Determining Risks from Advanced Multi-step Attacks to Critical Information Infrastructures

被引:0
|
作者
Ma, Zhendong [1 ]
Smith, Paul [1 ]
机构
[1] Austrian Inst Technol, Safety & Secur Dept, A-2444 Seibersdorf, Austria
关键词
Risk analysis; critical infrastructure; vulnerability;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Industrial Control Systems (ICS) monitor and control industrial processes, and enable automation in industry facilities. Many of these facilities are regarded as Critical Infrastructures (CIs). Due to the increasing use of Commercial-Off-The-Shelf (COTS) IT products and connectivity offerings, CIs have become an attractive target for cyber-attacks. A successful attack could have significant consequences. An important step in securing Critical Information Infrastructures (CIIs) against cyber-attacks is risk analysis -understanding security risks, based on a systematic analysis of information on vulnerabilities, cyber threats, and the impacts related to the targeted system. Existing risk analysis approaches have various limitations, such as scalability and practicability problems. In contrast to previous work, we propose a practical and vulnerability-centric risk analysis approach for determining security risks associated with advanced, multi-step cyber-attacks. In order to examine multi-step attacks that exploit chains of vulnerabilities, we map vulnerabilities into preconditions and effects, and use rule-based reasoning for identifying advanced attacks and their path through a CII.
引用
收藏
页码:142 / 154
页数:13
相关论文
共 50 条
  • [1] Multi-step Jailbreaking Privacy Attacks on ChatGPT
    Li, Haoran
    Guo, Dadi
    Fan, Wei
    Xu, Mingshi
    Huang, Jie
    Meng, Fanpu
    Song, Yangqiu
    FINDINGS OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS - EMNLP 2023, 2023, : 4138 - 4153
  • [2] Processing of IDS alerts in multi-step attacks
    Bajtos, Tomas
    Sokol, Pavol
    Kurimsky, Frantisek
    SOFTWARE IMPACTS, 2024, 19
  • [3] Determining critical nodes in optimal cost attacks on networked infrastructures
    Ahmad I.
    Clark A.
    Ali M.
    Lei H.
    Ferris D.
    Aved A.
    Discover Internet of Things, 2024, 4 (01):
  • [4] A Graphical Model to Assess the Impact of Multi-Step Attacks
    Albanese, Massimiliano
    Jajodia, Sushil
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2018, 15 (01): : 79 - 93
  • [5] A Multi-Step Model for Migration and Resource Reallocation in Virtualized Network Infrastructures
    Nguyen Tuan Khai
    Baumgartner, Andreas
    Bauschert, Thomas
    2017 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2017, : 730 - 735
  • [6] Causal knowledge analysis for detecting and modeling multi-step attacks
    Ramaki, Ali Ahmadian
    Rasoolzadegan, Abbas
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 6042 - 6065
  • [7] Step by Step Loss Goes Very Far: Multi-Step Quantization for Adversarial Text Attacks
    Gainski, Piotr
    Balazy, Klaudia
    17TH CONFERENCE OF THE EUROPEAN CHAPTER OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS, EACL 2023, 2023, : 2038 - 2048
  • [8] An Achilles heel: denial of service attacks on Australian critical information infrastructures
    Christensen, Sharon
    Caelli, William
    Duncan, William
    Georgiades, Eugenia
    INFORMATION & COMMUNICATIONS TECHNOLOGY LAW, 2010, 19 (01) : 61 - 85
  • [9] Reliable method for determining the complete kinetic and thermodynamic information for thermal degradation of polymers in a multi-step process
    Bojan Janković
    Colloid and Polymer Science, 2018, 296 : 1459 - 1477
  • [10] Generating a benchmark cyber multi-step attacks dataset for intrusion detection
    Almseidin, Mohammad
    Al-Sawwa, Jamil
    Alkasassbeh, Mouhammd
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2022, 43 (03) : 3679 - 3694