Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
extended-abstract

CPS-based Threat Modeling for Critical Infrastructure Protection

Published: 11 October 2017 Publication History

Abstract

Cyber-Physical Systems (CPSs) are augmenting traditional Critical Infrastructures (CIs) with data-rich operations. This integration creates complex interdependencies that expose CIs and their components to new threats. A systematic approach to threat modeling is necessary to assess CIs' vulnerability to cyber, physical, or social attacks. We suggest a new threat modeling approach to systematically synthesize knowledge about the safety management of complex CIs and situational awareness that helps understanding the nature of a threat and its potential cascading-effects implications.

References

[1]
Alderson D, Brown G, Carlyle W, Wood RK. Solving defender-attacker-defender models for infrastructure defense. Pp. 28--49 in Wood K, Dell R (eds). Operations Research, Computing and Homeland Defense. Hanover, MD: Institute for Operations Research and the Management Sciences, 2011.
[2]
Paul Ammann, Duminda Wijesekera, Saket Kaushik, Scalable, graph-based network vulnerability analysis, Proceedings of the 9th ACM conference on Computer and communications security, November 18-22, 2002
[3]
Stefano Bistarelli, Marco Dall'Aglio, Pamela Peretti, Strategic games on defense trees, Proceedings of the 4th international conference on Formal aspects in security and trust, p.1--15, August 26-27, 2006.
[4]
Kordy, Barbara, Ludovic Piètre-Cambacédès, and Patrick Schweitzer. "DAG-based attack and defense modeling: Dont miss the forest for the attack trees." Computer science review 13 (2014): 1--38.
[5]
Bau, J.; Mitchell, J.C., "Security Modeling and Analysis," Security & Privacy, IEEE, vol.9, no.3, pp.18--25, May-June 2011
[6]
Schneier, Bruce (December 1999). "Attack Trees". Dr Dobb's Journal, v.24, n.12.
[7]
Singer, D. (1990). A fuzzy set approach to fault tree and reliability analysis. Fuzzy sets and systems, 34(2), 145--155.

Cited By

View all
  • (2024)Bridging the Gap: A Survey and Classification of Research-Informed Ethical Hacking ToolsJournal of Cybersecurity and Privacy10.3390/jcp40300214:3(410-448)Online publication date: 16-Jul-2024
  • (2024)A Quantal Response Analysis of Simultaneous Multi-Target Attacker-Defender Security GamesNOMS 2024-2024 IEEE Network Operations and Management Symposium10.1109/NOMS59830.2024.10575252(1-6)Online publication date: 6-May-2024
  • (2024)Railway Safety, from a Set of Rules to Cyber Physical Systems2024 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR)10.1109/AQTR61889.2024.10554189(1-4)Online publication date: 16-May-2024
  • Show More Cited By
  1. CPS-based Threat Modeling for Critical Infrastructure Protection

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM SIGMETRICS Performance Evaluation Review
    ACM SIGMETRICS Performance Evaluation Review  Volume 45, Issue 2
    Setember 2017
    131 pages
    ISSN:0163-5999
    DOI:10.1145/3152042
    Issue’s Table of Contents
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 11 October 2017
    Published in SIGMETRICS Volume 45, Issue 2

    Check for updates

    Qualifiers

    • Extended-abstract

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)31
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 13 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Bridging the Gap: A Survey and Classification of Research-Informed Ethical Hacking ToolsJournal of Cybersecurity and Privacy10.3390/jcp40300214:3(410-448)Online publication date: 16-Jul-2024
    • (2024)A Quantal Response Analysis of Simultaneous Multi-Target Attacker-Defender Security GamesNOMS 2024-2024 IEEE Network Operations and Management Symposium10.1109/NOMS59830.2024.10575252(1-6)Online publication date: 6-May-2024
    • (2024)Railway Safety, from a Set of Rules to Cyber Physical Systems2024 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR)10.1109/AQTR61889.2024.10554189(1-4)Online publication date: 16-May-2024
    • (2024)Anomaly Detection in Smart Environments: A Comprehensive SurveyIEEE Access10.1109/ACCESS.2024.339505112(64006-64049)Online publication date: 2024
    • (2024)A Quantal Response Analysis of Human Decision-Making in Interdependent Security Games Modeled by Attack GraphsIEEE Access10.1109/ACCESS.2024.339130512(56159-56178)Online publication date: 2024
    • (2024)Systematic analysis of automated threat modelling techniques: Comparison of open-source toolsSoftware Quality Journal10.1007/s11219-023-09634-432:1(125-161)Online publication date: 1-Mar-2024
    • (2023)Assessing Damage and Recovery of Critical Data in Unsecure Cloud Systems2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE)10.1109/CSCE60160.2023.00200(1191-1198)Online publication date: 24-Jul-2023
    • (2023)Attack Detection Based on Machine Learning Techniques to Safe and Secure for CPS—A ReviewInternational Conference on IoT, Intelligent Computing and Security10.1007/978-981-19-8136-4_23(273-286)Online publication date: 2-Apr-2023
    • (2022)Lightweight Long Short-Term Memory Variational Auto-Encoder for Multivariate Time Series Anomaly Detection in Industrial Control SystemsSensors10.3390/s2208288622:8(2886)Online publication date: 9-Apr-2022
    • (2022)Optimized Damage Assessment in Large Datasets in Cloud2022 IEEE/ACM 15th International Conference on Utility and Cloud Computing (UCC)10.1109/UCC56403.2022.00067(384-390)Online publication date: Dec-2022
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media