Affiliation:
1. System Security Research Center, Chonnam National University, Gwangju 61186, Republic of Korea
2. Department of Data Science, Chonnam National University, Gwangju 61186, Republic of Korea
Abstract
Security incidents targeting control systems and the industrial internet of things (IIoT) are on the rise as attackers gain a better understanding of the nature of these systems and their increasing connectivity to information technology (IT). Every year, the number of vulnerabilities associated with these incidents increases, making it impractical to apply timely patches for all of them. The current vulnerability assessments, which are the basis for vulnerability patching, have limitations in that they do not adequately reflect the risk of exploitation in the real world after discovery and do not consider operational technology (OT) and industrial control system (ICS) environments other than IT environments. This study proposes to evaluate exploit risk in real-world environments by considering OT/ICS environments and calculating three metrics, including exploit chain risk, exploit code availability, and exploit use probability based on cyber threat information, including IIoT vulnerability data, used in OT/ICS environments. In addition, we construct exploitation scenarios in a control system environment to prioritize vulnerabilities with a high risk of exploitation based on the three metrics. We show that by assessing the risk of attackers’ intentions and exploited technologies for attacks against IIoT devices in a control system environment, we can provide defenders with comprehensive attack risk information for proactive defense.
Funder
Nuclear Safety and Security Commission (NSSC) of the Republic of Korea
Korean government
MSIT (Ministry of Science and ICT), Korea
IITP
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference30 articles.
1. Addressing Industry 4.0 Cybersecurity Challenges;Culot;IEEE Eng. Manag. Rev.,2019
2. (2023, June 18). FIRST CVSS Documentation. Available online: https://www.first.org/cvss/specification-document.
3. Balsam, A., Nowak, M., Walkowski, M., Oko, J., and Sujecki, S. (2023, January 2–6). Analysis of CVSS Vulnerability Base Scores in the Context of Exploits’ Availability. Proceedings of the 2023 23rd International Conference on Transparent Optical Networks (ICTON), Bucharest, Romania.
4. A look at the time delays in CVSS vulnerability scoring;Ruohonen;Appl. Comput. Inform.,2019
5. A Survey of IIoT Protocols: A Measure of Vulnerability Risk Analysis Based on CVSS;Arrizabalaga;ACM Comput. Surv.,2020
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献