2019
DOI: 10.1109/jsyst.2018.2824252
|View full text |Cite
|
Sign up to set email alerts
|

From Detecting Cyber-Attacks to Mitigating Risk Within a Hybrid Environment

Abstract: Telecommunication networks based on commonplace technologies (such as Ethernet) often constitute a vulnerable attack vector against modern Critical Infrastructures (CIs), particularly for Supervisory Control and Data Acquisition (SCADA) systems, which rely on them for monitoring and controlling physical components. This article presents a unique platform that encompasses a range of capabilities, from cyber attack detection to mitigation strategies, through interdependency and risk evaluation. The platform is m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2
2

Relationship

2
7

Authors

Journals

citations
Cited by 21 publications
(10 citation statements)
references
References 27 publications
0
10
0
Order By: Relevance
“…These modelling approaches integrate only to a certain degree part of the CPS specifications and application domains. Otherwise, graph theory abstraction was used to model anomaly propagation, matching critical infrastructures interactions and interdependencies, based on mixed holistic reductionism [12], which is not adapted to CPS. Our work intends to further unify the CPS cyber space and physical world, with the perspective of a generic and comprehensive methodology [13], to cover the design, development, verification, and real-time analysis of CPS.…”
Section: R Wmentioning
confidence: 99%
“…These modelling approaches integrate only to a certain degree part of the CPS specifications and application domains. Otherwise, graph theory abstraction was used to model anomaly propagation, matching critical infrastructures interactions and interdependencies, based on mixed holistic reductionism [12], which is not adapted to CPS. Our work intends to further unify the CPS cyber space and physical world, with the perspective of a generic and comprehensive methodology [13], to cover the design, development, verification, and real-time analysis of CPS.…”
Section: R Wmentioning
confidence: 99%
“…Univ Roma,IT [96]; Univ Plymouth,UK [40]; Deakin Univ,AU & Univ Kentucky,US [41]; Chinese Acad Sci,CN [42]; Univ Roma,IT & Univ Coimbra,IT & Israel Elect Corp Ltd, IL [115]; UNIST,KR [43]; Air Force Inst Tech,US & Appl Res Solut,US & LGS Innovat,US [121]; DoD Nat Def Univ,US [88] Economic Evaluation Univ Virginia,US [9] Satisfiability Module theory Univ North Carolina,US [59] Tallin Manual Korea Univ,KR [102] Vulnerability Management Univ Luxembourg,LU & Itrust Consulting,LU & Roma Tre Univ,IT & CRAT,IT & Univ Coimbra,IT & Leonardo SpA,IT [58] Continued on next page Bayesian Max. Likelihood Est.…”
Section: Generalmentioning
confidence: 99%
“…In light of the above, security monitoring solutions, along with other mechanisms for preventive and reactive purposes, play a key role in the protection of physical infrastructures and processes. But securing ICS is not an easy task, for reasons such as the substantial differences between these systems and their IT counterparts [2], their increasing complexity, or the considerable amount of legacy technologies still in use, further aggravated by the fact that deploying security mechanisms or migrating away from obsolete technologies often cannot be performed without disruption of service or prohibitive costs.…”
Section: Introductionmentioning
confidence: 99%