Determining Risks from Advanced Multi-step Attacks to Critical Information Infrastructures

被引:0
|
作者
Ma, Zhendong [1 ]
Smith, Paul [1 ]
机构
[1] Austrian Inst Technol, Safety & Secur Dept, A-2444 Seibersdorf, Austria
关键词
Risk analysis; critical infrastructure; vulnerability;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Industrial Control Systems (ICS) monitor and control industrial processes, and enable automation in industry facilities. Many of these facilities are regarded as Critical Infrastructures (CIs). Due to the increasing use of Commercial-Off-The-Shelf (COTS) IT products and connectivity offerings, CIs have become an attractive target for cyber-attacks. A successful attack could have significant consequences. An important step in securing Critical Information Infrastructures (CIIs) against cyber-attacks is risk analysis -understanding security risks, based on a systematic analysis of information on vulnerabilities, cyber threats, and the impacts related to the targeted system. Existing risk analysis approaches have various limitations, such as scalability and practicability problems. In contrast to previous work, we propose a practical and vulnerability-centric risk analysis approach for determining security risks associated with advanced, multi-step cyber-attacks. In order to examine multi-step attacks that exploit chains of vulnerabilities, we map vulnerabilities into preconditions and effects, and use rule-based reasoning for identifying advanced attacks and their path through a CII.
引用
收藏
页码:142 / 154
页数:13
相关论文
共 50 条
  • [21] A Scalable and Efficient Correlation Engine to Detect Multi-step Attacks in Distributed Systems
    Lanoe, David
    Hurfin, Michel
    Totel, Eric
    2018 IEEE 37TH INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2018, : 31 - 40
  • [22] LActDet: An Automatic Network Attack Activity Detection Framework for Multi-step Attacks
    Yang, Huiran
    Kang, Jiaqi
    Dai, Yueyue
    Sun, Jiyan
    Zhang, Yan
    Cui, Huajun
    Ma, Can
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 676 - 685
  • [23] Detecting Multi-Step IAM Attacks in AWS Environments via Model Checking
    Shevrin, Ilia
    Margalit, Oded
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 6025 - 6042
  • [24] OMMA: open architecture for Operator-guided Monitoring of Multi-step Attacks
    Navarro, Julio
    Legrand, Veronique
    Deruyver, Aline
    Parrend, Pierre
    EURASIP JOURNAL ON INFORMATION SECURITY, 2018,
  • [25] Towards Reconstructing Multi-Step Cyber Attacks in Modern Cloud Environments with Tripwires
    Kahlhofer, Mario
    Hoelzl, Michael
    Berger, Andreas
    EUROPEAN INTERDISCIPLINARY CYBERSECURITY - EICC 2020, 2020,
  • [26] From a single decision to a multi-step algorithm
    Dehaene, Stanislas
    Sigman, Mariano
    CURRENT OPINION IN NEUROBIOLOGY, 2012, 22 (06) : 937 - 945
  • [27] Two new multi-step syntheses for the advanced organic chemistry laboratory
    Goess, Brian C.
    ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 2012, 243
  • [28] Advanced multi-step brazing for fabrication of a divertor heat removal component
    Tokitani, M.
    Hamaji, Y.
    Hiraoka, Y.
    Masuzaki, S.
    Tamura, H.
    Noto, H.
    Tanaka, T.
    Tsuneyoshi, T.
    Tsuji, Y.
    Muroga, T.
    Sagara, A.
    NUCLEAR FUSION, 2021, 61 (04)
  • [29] Determining hydraulic parameters of unsaturated soils by transient multi-step outflow experiment
    Chen Hui
    Wei Chang-fu
    Hu Guo-hui
    ROCK AND SOIL MECHANICS, 2013, 34 (02) : 347 - 352
  • [30] Multi-Step Ahead Predictions for Critical Levels in Physiological Time Series
    ElMoaqet, Hisham
    Tilbury, Dawn M.
    Ramachandran, Satya Krishna
    IEEE TRANSACTIONS ON CYBERNETICS, 2016, 46 (07) : 1704 - 1714