Last Line of Defense: Reliability Through Inducing Cyber Threat Hunting With Deception in SCADA Networks
نویسندگان
چکیده
There exists a gap between existing security mechanisms and their ability to detect advancing threats. Antivirus EDR (End Point Detection Response) aim prevent threats; such are reactive. This approach did not prove be effective in protecting against stealthy attacks. SCADA (Supervisory Control Data Acquisition) is crucial for any country. However, always an easy target adversaries due lack of heterogeneous devices. An attack on mainly considered national-level threat. Recent research has "unknown threats," which left security. The proactive approach, as threat hunting, the need hour. In this research, we investigated that hunting conjunction with cyber deception kill chain countervailing effects detecting threats mitigating them. We have used concept "decoy farm" network, where all attacks engaged. Moreover, present novel detection prevention SCADA, focusing unknown To test effectiveness emulated several Linux Windows-based simulated network. concluded our detects prevents attacker before using current reactive mechanism enhanced protection results experiments show proposed significantly improved ability.
منابع مشابه
Deception in defense of computer systems from cyber-attack
While computer systems can be quite susceptible to deception by attackers, deception by defenders has increasingly been investigated in recent years. Military history has classic examples of defensive deceptions, but not all tactics and strategies have analogies in cyberspace. Honeypots are the most important example today; they are decoy computer systems designed to encourage attacks to collec...
متن کاملActive cyber defense with denial and deception: A cyber-wargame experiment
In January 2012, MITRE performed a real-time, red team/blue team cyber-wargame experiment. This presented the opportunity to blend cyber-warfare with traditional mission planning and execution, including denial and deception tradecraft. The cyberwargame was designed to test a dynamic network defense cyber-security platform being researched in The MITRE Corporation’s Innovation Program called Bl...
متن کاملCyber Security of Water SCADA Systems: (I) Analysis and Experimentation of Stealthy Deception Attacks
In this article, our aim is to perform security threat assessment of networked control systems (NCS) systems with regulatory and supervisory control layers. We analyze the performance of a proportional-integral controller (regulatory layer), and a model-based diagnostic scheme (supervisory layer) under a class of deception attacks. We adopt a conservative approach by assuming that the attacker ...
متن کاملThe SCADA Threat Landscape
Nations around the world rely on the correct and continued functioning of industrial control systems (ICS) to keep economies moving and provide critical services such as electricity and clean water. This paper provides an analysis of the current threat landscape facing ICS. Discussion is provided on the actors involved, their motivations, and specific attack vectors they may use to reach their ...
متن کاملCyber security risk assessment for SCADA and DCS networks.
The growing dependence of critical infrastructures and industrial automation on interconnected physical and cyber-based control systems has resulted in a growing and previously unforeseen cyber security threat to supervisory control and data acquisition (SCADA) and distributed control systems (DCSs). It is critical that engineers and managers understand these issues and know how to locate the i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2021
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2021.3111420