Fuzzy approach on modelling cyber attacks patterns on data transfer in industrial control systems

11/30/2019
by   Emil Pricop, et al.
0

Cybersecurity of industrial control system is a very complex and challenging research topic, due to the integration of these systems in national critical infrastructures. The control systems are now interconnected in industrial networks and frequently to the Internet. In this context they are becoming targets of various cyber attacks conducted by malicious people such as hackers, script kiddies, industrial spies and even foreign armies and intelligence agencies. In this paper the authors propose a way to model the most frequent attacker profiles and to estimate the success rate of an attack conducted in given conditions. The authors use a fuzzy approach for generating attacker profiles based on attacker attributes such as knowledge, technical resources and motivation. The attack success rate is obtained by using another fuzzy inference system that analyzes the attacker profile and system intrinsic characteristics.

READ FULL TEXT

page 3

page 4

research
09/29/2019

The Social and Psychological Impact of Cyber-Attacks

Cyber-attacks have become as commonplace as the Internet itself. Each ye...
research
12/23/2020

Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems

Recently, neural network (NN)-based methods, including autoencoders, hav...
research
04/04/2023

A Deep Multi-Modal Cyber-Attack Detection in Industrial Control Systems

The growing number of cyber-attacks against Industrial Control Systems (...
research
01/28/2021

An Analytics Framework for Heuristic Inference Attacks against Industrial Control Systems

Industrial control systems (ICS) of critical infrastructure are increasi...
research
12/30/2022

An Analysis of Honeypots and their Impact as a Cyber Deception Tactic

This paper explores deploying a cyber honeypot system to learn how cyber...
research
10/07/2022

BayesImposter: Bayesian Estimation Based .bss Imposter Attack on Industrial Control Systems

Over the last six years, several papers used memory deduplication to tri...

Please sign up or login with your details

Forgot password? Click here to reset