SPEAR: security posture evaluation using AI planner-reasoning on attack-connectivity
dc.contributor.author | Podder, Rakesh, author | |
dc.contributor.author | Caglar, Turgay, author | |
dc.contributor.author | Bashir, Shadaab Kawnain, author | |
dc.contributor.author | Sreedharan, Sarath, author | |
dc.contributor.author | Ray, Indrajit, author | |
dc.contributor.author | Ray, Indrakshi, author | |
dc.contributor.author | ACM, publisher | |
dc.date.accessioned | 2025-09-25T18:39:00Z | |
dc.date.available | 2025-09-25T18:39:00Z | |
dc.date.issued | 2025-07-07 | |
dc.description.abstract | Graph-based frameworks are often used in network hardening to help a cyber defender understand how a network can be attacked and how the best defenses can be deployed. However, incorporating network connectivity parameters in the attack graph, reasoning about the attack graph when we do not have access to complete information, providing system administrator suggestions in an understandable format, and allowing them to do what-if analysis on various scenarios and attacker motives is still missing. We fill this gap by presenting SPEAR, a formal framework with tool support for security posture evaluation and analysis that keeps humanin- the-loop. SPEAR uses the causal formalism of AI planning to model vulnerabilities and configurations in a networked system. It automatically converts network configurations and vulnerability descriptions into planning models expressed in the Planning Domain Definition Language (PDDL). SPEAR identifies a set of diverse security hardening strategies that can be presented in a manner understandable to the domain expert. These allow the administrator to explore the network hardening solution space in a systematic fashion and help evaluate the impact and compare the different solutions. | |
dc.format.medium | born digital | |
dc.format.medium | articles | |
dc.identifier.bibliographicCitation | Rakesh Podder, Turgay Caglar, Shadaab Kawnain Bashir, Sarath Sreedharan, Indrajit Ray, and Indrakshi Ray. 2025. SPEAR: Security Posture Evaluation using AI Planner-Reasoning on Attack-Connectivity Hypergraphs. In Proceedings of the 30th ACM Symposium on Access Control Models and Technologies (SACMAT '25), July 8-10, 2025, Stony Brook, NY, USA. ACM, New York, NY, USA, 12 pages. https://doi.org/10.1145/3734436.3734451 | |
dc.identifier.doi | https://doi.org/10.1145/3734436.3734451 | |
dc.identifier.uri | https://hdl.handle.net/10217/242036 | |
dc.language | English | |
dc.language.iso | eng | |
dc.publisher | Colorado State University. Libraries | |
dc.relation.ispartof | Publications | |
dc.relation.ispartof | ACM DL Digital Library | |
dc.rights | ©Rakesh Pdder, et al. ACM 2025. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in SACMAT '25, https://dx.doi.org/10.1145/3734436.3734451. | |
dc.subject | attack-connectivity graph | |
dc.subject | AI planning | |
dc.subject | network hardening | |
dc.subject | attack graph analysis | |
dc.title | SPEAR: security posture evaluation using AI planner-reasoning on attack-connectivity | |
dc.type | Text |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- FACF_ACMOA_3734436.3734451.pdf
- Size:
- 1.75 MB
- Format:
- Adobe Portable Document Format