Research Article
An Automatic Planning-Based Attack Path Discovery Approach from IT to OT Networks
| No. | Attack paths |
| 1 | Attacker⟶Vul1⟶Dev1⟶Vul6⟶Dev5⟶Vul13⟶Dev12 | 2 | Attacker⟶Vul1⟶Dev1⟶Vul9⟶Dev8⟶Vul10⟶Dev9⟶Vul13⟶Dev12 | 3 | Attacker⟶Vul1⟶Dev1⟶Vul3⟶Dev2⟶Vul5⟶Dev4⟶Vul7⟶Dev6⟶Vul9⟶Dev8⟶Vul10⟶Dev9⟶Vul13⟶Dev12 | 4 | Attacker⟶Vul1⟶Dev1⟶Vul3⟶Dev2⟶Vul5⟶Dev4⟶Vul8⟶Dev7⟶Vul9⟶Dev8⟶Vul10⟶Dev9⟶Vul13⟶Dev12 | 5 | Attacker⟶Vul1⟶Dev1⟶Vul2⟶Dev3⟶Vul4⟶Dev3⟶Vul5⟶Dev4⟶Vul7⟶Dev6⟶Vul9⟶Dev8⟶Vul10⟶Dev9⟶Vul13⟶Dev12 | 6 | Attacker⟶Vul1⟶Dev1⟶Vul2⟶Dev3⟶Vul4⟶Dev3⟶Vul5⟶Dev4⟶Vul8⟶Dev7⟶Vul9⟶Dev8⟶Vul10⟶Dev9⟶Vul13⟶Dev12 | 7 | Attacker⟶Vul1⟶Dev1⟶Vul9⟶Dev8⟶Vul10⟶Dev9⟶V11⟶Dev10⟶Vul2⟶Dev11⟶Vul12⟶Dev11⟶Vul13⟶Dev12 | 8 | Attacker⟶Vul1⟶Dev1⟶Vul3⟶Dev2⟶Vul5⟶Dev4⟶Vul7⟶Dev6⟶Vul9⟶Dev8⟶Vul10⟶Dev9⟶V11⟶Dev10⟶Vul2⟶Dev11⟶Vul12⟶Dev11⟶Vul13⟶Dev12 | 9 | Attacker⟶Vul1⟶Dev1⟶Vul3⟶Dev2⟶Vul5⟶Dev4⟶Vul8⟶Dev7⟶Vul9⟶V11⟶Dev10⟶Vul2⟶Dev11⟶Vul12⟶Dev11⟶Dev8⟶Vul10⟶Dev9⟶Vul13⟶Dev12 | 10 | Attacker⟶Vul1⟶Dev1⟶Vul2⟶Dev3⟶Vul4⟶Dev3⟶Vul5⟶Dev4⟶Vul7⟶Dev6⟶Vul9⟶Dev8⟶Vul10⟶Dev9⟶V11⟶Dev10⟶Vul2⟶Dev11⟶Vul12⟶Dev11⟶Vul13⟶Dev12 | 11 | Attacker⟶Vul1⟶Dev1⟶Vul2⟶Dev3⟶Vul4⟶Dev3⟶Vul5⟶Dev4⟶Vul8⟶Dev7⟶Vul9⟶Dev8⟶Vul10⟶Dev9⟶V11⟶Dev10⟶Vul2⟶Dev11⟶Vul12⟶Dev11⟶Vul13⟶Dev12 |
|
|