Preventing Advanced Persistent Threats in Complex Control Networks

被引:18
|
作者
Rubio, Juan E. [1 ]
Alcaraz, Cristina [1 ]
Lopez, Javier [1 ]
机构
[1] Univ Malaga, Dept Comp Sci, Campus Teatinos S-N, Malaga 29071, Spain
来源
关键词
Advanced; Persistent; Threat; Attack; Detection; Response; Consensus; Opinion; Dynamics; Secret; Sharing; Redundant; Topology; STRUCTURAL CONTROLLABILITY; DOMINATION;
D O I
10.1007/978-3-319-66399-9_22
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An Advanced Persistent Threat (APT) is an emerging attack against Industrial Control and Automation Systems, that is executed over a long period of time and is difficult to detect. In this context, graph theory can be applied to model the interaction among nodes and the complex attacks affecting them, as well as to design recovery techniques that ensure the survivability of the network. Accordingly, we leverage a decision model to study how a set of hierarchically selected nodes can collaborate to detect an APT within the network, concerning the presence of changes in its topology. Moreover, we implement a response service based on redundant links that dynamically uses a secret sharing scheme and applies a flexible routing protocol depending on the severity of the attack. The ultimate goal is twofold: ensuring the reachability between nodes despite the changes and preventing the path followed by messages from being discovered.
引用
收藏
页码:402 / 418
页数:17
相关论文
共 50 条
  • [41] Sentient-based Access Control model: A mitigation technique for Advanced Persistent Threats in Smartphones
    Zulkefli, Zakiah
    Singh, Manmeet Mahinderjit
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 51
  • [42] Anomaly Detection to Protect Networks from Advanced Persistent Threats Using Adaptive Resonance AI Concepts
    Rizvi, Syed
    Flock, Tanner
    Flock, Travis
    Williams, Iyonna
    2020 INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND ASSURANCE (ICSSA 2020), 2020, : 60 - 65
  • [43] Surviving advanced persistent threats in a distributed environment - Architecture and analysis
    Mehresh, Ruchika
    Upadhyaya, Shambhu
    INFORMATION SYSTEMS FRONTIERS, 2015, 17 (05) : 987 - 995
  • [44] Learning Games for Defending Advanced Persistent Threats in Cyber Systems
    Zhu, Tianqing
    Ye, Dayong
    Cheng, Zishuo
    Zhou, Wanlei
    Yu, Philip S.
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2023, 53 (04): : 2410 - 2422
  • [45] A Context-Based Detection Framework for Advanced Persistent Threats
    Giura, Paul
    Wang, Wei
    2012 ASE INTERNATIONAL CONFERENCE ON CYBER SECURITY (CYBERSECURITY), 2012, : 69 - 74
  • [46] An Advanced Persistent Threats Awareness Technology Based on "Condensed matter"
    Wang, Yutong
    Chang, Chaowen
    Ma, Zengbang
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING 2015 (ICMMCCE 2015), 2015, 39 : 1614 - 1619
  • [47] Expert knowledge and data analysis for detecting advanced persistent threats
    Ramon Moya, Juan
    DeCastro-Garcia, Noemi
    Fernandez-Diaz, Ramon-Angel
    Lorenzana Tamargo, Jorge
    OPEN MATHEMATICS, 2017, 15 : 1108 - 1122
  • [48] Advanced Persistent Threats Detection based on Deep Learning Approach
    Eke, Hope Nkiruka
    Petrovski, Andrei
    2023 IEEE 6TH INTERNATIONAL CONFERENCE ON INDUSTRIAL CYBER-PHYSICAL SYSTEMS, ICPS, 2023,
  • [49] Advanced Persistent Threats (APT): evolution, anatomy, attribution and countermeasures
    Sharma A.
    Gupta B.B.
    Singh A.K.
    Saraswat V.K.
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (07) : 9355 - 9381
  • [50] Modeling advanced persistent threats using risk matrix methods
    Nina D. Ivanova
    Vitaliy G. Ivanenko
    Journal of Computer Virology and Hacking Techniques, 2023, 19 : 367 - 372