Research Article
An Automatic Planning-Based Attack Path Discovery Approach from IT to OT Networks
Table 2
Relation information in the graph data model.
| No. | Relation name | Descriptions |
| 1 | conn | A reachability exists between two devices. | 2 | consist | A device belongs to a domain divided by a network. | 3 | offer | A component is offered by the devices. | 4 | has | A component has a vulnerability. | 5 | depend | The tactic and technique depend on a vulnerability. | 6 | attack | A device is affected by the vulnerability, leading to an attack. | 7 | exploit | A compromised device exploits a vulnerability in another devices. |
|
|