GENICS: A Framework for Generating Attack Scenarios for Cybersecurity Exercises on Industrial Control Systems

Author:

Song InSung1ORCID,Jeon Seungho2ORCID,Kim Donghyun1,Lee Min Gyu1,Seo Jung Taek3ORCID

Affiliation:

1. Department of Information Security, Gachon University, Seongnam-daero 1342, Seongnam-si 13119, Republic of Korea

2. Department of Computer Engineering (Smart Security), Gachon University, Seongnam-daero 1342, Seongnam-si 13119, Republic of Korea

3. Department of Computer Engineering, Gachon University, Seongnam-daero 1342, Seongnam-si 13119, Republic of Korea

Abstract

Due to the nature of the industrial control systems (ICS) environment, where process continuity is essential, intentionally initiating a cyberattack to check security controls can cause severe financial and human damage to the organization. Therefore, most organizations operating ICS environments check their level of security through simulated cybersecurity exercises. For these exercises to be effective, high-quality cyberattack scenarios that are likely to occur in the ICS environment must be assumed. Unfortunately, many organizations use limited attack scenarios targeting essential digital assets, leading to ineffective response preparedness. To derive high-quality scenarios, there is a need for relevant attack and vulnerability information, and standardized methods for creating and evaluating attack scenarios in the ICS context. To meet these challenges, we propose GENICS, an attack scenario generation framework for cybersecurity training in ICS. GENICS consists of five phases: threat analysis, attack information identification, modeling cyberattack scenarios, quantifying cyberattacks, and generating scenarios. The validity of GENICS was verified through a qualitative study and case studies on current attack scenario-generating methods. GENICS ensures a systematic approach to generate quantified, realistic attack scenarios, thereby significantly enhancing cybersecurity training in ICS environments.

Funder

Korea Foundation of Nuclear Safety

Nuclear Safety and Security Commission (NSSC) of the Republic of Korea

Korea Institute of Energy Technology Evaluation and Planning

Korea government

Gachon University research fund of 2023

Publisher

MDPI AG

Subject

Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science

Reference37 articles.

1. (2022). Information Security, Cybersecurity and Privacy Protection-Information Security Management System-Requirements (Standard No. ISO/IEC 27001:2022).

2. Stuxnet and the future of cyber war;Farwell;Survival,2011

3. TRITON: The first ICS cyber attack on safety instrument systems;Dragoni;Proc. Black Hat USA,2018

4. Kim, J., Kim, K., and Jang, M. (May, January 28). Cyber-physical battlefield platform for large-scale cybersecurity exercises. Proceedings of the 2019 11th International Conference on Cyber Conflict (CyCon), Tallinn, Estonia.

5. Cyber incident exercise for safety protection in critical infrastructure;Ota;Int. J. Saf. Secur. Eng.,2018

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3