Security Management Using Planning Domain Definition Language: A Case For Ransomware Mitigation

  • Afaq Inayat UFRGS
  • Muriel F. Franco UFRGS
  • Eder J. Scheid UFRGS
  • Lisandro Z. Granville UFRGS

Resumo


Network automation is essential for efficiently managing complex networks, enhancing reliability, and reducing human errors. This work proposes a novel approach to automate security planning and management using the Planning Domain Definition Language (PDDL). PDDL is used to generate an action plan to mitigate imminent threats to companies’ networks. The work demonstrates how PDDL can be applied to security planning in a dedicated scenario where there is a need to mitigate a ransomware attack targeting a company.

Referências

Bezawada, B., Ray, I., and Tiwary, K. (2019). AGBuilder: an AI tool for automated attack graph building, analysis, and refinement. In Data and Applications Security and Privacy (DBSec 2019), pages 23–42, Charleston, SC, USA. Springer.

Choi, T., Ko, R. K., Saha, T., Scarsbrook, J., Koay, A. M., Wang, S., Zhang, W., and St Clair, C. (2021). Plan2defend: Ai planning for cybersecurity in smart grids. 2021 IEEE PES Innovative Smart Grid Technologies-Asia (ISGT Asia), pages 1–5.

Falco, G., Viswanathan, A., Caldera, C., and Shrobe, H. (2018). A master attack methodology for an ai-based automated attack planner for smart cities. IEEE Access, 6:48360–48373.

Franco, M. F., Granville, L. Z., and Stiller, B. (2023). CyberTEA: a Technical and Economic Approach for Cybersecurity Planning and Investment. In 36th IEEE/IFIP Network Operations and Management Symposium (NOMS 2023), pages 1–6.

Haslum, P., Lipovetzky, N., Magazzeni, D., Muise, C., Brachman, R., Rossi, F., and Stone, P. (2019). An introduction to the planning domain definition language, volume 13. Springer.

Obes, J. L., Sarraute, C., and Richarte, G. (2013). Attack planning in the real world. arXiv preprint arXiv:1306.4044.

Pandey, A. B., Tripathi, A., and Vashist, P. C. (2022). A survey of cyber security trends, emerging technologies and threats. Cyber Security in Intelligent Computing and Communications, pages 19–33.

Pang, L., Yang, C., Chen, D., Song, Y., and Guizani, M. (2020). A survey on intent-driven networks. IEEE Access, 8:22862–22873.

Wan, H., Liu, G., and Zhang, L. (2021). Research on the application of artificial intelligence in computer network technology. In 5th International Conference on Electronic Information Technology and Computer Engineering, pages 704–707.
Publicado
23/10/2023
Como Citar

Selecione um Formato
INAYAT, Afaq; FRANCO, Muriel F.; SCHEID, Eder J.; GRANVILLE, Lisandro Z.. Security Management Using Planning Domain Definition Language: A Case For Ransomware Mitigation. In: ESCOLA REGIONAL DE REDES DE COMPUTADORES (ERRC), 20. , 2023, Porto Alegre/RS. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2023 . p. 31-36. DOI: https://doi.org/10.5753/errc.2023.902.