Modeling Cyber-Attack for SCADA Systems Using CoPNet Approach

被引:0
|
作者
El Bouchti, Abdelali [1 ]
Haqiq, Abdelkrim [1 ]
机构
[1] Hassan 1st Univ Settat, Africa & Middle East FST, E NGN Res Grp, Comp Networks Mobil & Modeling Lab, Settat, Morocco
关键词
Vulnerability; Cyber Security; CoPNet; AT; Attack Modeling; SCADA;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the rise of cyber-attack activities in the recent years, research in this area has gained immense emphasis. One of such research efforts is modeling of cyber-attacks. In this context, several modeling approaches have been developed, such as approaches based on attack trees (AT). In this paper, we propose Colored Petri Net (CoPNet) modeling approach by extending the attack trees with new modeling constructs and analysis approaches. CoPNet based attack model is flexible enough to model Internet intrusion, including the static and dynamic features of the intrusion. The process and rules of building CoPNet based attack model from AT are also presented. In order to evaluate the risk of intrusion, some cost elements are added to CoPNet based attack modeling. We show how attack trees can be converted and analyzed in CoPNets. Finally, we provide a case study that illustrates the CoPNet approach.
引用
收藏
页码:481 / 486
页数:6
相关论文
共 50 条
  • [41] Secured Cyber-Attack Signatures Distribution using Blockchain Technology
    Ajayi, Oluwaseyi
    Cherian, Melvin
    Saadawi, Tarek
    [J]. 2019 22ND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (IEEE CSE 2019) AND 17TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (IEEE EUC 2019), 2019, : 482 - 488
  • [42] Controller Cyber-Attack Detection and Isolation
    Sztyber-Betley, Anna
    Syfert, Michal
    Koscielny, Jan Maciej
    Gorecka, Zuzanna
    [J]. SENSORS, 2023, 23 (05)
  • [43] ARTT Taxonomy and Cyber-attack Framewok
    Douad, Mohamed Amine
    Dahmani, Youcef
    [J]. 2015 FIRST INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES OF INFORMATION AND COMMUNICATION (NTIC), 2015,
  • [44] Cyber-Attack on a Power Plant using Bias Injected Measurements
    Kontouras, Efstathios
    Tzes, Anthony
    Dritsas, Leonidas
    [J]. 2017 AMERICAN CONTROL CONFERENCE (ACC), 2017, : 5507 - 5512
  • [45] Automated cyber-attack scenario generation using the symbolic simulation
    Lee, JK
    Lee, MW
    Lee, JS
    Chi, SD
    Ohn, SY
    [J]. ARTIFICIAL INTELLIGENCE AND SIMULATION, 2004, 3397 : 380 - 389
  • [46] Cyber Terror Attack Analysis for Industrial Control Systems (SCADA)
    Sogut, Esra
    Erdem, O. Ayhan
    [J]. JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2020, 23 (02): : 557 - 566
  • [47] Online Cyber-Attack Detection in Smart Grid: A Reinforcement Learning Approach
    Kurt, Mehmet Necip
    Ogundijo, Oyetunji
    Li, Chong
    Wang, Xiaodong
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (05) : 5174 - 5185
  • [48] A novel approach for analyzing the nuclear supply chain cyber-attack surface
    Eggers, Shannon
    [J]. NUCLEAR ENGINEERING AND TECHNOLOGY, 2021, 53 (03) : 879 - 887
  • [49] Application of Artificial Neural Network for Cyber-Attack Detection in Water Distribution Systems as Cyber Physical Systems
    Min, Kyoung Won
    Choi, Young Hwan
    Al-Shamiri, Abobakr Khalil
    Kim, Joong Hoon
    [J]. ADVANCES IN HARMONY SEARCH, SOFT COMPUTING AND APPLICATIONS, 2020, 1063 : 82 - 88
  • [50] Distributed cyber-attack isolation for large-scale interconnected systems
    Gallo, Alexander J.
    Boem, Francesca
    Parisini, Thomas
    [J]. 2021 EUROPEAN CONTROL CONFERENCE (ECC), 2021, : 48 - 53