Preventing Advanced Persistent Threats in Complex Control Networks

被引:18
|
作者
Rubio, Juan E. [1 ]
Alcaraz, Cristina [1 ]
Lopez, Javier [1 ]
机构
[1] Univ Malaga, Dept Comp Sci, Campus Teatinos S-N, Malaga 29071, Spain
来源
关键词
Advanced; Persistent; Threat; Attack; Detection; Response; Consensus; Opinion; Dynamics; Secret; Sharing; Redundant; Topology; STRUCTURAL CONTROLLABILITY; DOMINATION;
D O I
10.1007/978-3-319-66399-9_22
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An Advanced Persistent Threat (APT) is an emerging attack against Industrial Control and Automation Systems, that is executed over a long period of time and is difficult to detect. In this context, graph theory can be applied to model the interaction among nodes and the complex attacks affecting them, as well as to design recovery techniques that ensure the survivability of the network. Accordingly, we leverage a decision model to study how a set of hierarchically selected nodes can collaborate to detect an APT within the network, concerning the presence of changes in its topology. Moreover, we implement a response service based on redundant links that dynamically uses a secret sharing scheme and applies a flexible routing protocol depending on the severity of the attack. The ultimate goal is twofold: ensuring the reachability between nodes despite the changes and preventing the path followed by messages from being discovered.
引用
收藏
页码:402 / 418
页数:17
相关论文
共 50 条
  • [1] Advanced Persistent Threats
    Ozzengin, Yavuz Selim
    Sakiz, Fatih
    Benzer, Recep
    2016 24TH SIGNAL PROCESSING AND COMMUNICATION APPLICATION CONFERENCE (SIU), 2016, : 1845 - 1848
  • [2] MLDS: Multi-Layer Defense System for Preventing Advanced Persistent Threats
    Moon, Daesung
    Im, Hyungjin
    Lee, Jae Dong
    Park, Jong Hyuk
    SYMMETRY-BASEL, 2014, 6 (04): : 997 - 1010
  • [3] Dealing with Advanced Persistent Threats in Smart Grid ICT Networks
    Skopik, Florian
    Friedberg, Ivo
    Fiedler, Roman
    2014 IEEE PES INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2014,
  • [4] Security Evaluation of the Cyber Networks Under Advanced Persistent Threats
    Yang, Lu-Xing
    Li, Pengdeng
    Yang, Xiaofan
    Tang, Yuan Yan
    IEEE ACCESS, 2017, 5 : 20111 - 20123
  • [5] A Study on Advanced Persistent Threats
    Chen, Ping
    Desmet, Lieven
    Huygens, Christophe
    COMMUNICATIONS AND MULTIMEDIA SECURITY, CMS 2014, 2014, 8735 : 63 - 72
  • [6] A Practical Study on Advanced Persistent Threats
    Jeun, Inkyung
    Lee, Youngsook
    Won, Dongho
    COMPUTER APPLICATIONS FOR SECURITY, CONTROL AND SYSTEM ENGINEERING, 2012, 339 : 144 - +
  • [7] Advanced Persistent Threats & Social Engineering
    Weippl, Edgar
    2014 11TH INTERNATIONAL CONFERENCE ON E-BUSINESS (ICE-B), 2014, : IS21 - IS21
  • [8] Advanced Persistent Threats - Detection and Defense
    Vukalovic, J.
    Delija, D.
    2015 8TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2015, : 1324 - 1330
  • [9] Advanced Persistent Threats & Social Engineering
    Weippl, Edgar
    2014 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND MULTIMEDIA APPLICATIONS (SIGMAP), 2014, : IS13 - IS13
  • [10] Advanced Persistent Threats: Behind the Scenes
    Ussath, Martin
    Jaeger, David
    Cheng, Feng
    Meinel, Christoph
    2016 ANNUAL CONFERENCE ON INFORMATION SCIENCE AND SYSTEMS (CISS), 2016,