Research Article

An Automatic Planning-Based Attack Path Discovery Approach from IT to OT Networks

Table 2

Relation information in the graph data model.

No.Relation nameDescriptions

1connA reachability exists between two devices.
2consistA device belongs to a domain divided by a network.
3offerA component is offered by the devices.
4hasA component has a vulnerability.
5dependThe tactic and technique depend on a vulnerability.
6attackA device is affected by the vulnerability, leading to an attack.
7exploitA compromised device exploits a vulnerability in another devices.