Research Article

An Automatic Planning-Based Attack Path Discovery Approach from IT to OT Networks

Table 5

Device access control rules in the experimental environment.

Dom.IDDomain nameSource deviceDestination devices

Dom1InternetManager PC(Application server, 22) (ERP server, 3389) (web server, 80) (proxy server, 8090&4900)
Application server(Data server, 3306)
ERP server(Data server, 3306)
Data server(Mail server, 80) (DNS server, 53)

Dom2DMZWeb server(Historian, 80)
Mail server(Proxy server, 8090 & 4900)
DNS server(Proxy server, 8090 & 4900)
Proxy server(Proxy client, 1200)

Dom3SchedulingProxy client(Historian, 80) (MES client, 445)
MES client(MES server, 22)
MES server(Historian, 80)
Historian(OPC server, 8080)

Dom4SupervisionOPC server(EWS1, 445 & 139) (EWS2, 3389) (OWS, 445)
EWS1(HMI1, 2308 & 1033) (HMI2, 2308, & 1033)
EWS2(PLC1, 102) (PLC2, 102 & 502)
OWS(HMI2, 2308 & 1033) (PLC1, 102) (PLC2, 102 & 502)

Dom5ProcessHMI1(PLC1, 102)
HMI2(PLC2, 102)
PLC1(PLC2, 502)