2023
DOI: 10.1145/3587255
|View full text |Cite
|
Sign up to set email alerts
|

Understanding Indicators of Compromise against Cyber-attacks in Industrial Control Systems: A Security Perspective

Abstract: Numerous sophisticated and nation-state attacks on Industrial Control Systems (ICSs) have increased in recent years, exemplified by Stuxnet and Ukrainian Power Grid. Measures to be taken post-incident are crucial to reduce damage, restore control, and identify attack actors involved. By monitoring Indicators of Compromise (IOCs), the incident responder can detect malicious activity triggers and respond quickly to a similar intrusion at an earlier stage. However, in order to implement IOCs in critical infrastru… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 21 publications
(14 citation statements)
references
References 108 publications
0
13
0
1
Order By: Relevance
“…Designing rule-based anomaly detection requires process knowledge and engineering effort [46], so automated approaches have emerged to address this difficulty [6], [22], [43]. Engineered rules can also serve as features for MLbased ICS anomaly-detection [39], [43], [53]: when rules are sufficiently complex, their values can be used as explanations or indicators of compromise [6], [13]. Rule-based and MLbased anomaly-detection have been compared for ICS [22], [36], [68]; this work focuses on exploring ML-based anomalydetection attributions for ICS that rely on such techniques.…”
Section: Rule-based Anomaly Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Designing rule-based anomaly detection requires process knowledge and engineering effort [46], so automated approaches have emerged to address this difficulty [6], [22], [43]. Engineered rules can also serve as features for MLbased ICS anomaly-detection [39], [43], [53]: when rules are sufficiently complex, their values can be used as explanations or indicators of compromise [6], [13]. Rule-based and MLbased anomaly-detection have been compared for ICS [22], [36], [68]; this work focuses on exploring ML-based anomalydetection attributions for ICS that rely on such techniques.…”
Section: Rule-based Anomaly Detectionmentioning
confidence: 99%
“…A key part of ICS operators' response to an attack is identifying its cause [13]. However, most proposals for using ML-based anomaly detection in ICS only identify whether an ICS as a whole is in a normal or anomalous state [72].…”
Section: Introductionmentioning
confidence: 99%
“…For CTI to be effective, organisations need to cooperate by sharing threat information which may affect them all, however, this is not always possible due to confidentiality or reputation (Mohaisen et al, 2017). Moreover, the quality of the shared information or indicators is crucial for effective CTI (Asiri et al, 2023).…”
Section: Related Workmentioning
confidence: 99%
“…The landscape of cybersecurity is continually evolving, with malware presenting a significant and persistent threat to systems and networks globally. The process of reverse engineering malware, which involves deconstructing and analyzing malicious code to understand its functionality and develop countermeasures, is critical in mitigating such threats [1,2]. However, the inherent complexity and obfuscation techniques employed by modern malware make the reverse engineering process highly challenging, often resulting in outputs that are difficult f or even e xperienced a nalysts to interpret [3][4][5].…”
Section: Introductionmentioning
confidence: 99%