Modeling Cyber-Attack for SCADA Systems Using CoPNet Approach

被引:0
|
作者
El Bouchti, Abdelali [1 ]
Haqiq, Abdelkrim [1 ]
机构
[1] Hassan 1st Univ Settat, Africa & Middle East FST, E NGN Res Grp, Comp Networks Mobil & Modeling Lab, Settat, Morocco
关键词
Vulnerability; Cyber Security; CoPNet; AT; Attack Modeling; SCADA;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the rise of cyber-attack activities in the recent years, research in this area has gained immense emphasis. One of such research efforts is modeling of cyber-attacks. In this context, several modeling approaches have been developed, such as approaches based on attack trees (AT). In this paper, we propose Colored Petri Net (CoPNet) modeling approach by extending the attack trees with new modeling constructs and analysis approaches. CoPNet based attack model is flexible enough to model Internet intrusion, including the static and dynamic features of the intrusion. The process and rules of building CoPNet based attack model from AT are also presented. In order to evaluate the risk of intrusion, some cost elements are added to CoPNet based attack modeling. We show how attack trees can be converted and analyzed in CoPNets. Finally, we provide a case study that illustrates the CoPNet approach.
引用
收藏
页码:481 / 486
页数:6
相关论文
共 50 条
  • [1] Cyber-Attack for BGP Systems Using CoPNet Model
    El Bouchti, Abdelali
    Haqiq, Abdelkrim
    [J]. 2012 SECOND INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGY (INTECH), 2012, : 10 - 15
  • [2] An Overview of Cyber-Attack Vectors on SCADA Systems
    Irmak, Erdal
    Erkek, Ismail
    [J]. 2018 6TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2018, : 350 - 354
  • [3] How to protect SCADA systems from cyber-attack
    Rush, William F.
    Kinast, John A.
    [J]. Gas Utility Manager, 2003, 47 (09): : 12 - 18
  • [5] Protocols, Solutions, and Testbeds for Cyber-Attack Prevention in Industrial SCADA Systems
    Kumar A.
    Bhushan B.
    Malik A.
    Kumar R.
    [J]. Studies in Big Data, 2021, 99 : 355 - 380
  • [6] Adaptive cyber-attack modeling system
    Gonsalves, Paul G.
    Dougherty, Edward T.
    [J]. SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C31)TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE V, 2006, 6201
  • [7] Using Spy Node to Identify Cyber-Attack in Power Systems as a Novel Approach
    Alotaibi, Khaled F.
    Hamidi, Milad Moghassem
    Talebi, Morteza
    Xu, Jinsheng
    Homaifar, Abdollah
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY (EIT), 2015, : 581 - 586
  • [8] Analysis of Cyber-Attack in Big Data IoT and Cyber-Physical Systems - A Technical Approach to Cybersecurity Modeling
    Sen, Sachin
    Jayawardena, Chandimal
    [J]. 2019 IEEE 5TH INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2019,
  • [9] Here's what you need to know to protect SCADA systems from cyber-attack
    [J]. Rush, W.F., 1600, Oildom Publishing Co. of Texas Inc. (230):
  • [10] Here's what you need to know to protect SCADA systems from cyber-attack
    Rush, WF
    Kinast, JA
    [J]. PIPELINE & GAS JOURNAL, 2003, 230 (02) : 29 - 30