An evaluation framework for industrial control system cyber incidents

被引:16
|
作者
Firoozjaei, Mandi Daghmehchi [1 ]
Mahmoudyar, Nastaran [1 ]
Baseri, Yaser [1 ]
Ghorbani, Ali A. [1 ]
机构
[1] Univ New Brunswick, Canadian Inst Cybersecur, Fredericton, NB, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Industrial control system (ICS) cyber incident; Advanced persistent threat (APT); MITRE ATT&CK; Cybersecurity; Threat score;
D O I
10.1016/j.ijcip.2021.100487
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Industrial control systems (ICSs) and critical infrastructure are targeted by sophisticated cyber incidents launched by skillful and persistent attackers. Due to political, public image, or industrial competition reasons, most incidents are not publicly reported. Therefore, their consequences and threats are not as known as well as those in information technology (IT) systems. This paper aims to provide a foundation for cyber risk assessment for operational technology (OT) systems. To this end, we review the adversarial tactics and techniques employed by attackers to launch ICS cyberattacks and analyze the attack mechanisms of six significant ICS cyber incidents in the energy and power industries, namely Stuxnet, BlackEnergy, Crashoverride, Triton, Irongate, and Havex. We introduce an evaluation framework to evaluate the threat level of the ICS cyber incidents based on their sophistication and incident consequences. Finally, we rate the analyzed ICS cyber incidents based on their threat scores. Our evaluation rates Stuxnet as the most sophisticated and high-threat ICS malware and Irongate the lowest. We hope our evaluation can shed light on the design of protection solutions for OT systems.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Industrial control system security taxonomic framework with application to a comprehensive incidents survey
    Ahmadian, Mohammad Mehdi
    Shajari, Mehdi
    Shafiee, Mohammad Ali
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2020, 29
  • [2] Situation awareness framework for industrial control system based on cyber kill chain
    Wang, Yufei
    Zhang, Tengbiao
    Ye, Qian
    [J]. 2020 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE COMMUNICATION AND NETWORK SECURITY (CSCNS2020), 2021, 336
  • [3] An Evaluation of Cyber Threats to Industrial Control Systems
    Vavra, Jan
    Hromada, Martin
    [J]. INTERNATIONAL CONFERENCE ON MILITARY TECHNOLOGIES (ICMT 2015), 2015, : 369 - 373
  • [4] Security incidents database documents industrial cyber events
    不详
    [J]. CONTROL ENGINEERING, 2010, 57 (01) : 24 - 24
  • [5] Design and Implementation of Industrial Control Cyber Range System
    Low, Xuan
    Yang, DeQuan
    Yang, DengPan
    [J]. 2022 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY, CYBERC, 2022, : 166 - 170
  • [6] Overview of Cyber-security of Industrial Control System
    Fan, Xiaohe
    Fan, Kefeng
    Wang, Yong
    Zhou, Ruikang
    [J]. 2015 INTERNATIONAL CONFERENCE ON CYBER SECURITY OF SMART CITIES, INDUSTRIAL CONTROL AND COMMUNICATIONS (SSIC), 2015,
  • [7] The industrial control system cyber defence triage process
    Cook, Allan
    Janicke, Heige
    Smith, Richard
    Maglaras, Leandros
    [J]. COMPUTERS & SECURITY, 2017, 70 : 467 - 481
  • [8] A hybrid cyber defense framework for reconnaissance attack in industrial control systems
    Qin, Xingsheng
    Jiang, Frank
    Dong, Chengzu
    Doss, Robin
    [J]. COMPUTERS & SECURITY, 2024, 136
  • [9] Cyber Resilience Framework for Industrial Control Systems: Concepts, Metrics, and Insights
    Haque, Md Ariful
    De Teyou, Gael Kamdem
    Shetty, Sachin
    Krishnappa, Bheshaj
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2018, : 25 - 30
  • [10] Cyber Threat Information Sharing System for Industrial Control System (ICS)
    Abe, Shingo
    Uchida, Yukako
    Hori, Mitsutaka
    Hiraoka, Yuichiro
    Horata, Shinichi
    [J]. 2018 57TH ANNUAL CONFERENCE OF THE SOCIETY OF INSTRUMENT AND CONTROL ENGINEERS OF JAPAN (SICE), 2018, : 374 - 379