Cyber-Attacks on the Oil & Gas Sector: A Survey on Incident Assessment and Attack Patterns

被引:19
|
作者
Stergiopoulos, George [1 ]
Gritzalis, Dimitris A. [1 ]
Limnaios, Evangelos [2 ]
机构
[1] Athens Univ Econ & Business AUEB, Dept Informat, Athens 10434, Greece
[2] Publ Gas Corp Greece DEPA SA, Athens 14121, Greece
来源
IEEE ACCESS | 2020年 / 8卷
关键词
Cybersecurity; cyberattack; oil and gas; critical infrastructure; refinery; operational technology; information technology; vulnerability; impact; risk; safety; survey; INJECTION ATTACKS; PHYSICAL SYSTEMS; INFRASTRUCTURE; SECURITY; CYBERSECURITY; PROTECTION; IMPACT;
D O I
10.1109/ACCESS.2020.3007960
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
During the past two decades, oil and gas operational and information technology systems have experienced constant digital growth, closely followed by an increasing number of cyber-attacks on the newly interconnected systems. Adversaries exploit vulnerable accessible device or malware attacks networked services, in an attempt to gain access to critical systems and machinery that are interconnected over networks. Given the importance of the oil and gas sector on the global economy and the diversity of critical systems often being controlled over remote locations, it is highly important to understand and mitigate such attacks. In this paper, we survey cyber-attacks on all three domains of the oil and gas sector (upstream, midstream, downstream) starting from the early 90s up until 2020. For each domain, we document and analyze verified attacks based on real-world reports and published demo attacks on systems. We map and catalogue the attack types used in each case, in order to understand common and subliminal attack paths against oil and gas critical operations. Our aim is threefold, i.e., first, to assess documented attacks using standardized impact assessment techniques and highlight potential consequences of cyber-attacks on this sector, second, to build a vulnerability taxonomy based on technical knowledge gathered by all such incidents and connect each vulnerability with oil and gas systems and respective attack paths, and third, to map the documented knowledge and taxonomies with MITRE's international knowledge base of Adversary Tactics and Techniques, so as to provide a general guide for analyzing and protecting against cyber-attacks at oil and gas infrastructures.
引用
收藏
页码:128440 / 128475
页数:36
相关论文
共 50 条
  • [1] A System for Detecting Targeted Cyber-Attacks Using Attack Patterns
    Herwono, Ian
    El-Moussa, Fadi Ali
    [J]. INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, 867 : 20 - 34
  • [2] Cyber-Attacks - Trends, Patterns and Security Countermeasures
    Bendovschi, Andreea
    [J]. 7TH INTERNATIONAL CONFERENCE ON FINANCIAL CRIMINOLOGY 2015, 7TH ICFC 2015, 2015, 28 : 24 - 31
  • [3] A survey on Classification of Cyber-attacks on IoT and IIoT devices
    Shah, Yash
    Sengupta, Shamik
    [J]. 2020 11TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2020, : 406 - 413
  • [4] A Control and Attack Detection Scheme for Fuzzy Systems against Cyber-attacks
    Zhang, Haili
    Li, Linlin
    Qiao, Liang
    [J]. 2023 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, FUZZ, 2023,
  • [5] Potential Cyber-attacks against Global Oil Supply Chain
    Nasir, Muhammad Ali
    Nefti-Meziani, Samia
    Sultan, Shizra
    Manzoor, Umar
    [J]. 2015 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBERSA), 2015,
  • [6] Improving Attack Trees Analysis using Petri Net modeling of Cyber-Attacks
    Pasandideh, Shabnam
    Gomes, Luis
    Malo, Pedro
    [J]. 2019 IEEE 28TH INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS (ISIE), 2019, : 1644 - 1649
  • [7] Attack-Tolerant Network Control System Based on the Deception for the Cyber-Attacks
    Yaseen, Amer Atta
    Bayart, Mireille
    [J]. 2015 WORLD CONGRESS ON INDUSTRIAL CONTROL SYSTEMS SECURITY (WCICSS), 2015, : 37 - 44
  • [8] Minimizing Expected Maximum Risk from Cyber-Attacks with Probabilistic Attack Success
    Bhuiyan, Tanveer Hossain
    Nandi, Apurba K.
    Medal, Hugh
    Halappanavar, Maltantcsh
    [J]. 2016 IEEE SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2016,
  • [9] Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks
    Stan, Orly
    Bitton, Ron
    Ezrets, Michal
    Dadon, Moran
    Inokuchi, Masaki
    Ohta, Yoshinobu
    Yagyu, Tomohiko
    Elovici, Yuval
    Shabtai, Asaf
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 1936 - 1954
  • [10] Changes of Cyber-Attacks Techniques and Patterns after the Fourth Industrial Revolution
    Hur, Chang-Hoi
    Kim, Seong-Pyo
    Kim, Yoon-Soo
    Eom, Jung-Ho
    [J]. 2017 5TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW) 2017, 2017, : 69 - 74