Research Article
An Automatic Planning-Based Attack Path Discovery Approach from IT to OT Networks
Algorithm 2
Automatic construction of PDDL domain and problem files.
| Input: pddl file template domain_temp and problem_temp | | connection object to a graph database hg; planning goals | | Output: constructed pddl domain and problem files | (1) | function GENERATE PDDL FILE (domain_temp, problem_temp, hg) | (2) | query device nodes, device reachability, vulnerability and component via hg | (3) | generate domain file: | (4) | generate predicates of vulnerability, reachability, pre and postconditions | (5) | generate actions of vulnerability from pre- and postconditions of vulnerability | (6) | end | (7) | generate problem file: | (8) | generate objects from device nodes | (9) | generate initially satisfied conditions | (10) | generate goals based on your input | (11) | end | (12) | return generated domain and problem files | (13) | end function |
|