Open Access
ARTICLE
APU-D* Lite: Attack Planning under Uncertainty Based on D* Lite
1 State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, 450001, China.
2 School of Electrical Engineering and Telecommunications UNSW, Kensington, NSW 2033, Australia.
* Corresponding Author: Yichao Zang. Email: .
Computers, Materials & Continua 2020, 65(2), 1795-1807. https://doi.org/10.32604/cmc.2020.011071
Received 17 April 2020; Accepted 29 April 2020; Issue published 20 August 2020
Abstract
With serious cybersecurity situations and frequent network attacks, the demands for automated pentests continue to increase, and the key issue lies in attack planning. Considering the limited viewpoint of the attacker, attack planning under uncertainty is more suitable and practical for pentesting than is the traditional planning approach, but it also poses some challenges. To address the efficiency problem in uncertainty planning, we propose the APU-D* Lite algorithm in this paper. First, the pentest framework is mapped to the planning problem with the Planning Domain Definition Language (PDDL). Next, we develop the pentest information graph to organize network information and assess relevant exploitation actions, which helps to simplify the problem scale. Then, the APUD* Lite algorithm is introduced based on the idea of incremental heuristic searching. This method plans for both hosts and actions, which meets the requirements of pentesting. With the pentest information graph as the input, the output is an alternating host and action sequence. In experiments, we use the attack success rate to represent the uncertainty level of the environment. The result shows that APU-D* Lite displays better reliability and efficiency than classical planning algorithms at different attack success rates.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.