IEEE Access | |
A Master Attack Methodology for an AI-Based Automated Attack Planner for Smart Cities | |
Gregory Falco1  Carlos Caldera1  Howard Shrobe1  Arun Viswanathan2  | |
[1] Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology, Cambridge, MA, USA;Jet Propulsion Laboratory, California Institute of Technology, Pasadena, CA, USA; | |
关键词: AI planning; attack trees; cyber audit tools; cyber risk; cybersecurity; IIoT; | |
DOI : 10.1109/ACCESS.2018.2867556 | |
来源: DOAJ |
【 摘 要 】
America's critical infrastructure is becoming “smarter”and increasingly dependent on highly specialized computers called industrial control systems (ICS). Networked ICS components now called the industrial Internet of Things (IIoT) are at the heart of the “smart city”, controlling critical infrastructure, such as CCTV security networks, electric grids, water networks, and transportation systems. Without the continuous, reliable functioning of these assets, economic and social disruption will ensue. Unfortunately, IIoT are hackable and difficult to secure from cyberattacks. This leaves our future smart cities in a state of perpetual uncertainty and the risk that the stability of our lives will be upended. The Local government has largely been absent from conversations about cybersecurity of critical infrastructure, despite its importance. One reason for this is public administrators do not have a good way of knowing which assets and which components of those assets are at the greatest risk. This is further complicated by the highly technical nature of the tools and techniques required to assess these risks. Using artificial intelligence planning techniques, an automated tool can be developed to evaluate the cyber risks to critical infrastructure. It can be used to automatically identify the adversarial strategies (attack trees) that can compromise these systems. This tool can enable both security novices and specialists to identify attack pathways. We propose and provide an example of an automated attack generation method that can produce detailed, scalable, and consistent attack trees-the first step in securing critical infrastructure from cyberattack.
【 授权许可】
Unknown