Research Article

An Automatic Planning-Based Attack Path Discovery Approach from IT to OT Networks

Algorithm 2

Automatic construction of PDDL domain and problem files.
Input: pddl file template domain_temp and problem_temp
 connection object to a graph database hg; planning goals
Output: constructed pddl domain and problem files
(1)function GENERATE PDDL FILE (domain_temp, problem_temp, hg)
(2) query device nodes, device reachability, vulnerability and component via hg
(3)generate domain file:
(4)  generate predicates of vulnerability, reachability, pre and postconditions
(5)  generate actions of vulnerability from pre- and postconditions of vulnerability
(6)end
(7)generate problem file:
(8)  generate objects from device nodes
(9)  generate initially satisfied conditions
(10)  generate goals based on your input
(11)end
(12) return generated domain and problem files
(13)end function