2020
DOI: 10.1007/978-3-030-54549-9_10
|View full text |Cite
|
Sign up to set email alerts
|

An Attacker Modeling Framework for the Assessment of Cyber-Physical Systems Security

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…To detect the malicious attack in the network, prevent the attack on the system and resources, and preserve sensitive information from cybercriminal activities of the network, various approaches are implemented ( Disha & Waheed, 2022 ). Cyber-physical systems (CPS) have been implemented in connecting different sensor-based devices, IoT-based devices, and robots where information is collected from multiple terminal devices in heterogeneous data ( Deloglos, Elks & Tantawy, 2020 ; Li et al, 2022 ). The KDD 99 and NSLKDD 99 datasets identify cyber-attacks in the cyber-physical system ( Thomas & Pavithran, 2018 ; Li et al, 2021 ).…”
Section: Review Of Literaturementioning
confidence: 99%
“…To detect the malicious attack in the network, prevent the attack on the system and resources, and preserve sensitive information from cybercriminal activities of the network, various approaches are implemented ( Disha & Waheed, 2022 ). Cyber-physical systems (CPS) have been implemented in connecting different sensor-based devices, IoT-based devices, and robots where information is collected from multiple terminal devices in heterogeneous data ( Deloglos, Elks & Tantawy, 2020 ; Li et al, 2022 ). The KDD 99 and NSLKDD 99 datasets identify cyber-attacks in the cyber-physical system ( Thomas & Pavithran, 2018 ; Li et al, 2021 ).…”
Section: Review Of Literaturementioning
confidence: 99%
“…Based on an enterprise architecture, it calculates how secure a system is by using the likelihood of successful attacks. [4], [27] or Deloglos et al [28] provide an attack path calculation approach. They also use various attack classifications as a basis.…”
Section: A Attack Modelling and Analysismentioning
confidence: 99%
“…However, determining the initial values for the probability of an attack is quite cumbersome, and so far, the propagation does not consider dynamic access policies like ABAC [5]. Approaches such as [39], [40] or Deloglos et al [41] reuse existing vulnerability classifications to calculate the attack paths. However, so far they do not explicitly consider access control policies.…”
Section: State Of the Artmentioning
confidence: 99%