Author:
Zhou Xiaojun,Xu Zhen,Wang Liming,Chen Kai,Chen Cong,Zhang Wei
Abstract
Attacks in industrial control systems vary widely and are influenced by many factors, including the intent of the attacker, the capabilities of the attacker, the sophistication of the attacking techniques, and his familiarity with the industrial control systems and industrial processes. Attacks against industrial control systems are not a simple network intrusion, but are accomplished through a series of activities to achieve precise attack. This article expands the cyber kill chain model to improve it so that it can be applied to industrial control systems to ensure that defenders in industrial control can understand the attackers' attack activities so as to reasonably allocate limited security resources, take effective security measures and make well-informed risk management decision.
Reference6 articles.
1. A reference model for computer integrated manufacturing from the viewpoint of industrial automation
2. Langner R. To kill a centrifuge: A technical analysis of what stuxnet's creators tried to achieve[J]. Online: http://www.langner.com/en/wp-content/uploads/2013/11/To-kill-a-centrifuge.pdf, 2013.
3. Hentunen D T. A: Havex Hunts for ICS/SCADA Systems [on-line][J]. 2014.
4. Assante M J, Lee R M. The industrial control system cyber kill chain[J]. SANS Institute InfoSec Reading Room, 2015, 1.
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献