Preventing Advanced Persistent Threats in Complex Control Networks

被引:18
|
作者
Rubio, Juan E. [1 ]
Alcaraz, Cristina [1 ]
Lopez, Javier [1 ]
机构
[1] Univ Malaga, Dept Comp Sci, Campus Teatinos S-N, Malaga 29071, Spain
来源
关键词
Advanced; Persistent; Threat; Attack; Detection; Response; Consensus; Opinion; Dynamics; Secret; Sharing; Redundant; Topology; STRUCTURAL CONTROLLABILITY; DOMINATION;
D O I
10.1007/978-3-319-66399-9_22
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An Advanced Persistent Threat (APT) is an emerging attack against Industrial Control and Automation Systems, that is executed over a long period of time and is difficult to detect. In this context, graph theory can be applied to model the interaction among nodes and the complex attacks affecting them, as well as to design recovery techniques that ensure the survivability of the network. Accordingly, we leverage a decision model to study how a set of hierarchically selected nodes can collaborate to detect an APT within the network, concerning the presence of changes in its topology. Moreover, we implement a response service based on redundant links that dynamically uses a secret sharing scheme and applies a flexible routing protocol depending on the severity of the attack. The ultimate goal is twofold: ensuring the reachability between nodes despite the changes and preventing the path followed by messages from being discovered.
引用
收藏
页码:402 / 418
页数:17
相关论文
共 50 条
  • [31] Concept and difficulties of advanced persistent threats (APT): Survey
    Khaleefa, Eman J.
    Abdulah, Dhahair A.
    INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2022, 13 (01): : 4037 - 4052
  • [32] Advanced Persistent threats and how to monitor and deter them
    Tankard C.
    Network Security, 2011, 2011 (08) : 16 - 19
  • [33] Developing Secure Products in the Age of Advanced Persistent Threats
    Baize, Eric
    IEEE SECURITY & PRIVACY, 2012, 10 (03) : 88 - 92
  • [34] Hybrid Analysis Technique to detect Advanced Persistent Threats
    Chakkaravarthy, S. Sibi
    Vaidehi, V.
    Rajesh, P.
    INTERNATIONAL JOURNAL OF INTELLIGENT INFORMATION TECHNOLOGIES, 2018, 14 (02) : 59 - 76
  • [35] Identifying Vulnerabilities of Advanced Persistent Threats: An Organizational Perspective
    Nicho, Mathew
    Khan, Shafaq
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2014, 8 (01) : 1 - 18
  • [36] An adaptive defense mechanism to prevent advanced persistent threats
    Xie, Yi-xi
    Ji, Li-xin
    Li, Ling-shu
    Guo, Zehua
    Baker, Thar
    CONNECTION SCIENCE, 2021, 33 (02) : 359 - 379
  • [37] Beyond Blacklisting: Cyberdefense in the Era of Advanced Persistent Threats
    Beuhring, Aaron
    Salous, Kyle
    IEEE SECURITY & PRIVACY, 2014, 12 (05) : 90 - 93
  • [38] APTHunter: Detecting Advanced Persistent Threats in Early Stages
    Mahmoud, Moustafa
    Mannan, Mohammad
    Youssef, Amr
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2023, 4 (01):
  • [39] The Influences of Feature Sets on the Detection of Advanced Persistent Threats
    Hofer-Schmitz, Katharina
    Kleb, Ulrike
    Stojanovic, Branka
    ELECTRONICS, 2021, 10 (06) : 1 - 22
  • [40] From Tactics to Techniques: A Systematic Attack Modeling for Advanced Persistent Threats in Industrial Control Systems
    Yang, Yunhe
    Zhang, Mu
    2023 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS, EUROS&PW, 2023, : 336 - 344