Affiliation:
1. Electrical And Computer Engineering New York University Abu Dhabi
Abstract
This article discusses a comprehensive methodology for designing an Advanced Persistent Threat (APT), which is a stealthy and continuous type of cyberattack with a high level of sophistication suitable for the complex environment of Industrial Control Systems (ICS). The article also explains defensive strategies that can assist in thwarting cyberattacks. The APT design process begins with Reconnaissance, which is continuously undertaken throughout the lifetime of a cyberattack campaign. With regard to securing the network infrastructure of an ICS, best practices for network security should be enforced. These could include the use of firewalls, Intrusion Detection or Prevention Systems (IDS/IPS), and network separation between corporate and field networks. A new field of research for securing ICS relates to process-aware defense mechanisms. These mechanisms analyze information directly from the field and try to detect anomalies specific to the physical characteristics of an ICS process.
Reference18 articles.
1. L.
Sha
, S.Gopalakrishnan, X.Liu, Q.Wang, “Cyber-Physical Systems: A New Frontier,” IEEE International Conference on Sensor Networks, Ubiquitous and Trustworthy Computing, 2008.
2. K.
Stouffer
, V.Pillitteri, S.Lightman, M.Abrams, A.Hahn, “Guide to Industrial Control Systems (ICS) Security,” NIST Special Publication 800-82 Revision 2, 2015.
3. “Industrial hacking - the untold story,” Computer-Weekly.com, August 10, 2015.
4. N.
Falliere
, L. O.Murchu, E.Chien, “W32. Stuxnet Dossier v1.4,” White paper, Symantec Corp., 2011.
5. T.
de Maizière
, “The State of IT Security in Germany 2014,” German Federal Office for Information Security Report, 2014.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Advanced Persistent Threat Detection in Smart Grid Clouds Using Spatiotemporal Context-Aware Graph Embedding;GLOBECOM 2022 - 2022 IEEE Global Communications Conference;2022-12-04
2. CloudPAD;Proceedings of the 4th Workshop on CPS & IoT Security and Privacy;2022-11-07
3. Detecting Unknown Threat Based on Continuous-Time Dynamic Heterogeneous Graph Network;Wireless Communications and Mobile Computing;2022-07-25
4. Open Source Intelligence for Energy Sector Cyberattacks;Advanced Sciences and Technologies for Security Applications;2019