Research Article
An Automatic Planning-Based Attack Path Discovery Approach from IT to OT Networks
| No. | Attack paths |
| 1 | Dev12⟶Vul17⟶Dev16⟶Vul14⟶Dev13⟶Vul18⟶Dev18⟶Dev20 | 2 | Dev12⟶Vul17⟶Dev16⟶Vul14⟶Dev13⟶Vul18⟶Dev17⟶Dev19⟶Dev20 | 3 | Dev12⟶Vul17⟶Dev16⟶Vul15⟶Dev14⟶Vul19⟶Dev20 | 4 | Dev12⟶Vul17⟶Dev16⟶Vul15⟶Dev14⟶Vul19⟶Dev19⟶Dev20 | 5 | Dev12⟶Vul17⟶Dev16⟶Vul15⟶Dev14⟶Vul22⟶Dev20 | 6 | Dev12⟶Vul17⟶Dev16⟶Vul15⟶Dev14⟶Vul24⟶Dev20 | 7 | Dev12⟶Vul17⟶Dev16⟶Vul15⟶Dev14⟶Vul20⟶Dev20 | 8 | Dev12⟶Vul17⟶Dev16⟶Vul15⟶Dev14⟶Vul20⟶Dev19⟶Dev20 | 9 | Dev12⟶Vul17⟶Dev16⟶Vul16⟶Dev15⟶Vul20⟶Dev20 | 10 | Dev12⟶Vul17⟶Dev16⟶Vul16⟶Dev15⟶Vul20⟶Dev19⟶Dev20 | 11 | Dev12⟶Vul17⟶Dev16⟶Vul16⟶Dev15⟶Vul22⟶Dev20 | 12 | Dev12⟶Vul17⟶Dev16⟶Vul16⟶Dev15⟶Vul18⟶Dev18⟶Dev20 | 13 | Dev12⟶Vul17⟶Dev16⟶Vul16⟶Dev15⟶Vul23⟶Dev18⟶Vul21⟶Dev20 |
|
|