dc.contributor.author |
Kumar, Rajesh |
|
dc.date.accessioned |
2023-01-09T06:47:34Z |
|
dc.date.available |
2023-01-09T06:47:34Z |
|
dc.date.issued |
2022-07 |
|
dc.identifier.uri |
https://www.sciencedirect.com/science/article/pii/S1874548222000129 |
|
dc.identifier.uri |
http://dspace.bits-pilani.ac.in:8080/xmlui/handle/123456789/8383 |
|
dc.description.abstract |
Modern-day industries are complex socio-technical entities. Understanding the risks associated with the operation of such systems requires proper consideration of budget constraints, security expertise and evaluating the effects of legacy services. A relatively newer and unorthodox form of cyber-attacks against such systems are Advanced Persistent Threats (APTs). APTs are resourceful and strategic, aiming at maximum damage by stalling critical services and stealing sensitive information. In this article, we demonstrate how attack trees can be used as a common language to model APT attacks in a practitioner-friendly manner. We do so by modelling three prominent APT attacks, namely Stuxnet, Blackenergy and Triton. Each attack is described in a systematic and structured way following the attack tree modelling language. We show that, because attack trees are compositional models, one can reuse them to model other complex attack scenarios. We illustrate this compositional feature by modelling attacks on an industrial oil-pipeline. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
Springer |
en_US |
dc.subject |
Computer Science |
en_US |
dc.subject |
Threat modelling |
en_US |
dc.subject |
Stuxnet |
en_US |
dc.subject |
Triton |
en_US |
dc.subject |
Cyber security risk management |
en_US |
dc.subject |
Advanced Persistent threats |
en_US |
dc.title |
APT attacks on industrial control systems: A tale of three incidents |
en_US |
dc.type |
Article |
en_US |