Attack Modeling in the Critical Infrastructure

被引:0
|
作者
Ivanc, Blaz [1 ]
Klobucar, Tomaz [1 ]
机构
[1] Jozef Stefan Inst, Jamova Cesta 39, Ljubljana 1000, Slovenia
来源
关键词
attack analysis; attack model; attack tree; enhanced structural model; incident;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The development and connection of information and communication technologies with industrial control systems in the so-called critical infrastructure have contributed to the emergence of new complex threats. The critical infrastructure has become a target of sophisticated cyber attacks which exploit numerous known as well as unknown vulnerabilities in one course of an attack. The paper proposes an attack modeling method enabling us to determine the vulnerabilities and riskful exposure of the systems. Organizational changes to ensure the cyber defense of the critical infrastructure are also proposed.
引用
下载
收藏
页码:285 / 292
页数:8
相关论文
共 50 条
  • [1] Critical infrastructure attack modeling
    Ivanc, Blaž
    Klobucar, Tomaž
    Elektrotehniski Vestnik/Electrotechnical Review, 2012, 79 (04): : 193 - 196
  • [2] Critical Infrastructure Attack Modeling
    Ivanc, Blaz
    Klobucar, Tomaz
    ELEKTROTEHNISKI VESTNIK-ELECTROCHEMICAL REVIEW, 2012, 79 (04): : 193 - 196
  • [3] Cyber-physical attack modeling and impact on critical infrastructure
    Peng, Yong
    Jiang, Changqing
    Xiang, Chong
    Zhang, Miao
    Xie, Feng
    Dai, Zhonghua
    Chen, Dongqing
    Gao, Haihui
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2013, 53 (12): : 1653 - 1663
  • [4] Modeling critical infrastructure requirements
    Wolthusen, SD
    PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 101 - 108
  • [5] Framework for Infrastructure Attack Modeling in Hybrid Networks
    Borisenko, Konstantin
    Kholod, Ivan
    Shorov, Andrey
    INTERNATIONAL JOURNAL OF MOBILE COMPUTING AND MULTIMEDIA COMMUNICATIONS, 2014, 6 (04) : 98 - 114
  • [6] A conceptual modeling method for critical infrastructure modeling
    Sokolowski, John
    Turnitsa, Charles
    Diallo, Saikou
    41ST ANNUAL SIMULATION SYMPOSIUM, PROCEEDINGS, 2008, : 203 - 211
  • [7] Protection of Critical Infrastructure Component Against a Vehicle Attack
    Neumann, V
    Vala, M.
    TRANSPORT MEANS 2017, PTS I-III, 2017, : 368 - 372
  • [8] Critical infrastructure under attack: lessons from a honeypot
    Barak I.
    1600, Elsevier Ltd (2020): : 16 - 17
  • [9] ESM: an enhanced attack tree model for critical infrastructure
    Ivanc, Blaz
    Klobucar, Tomaz
    CONTROL ENGINEERING AND APPLIED INFORMATICS, 2015, 17 (04): : 102 - 113
  • [10] Examining Willingness to Attack Critical Infrastructure Online and Offline
    Holt, Thomas J.
    Kilger, Max
    CRIME & DELINQUENCY, 2012, 58 (05) : 798 - 822