2009
DOI: 10.1109/tii.2009.2018627
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Chains of Vulnerabilities in Industrial Networks

Abstract: In modern factories, personal computers are starting to replace traditional Programmable Logic Controllers, due to cost and flexibility reasons, and also because their operating systems now support programming environments even suitable for demanding real-time applications. These characteristics, as well as the ready availability of many software packages covering any kind of needs, have made the introduction of PC-based devices at the factory field level especially attractive.However, this approach has a prof… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0
2

Year Published

2011
2011
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(21 citation statements)
references
References 27 publications
0
19
0
2
Order By: Relevance
“…These methodologies generally focus on detecting chains of vulnerabilities [58] or developing attack trees [59], as overcoming even low levels of security on a network often involves exploiting a series of several vulnerabilities before effecting a meaningful compromise. Such analysis is vital in the formulation of an effective security policy, which is often one of the most difficult aspects of successfully securing a network.…”
Section: B Securitymentioning
confidence: 99%
“…These methodologies generally focus on detecting chains of vulnerabilities [58] or developing attack trees [59], as overcoming even low levels of security on a network often involves exploiting a series of several vulnerabilities before effecting a meaningful compromise. Such analysis is vital in the formulation of an effective security policy, which is often one of the most difficult aspects of successfully securing a network.…”
Section: B Securitymentioning
confidence: 99%
“…A portion of the HLPN model shown in Figure 3 is depicted in Figure 4, which represents the registration process of domains on the DS. ∶= sp-cr [10], sp-r [2] ∶= sp-cr [11], sp-r [3] ∶= sp-cr [12], sp-r [4] ∶= sp-cr [13], sp-r [10] ∶= sp-cr [14], sp-r [13] ∶= sp-cr [9], sp-r [25] ∶= sp-cr [24], sp-r [11] ∶= CR − REG − DID (sp-cr [17], sp-cr [10]), sp-r [12] ∶= CR − REG − SK (sp-cr [17], sp-cr [10]), sp-cr [15] ∶= sp-r [11], sp-cr [16] ∶= sp-r [12], sp-ua [1] ∶= sp-r [11], sp-ua [2] ∶= sp-r [12], Sp − Cr ′ = Sp − Cr ∪ (sp-cr [15], sp-cr [16]) ∧ Sp − R ′ = Sp − R ∪ (sp-r [1], sp-r [2], sp-r [3], sp-r [4], sp-r [10], sp-r [13], sp-r [11], sp-r [12], sp-r [25]…”
Section: Modeling and Analysis Of Xdauth Protocolmentioning
confidence: 99%
“…Formal methods have been found to be very useful in the verification of protocols. Formal methods provide techniques and tools for specifying the system and checking the security properties for system verification [15], [16], [17], [55]. Some cryptographic protocols such as Needham-Schroeder, TMN, Kerberos and a formal foundation for web security have been successfully verified using Formal methods approaches, which exposed the security flaws [18], [19].…”
Section: Introductionmentioning
confidence: 99%
“…In the last years, the security of industrial networked systems (INS) and, especially, those aspects regarding the protection against threats carried out from either their inside or their outside have been receiving increasing attention [1][2][3][4][5][6][7]. Prevention/detection of attacks as well as reaction triggering have been also significantly considered in the scientific literature [8][9][10].…”
Section: Introductionmentioning
confidence: 99%