2018
DOI: 10.1051/matecconf/201817301013
|View full text |Cite
|
Sign up to set email alerts
|

Kill Chain for Industrial Control System

Abstract: Abstract. Attacks in industrial control systems vary widely and are influenced by many factors, including the intent of the attacker, the capabilities of the attacker, the sophistication of the attacking techniques, and his familiarity with the industrial control systems and industrial processes. Attacks against industrial control systems are not a simple network intrusion, but are accomplished through a series of activities to achieve precise attack. This article expands the cyber kill chain model to improve … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(12 citation statements)
references
References 2 publications
0
12
0
Order By: Relevance
“…The paper with the title "Kill chain for industrial control system" [21] explains adversary actions and techniques with the help of the kill chain. We have derived kill chain methodology for SCADA from [21] and integrated it with cyber deception, and presents kill chain and deception approach for SCADA as shown in Figure 4. This will help us to identify attack behaviors at each phase of an attack.…”
Section: A Kill Chain Analysismentioning
confidence: 99%
“…The paper with the title "Kill chain for industrial control system" [21] explains adversary actions and techniques with the help of the kill chain. We have derived kill chain methodology for SCADA from [21] and integrated it with cyber deception, and presents kill chain and deception approach for SCADA as shown in Figure 4. This will help us to identify attack behaviors at each phase of an attack.…”
Section: A Kill Chain Analysismentioning
confidence: 99%
“…Cyberattacks on the grid-such as the 2019 DoS on energy provider Sustainable Power Group (sPower) and the Havex malware, which targeted industrial control system (ICS) devices through a remote access Trojan-emphasize the need for secure DERs and grid edge devices (Zhou et al 2018).…”
Section: Motivation To Establish Cybersecurity Certification Recommendationsmentioning
confidence: 99%
“…Cyber kill chain is focused on malware-based intrusion and APTs [50]. The CKC model has been expanded and improved for use in industrial control systems (ICS) and internal threats, i.e., the ICS cyber kill chain [21,24] and extended cyber kill chain [25] respectively. A combination of both these kill chains can be applied in the railway (Figure 2).…”
Section: Unified Extended Cyber Kill Chain and Ics Cyber Kill Chainmentioning
confidence: 99%
“…• Reconnaissance: The first stage of the model, one of the most difficult stages to detect from a security monitoring perspective, is the planning stage of the cyber-attack. The adversary searches for and gathers information about the organization background, resources, and individual employees through social sites, conferences, blogs, mailing lists and Figure 2 Unified extended cyber kill chain [25] and ICS cyber kill chain [21,24].…”
Section: External Cyber Kill Chain Modelmentioning
confidence: 99%
See 1 more Smart Citation