Determining Risks from Advanced Multi-step Attacks to Critical Information Infrastructures

نویسندگان

  • Zhendong Ma
  • Paul Smith
چکیده

Industrial Control Systems (ICS) monitor and control industrial processes, and enable automation in industry facilities. Many of these facilities are regarded as Critical Infrastructures (CIs). Due to the increasing use of Commercial-Off-The-Shelf (COTS) IT products and connectivity offerings, CIs have become an attractive target for cyberattacks. A successful attack could have significant consequences. An important step in securing Critical Information Infrastructures (CIIs) against cyber-attacks is risk analysis – understanding security risks, based on a systematic analysis of information on vulnerabilities, cyber threats, and the impacts related to the targeted system. Existing risk analysis approaches have various limitations, such as scalability and practicability problems. In contrast to previous work, we propose a practical and vulnerability-centric risk analysis approach for determining security risks associated with advanced, multi-step cyber-attacks. In order to examine multi-step attacks that exploit chains of vulnerabilities, we map vulnerabilities into preconditions and effects, and use rule-based reasoning for identifying advanced attacks and their path through a CII.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A multi-stage scenario construction approach for critical infrastructure protection

Protecting critical infrastructures (CIs) against external and internal risks in an increasingly uncertain environment is a major challenge. In this paper we present a generic multi-stage scenario construction approach that is applicable to a wide range of decision problems in the field of CI protection. Our approach combines scenario construction and decision support, whereby we explicitly con...

متن کامل

Why Both Game Theory and Reliability Theory Are Important in Defending Infrastructure against Intelligent Attacks

Many countries have multiple critical infrastructures that are potentially vulnerable to deliberate attacks by terrorists or other intelligent adversaries. determining how best to protect these and other critical infrastructures against intelligent attacks has become a topic of great concern. Researchers and practitioners have attempted a variety of approaches for dealing with this issue. One m...

متن کامل

SCADA Cyber Attacks and Security Vulnerabilities: Review

SCADA plays a vital role in critical infrastructures. As the modern IT technology become very advanced, the threat on industrial control system (ICS) and SCADA security become a big concern of every critical infrastructures operator. With the recent cyber-attacks, the urge to secure the critical infrastructure is a big issue especially for those countries that uses critical infrastructures. In ...

متن کامل

C-SAW: Critical Information Infrastructure Protection through Simplification

The importance of Critical Information Infrastructure Protection (CIIP) cannot be overlooked, as many critical systems utilise information infrastructures in order to operate. However, should these information infrastructures be targeted by cyber attacks, it would severely affect the effectiveness of many of these critical systems. Attacks on information infrastructures are not be limited to a ...

متن کامل

Applying Lessons from Cyber Attacks on Ukrainian Infrastructures to Secure Gateways onto the Industrial Internet of Things

Previous generations of safety-related industrial control systems were ‘air gapped’. In other words, process control components including Programmable Logic Controllers (PLCs) and smart sensor/actuators were disconnected and isolated from local or wide area networks. This provided a degree of protection; attackers needed physical access to compromise control systems components. Over time this ‘...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013