Cyber-Attack for BGP Systems Using CoPNet Model

被引:0
|
作者
El Bouchti, Abdelali [1 ]
Haqiq, Abdelkrim [1 ]
机构
[1] Hassan 1st Univ, Comp Networks Mobil & Modeling Lab, E NGN Res Grp, FST, Settat, Morocco
关键词
Vulnerability; Cyber-Attack; CoPNet; AT; Attack Modeling; BGP;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rise of cyber-attack activities in the recent years, research in this area has gained immense emphasis. One of such research efforts is modeling of cyber-attacks. In this context, several modeling approaches have been developed, such as approaches based on attack trees (AT). In this paper, we propose Colored Petri Net (CoPNet) modeling approach by extending the attack trees with new modeling constructs and analysis approaches. CoPNet based attack model is flexible enough to model Internet intrusion, including the static and dynamic features of the intrusion. The process and rules of building CoPNet based attack model from AT are also presented. In order to evaluate the risk of intrusion, some cost elements are added to CoPNet based attack modeling. We show how attack trees can be converted and analyzed in CoPNets. Finally, we provide a case study that illustrates the CoPNet approach.
引用
收藏
页码:10 / 15
页数:6
相关论文
共 50 条
  • [21] Cyber-attack against heating system in integrated energy systems: Model and propagation mechanism
    Ding, Shixing
    Gu, Wei
    Lu, Shuai
    Yu, Ruizhi
    Sheng, Lina
    APPLIED ENERGY, 2022, 311
  • [22] Model- Based Deep Learning for Cyber-Attack Detection in Electric Drive Systems
    Abou Jawdeh, Shaya
    Choi, Seungdeog
    Liu, Chung-Hung
    2022 IEEE APPLIED POWER ELECTRONICS CONFERENCE AND EXPOSITION, APEC, 2022, : 567 - 573
  • [23] Cyber-attack Detection and Accommodation Algorithm for Energy Delivery Systems
    Mestha, Lalit K.
    Anubi, Olugbenga M.
    Abbaszadeh, Masoud
    2017 IEEE CONFERENCE ON CONTROL TECHNOLOGY AND APPLICATIONS (CCTA 2017), 2017, : 1326 - 1331
  • [24] Dual redundant cyber-attack tolerant control systems strategy for cyber-physical systems
    Gamarra, Marco A.
    Shetty, Sachin
    Gonzalez, Oscar R.
    Njilla, Laurent
    Pendleton, Marcus
    Kamhoua, Charles
    ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [25] Using GRU neural network for cyber-attack detection in automated process control systems
    Lavrova, Dania
    Zegzhda, Dmitry
    Yarmak, Anastasiia
    2019 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING (BLACKSEACOM), 2019,
  • [26] Optimized cyber-attack detection method of power systems using sliding mode observer
    Adeli, Mahdieh
    Hajatipour, Majid
    Yazdanpanah, Mohammad Javad
    Hashemi-Dezaki, Hamed
    Shafieirad, Mohsen
    ELECTRIC POWER SYSTEMS RESEARCH, 2022, 205
  • [27] The Future Roadmap for Cyber-attack Detection
    Soleymanzadeh, Raha
    Kashef, Rasha
    2022 6TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, CSP 2022, 2022, : 66 - 70
  • [28] Extending a Trust model for Energy Trading with Cyber-Attack Detection
    Andrade, Rui
    Wannous, Sinan
    Pinto, Tiago
    Praca, Isabel
    ELECTRONICS, 2021, 10 (16)
  • [29] Cyber-Attack Scoring Model Based on the Offensive Cybersecurity Framework
    Kim, Kyounggon
    Alfouzan, Faisal Abdulaziz
    Kim, Huykang
    APPLIED SCIENCES-BASEL, 2021, 11 (16):
  • [30] Robustness of the Markov-chain model for cyber-attack detection
    Ye, N
    Zhang, YB
    Borror, CM
    IEEE TRANSACTIONS ON RELIABILITY, 2004, 53 (01) : 116 - 123