Research Article

An Automatic Planning-Based Attack Path Discovery Approach from IT to OT Networks

Table 6

Attack paths in Zone A.

No.Attack paths

1Attacker⟶Vul1⟶Dev1⟶Vul6⟶Dev5⟶Vul13⟶Dev12
2Attacker⟶Vul1⟶Dev1⟶Vul9⟶Dev8⟶Vul10⟶Dev9⟶Vul13⟶Dev12
3Attacker⟶Vul1⟶Dev1⟶Vul3⟶Dev2⟶Vul5⟶Dev4⟶Vul7⟶Dev6⟶Vul9⟶Dev8⟶Vul10⟶Dev9⟶Vul13⟶Dev12
4Attacker⟶Vul1⟶Dev1⟶Vul3⟶Dev2⟶Vul5⟶Dev4⟶Vul8⟶Dev7⟶Vul9⟶Dev8⟶Vul10⟶Dev9⟶Vul13⟶Dev12
5Attacker⟶Vul1⟶Dev1⟶Vul2⟶Dev3⟶Vul4⟶Dev3⟶Vul5⟶Dev4⟶Vul7⟶Dev6⟶Vul9⟶Dev8⟶Vul10⟶Dev9⟶Vul13⟶Dev12
6Attacker⟶Vul1⟶Dev1⟶Vul2⟶Dev3⟶Vul4⟶Dev3⟶Vul5⟶Dev4⟶Vul8⟶Dev7⟶Vul9⟶Dev8⟶Vul10⟶Dev9⟶Vul13⟶Dev12
7Attacker⟶Vul1⟶Dev1⟶Vul9⟶Dev8⟶Vul10⟶Dev9⟶V11⟶Dev10⟶Vul2⟶Dev11⟶Vul12⟶Dev11⟶Vul13⟶Dev12
8Attacker⟶Vul1⟶Dev1⟶Vul3⟶Dev2⟶Vul5⟶Dev4⟶Vul7⟶Dev6⟶Vul9⟶Dev8⟶Vul10⟶Dev9⟶V11⟶Dev10⟶Vul2⟶Dev11⟶Vul12⟶Dev11⟶Vul13⟶Dev12
9Attacker⟶Vul1⟶Dev1⟶Vul3⟶Dev2⟶Vul5⟶Dev4⟶Vul8⟶Dev7⟶Vul9⟶V11⟶Dev10⟶Vul2⟶Dev11⟶Vul12⟶Dev11⟶Dev8⟶Vul10⟶Dev9⟶Vul13⟶Dev12
10Attacker⟶Vul1⟶Dev1⟶Vul2⟶Dev3⟶Vul4⟶Dev3⟶Vul5⟶Dev4⟶Vul7⟶Dev6⟶Vul9⟶Dev8⟶Vul10⟶Dev9⟶V11⟶Dev10⟶Vul2⟶Dev11⟶Vul12⟶Dev11⟶Vul13⟶Dev12
11Attacker⟶Vul1⟶Dev1⟶Vul2⟶Dev3⟶Vul4⟶Dev3⟶Vul5⟶Dev4⟶Vul8⟶Dev7⟶Vul9⟶Dev8⟶Vul10⟶Dev9⟶V11⟶Dev10⟶Vul2⟶Dev11⟶Vul12⟶Dev11⟶Vul13⟶Dev12