Skip to main navigation Skip to search Skip to main content

An attack execution model for industrial control systems security assessment

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The improved communication and remote control capabilities of industrial control systems equipment have increased their attack surface. As a result, managing the security risk became a challenging task. The consequences of attacks in an industrial control system can go beyond targeted equipment to impact services in the industrial process. In addition, the success likelihood of an attack is highly correlated to the attacker profile and his knowledge of the architecture of the system. In this paper, we present the Attack Execution Model (AEM), which is an attack graph representing the evolution of the adversary’s state in the system after each attack step. We are interested in assessing the risk of cyber attacks on an industrial control system before the next maintenance period. Given a specific attacker profile, we generate all potential attacker actions that could be executed in the system. Our tool outputs the probability and the time needed to compromise a target equipment or services in the system.

Original languageEnglish
Title of host publicationSecurity of Industrial Control Systems and Cyber Physical Systems - 1st Workshop, CyberICS 2015 and 1st Workshop, WOS-CPS 2015, Revised Selected Papers
EditorsNora Cuppens-Boulahia, Frederic Cuppens, Adrien Bécue, Sokratis Katsikas, Costas Lambrinoudakis
PublisherSpringer Verlag
Pages157-167
Number of pages11
ISBN (Print)9783319403847
DOIs
Publication statusPublished - 1 Jan 2016
Event1st Workshop on Cybersecurity of Industrial Control Systems, CyberICS 2015 and 1st Workshop on the Security of Cyber-Physical Systems, WOS-CPS 2015 co-located with 20th European Symposium on Research in Computer Security, ESORICS 2015 - Vienna, Austria
Duration: 21 Sept 201522 Sept 2015

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9588
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference1st Workshop on Cybersecurity of Industrial Control Systems, CyberICS 2015 and 1st Workshop on the Security of Cyber-Physical Systems, WOS-CPS 2015 co-located with 20th European Symposium on Research in Computer Security, ESORICS 2015
Country/TerritoryAustria
CityVienna
Period21/09/1522/09/15

Keywords

  • Attack graph
  • Industrial control systems security
  • SCADA security

Fingerprint

Dive into the research topics of 'An attack execution model for industrial control systems security assessment'. Together they form a unique fingerprint.

Cite this