Repository logo
 

SPEAR: security posture evaluation using AI planner-reasoning on attack-connectivity

dc.contributor.authorPodder, Rakesh, author
dc.contributor.authorCaglar, Turgay, author
dc.contributor.authorBashir, Shadaab Kawnain, author
dc.contributor.authorSreedharan, Sarath, author
dc.contributor.authorRay, Indrajit, author
dc.contributor.authorRay, Indrakshi, author
dc.contributor.authorACM, publisher
dc.date.accessioned2025-09-25T18:39:00Z
dc.date.available2025-09-25T18:39:00Z
dc.date.issued2025-07-07
dc.description.abstractGraph-based frameworks are often used in network hardening to help a cyber defender understand how a network can be attacked and how the best defenses can be deployed. However, incorporating network connectivity parameters in the attack graph, reasoning about the attack graph when we do not have access to complete information, providing system administrator suggestions in an understandable format, and allowing them to do what-if analysis on various scenarios and attacker motives is still missing. We fill this gap by presenting SPEAR, a formal framework with tool support for security posture evaluation and analysis that keeps humanin- the-loop. SPEAR uses the causal formalism of AI planning to model vulnerabilities and configurations in a networked system. It automatically converts network configurations and vulnerability descriptions into planning models expressed in the Planning Domain Definition Language (PDDL). SPEAR identifies a set of diverse security hardening strategies that can be presented in a manner understandable to the domain expert. These allow the administrator to explore the network hardening solution space in a systematic fashion and help evaluate the impact and compare the different solutions.
dc.format.mediumborn digital
dc.format.mediumarticles
dc.identifier.bibliographicCitationRakesh Podder, Turgay Caglar, Shadaab Kawnain Bashir, Sarath Sreedharan, Indrajit Ray, and Indrakshi Ray. 2025. SPEAR: Security Posture Evaluation using AI Planner-Reasoning on Attack-Connectivity Hypergraphs. In Proceedings of the 30th ACM Symposium on Access Control Models and Technologies (SACMAT '25), July 8-10, 2025, Stony Brook, NY, USA. ACM, New York, NY, USA, 12 pages. https://doi.org/10.1145/3734436.3734451
dc.identifier.doihttps://doi.org/10.1145/3734436.3734451
dc.identifier.urihttps://hdl.handle.net/10217/242036
dc.languageEnglish
dc.language.isoeng
dc.publisherColorado State University. Libraries
dc.relation.ispartofPublications
dc.relation.ispartofACM DL Digital Library
dc.rights©Rakesh Pdder, et al. ACM 2025. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in SACMAT '25, https://dx.doi.org/10.1145/3734436.3734451.
dc.subjectattack-connectivity graph
dc.subjectAI planning
dc.subjectnetwork hardening
dc.subjectattack graph analysis
dc.titleSPEAR: security posture evaluation using AI planner-reasoning on attack-connectivity
dc.typeText

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
FACF_ACMOA_3734436.3734451.pdf
Size:
1.75 MB
Format:
Adobe Portable Document Format

Collections