.4.6; J.2
-
Assessing Cyber-Physical Security in Industrial Control Systems
Abstract: Over the last years, Industrial Control Systems (ICS) have become increasingly exposed to a wide range of cyber-physical threats. Efficient models and techniques able to capture their complex structure and identify critical cyber-physical components are therefore essential. AND/OR graphs have proven very useful in this context as they are able to semantically grasp intricate logical interdependenc… ▽ More
Submitted 21 November, 2019; originally announced November 2019.
Comments: 10 pages, 10 figures. Keywords: security metrics, cyber-physical security, AND-OR graphs, hypergraphs, MAX-SAT resolution, ICS, CPS
Journal ref: 6th International Symposium for ICS & SCADA Cyber Security Research 2019 (ICS-CSR), pp. 49-58 (2019)
-
MaxSAT Evaluation 2019 -- Benchmark: Identifying Security-Critical Cyber-Physical Components in Weighted AND/OR Graphs
Abstract: This paper presents a MaxSAT benchmark focused on identifying critical nodes in AND/OR graphs. We use AND/OR graphs to model Industrial Control Systems (ICS) as they are able to semantically grasp intricate logical interdependencies among ICS components. However, identifying critical nodes in AND/OR graphs is an NP-complete problem. We address this problem by efficiently transforming the input AND… ▽ More
Submitted 1 November, 2019; originally announced November 2019.
Comments: arXiv admin note: substantial text overlap with arXiv:1905.04796
-
Identifying Security-Critical Cyber-Physical Components in Industrial Control Systems
Abstract: In recent years, Industrial Control Systems (ICS) have become an appealing target for cyber attacks, having massive destructive consequences. Security metrics are therefore essential to assess their security posture. In this paper, we present a novel ICS security metric based on AND/OR graphs that represent cyber-physical dependencies among network components. Our metric is able to efficiently ide… ▽ More
Submitted 12 May, 2019; originally announced May 2019.
Comments: Keywords: Security metrics, industrial control systems, cyber-physical systems, AND-OR graphs, MAX-SAT resolution
-
arXiv:1510.02427 [pdf, ps, other]
Exact Inference Techniques for the Analysis of Bayesian Attack Graphs
Abstract: Attack graphs are a powerful tool for security risk assessment by analysing network vulnerabilities and the paths attackers can use to compromise network resources. The uncertainty about the attacker's behaviour makes Bayesian networks suitable to model attack graphs to perform static and dynamic analysis. Previous approaches have focused on the formalization of attack graphs into a Bayesian model… ▽ More
Submitted 4 November, 2016; v1 submitted 8 October, 2015; originally announced October 2015.
Comments: 14 pages, 15 figures
MSC Class: 62F15