Research Article
An Automatic Planning-Based Attack Path Discovery Approach from IT to OT Networks
Table 2
Relation information in the graph data model.
| | No. | Relation name | Descriptions |
| | 1 | conn | A reachability exists between two devices. | | 2 | consist | A device belongs to a domain divided by a network. | | 3 | offer | A component is offered by the devices. | | 4 | has | A component has a vulnerability. | | 5 | depend | The tactic and technique depend on a vulnerability. | | 6 | attack | A device is affected by the vulnerability, leading to an attack. | | 7 | exploit | A compromised device exploits a vulnerability in another devices. |
|
|