2016
DOI: 10.4028/www.scientific.net/amm.841.97
|View full text |Cite
|
Sign up to set email alerts
|

Using BDI Agents in Flexible Patterns for Cyber-Attacks over Electrical Power Infrastructures

Abstract: This work aims to assess how the infrastructure of production & transport of the electric energy can be annihilated in a nation-state through a cyber attack, as a particular form of manifestation of cybernetic warfare. In this study we consider that the purpose of the cyber attack is only to remove servers from service, logically or physically. There are several standards that integrate the business side of a company with the level of supervision of industrial infrastructure and with the level of control e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2016
2016
2018
2018

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(8 citation statements)
references
References 16 publications
0
8
0
Order By: Relevance
“…In a cyber war actions are performed in order to limit the functionality of the critical infrastructure partially or totally. By doing so there are no direct victims but the Defender has limitations in conducting its operations and suffers economical losses or is unable to fully coordinate its kinetical actions (Moga & Boşcoianu, 2015;Moga & Boşcoianu, 2016).…”
Section: Figure No 1: Five Ring Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…In a cyber war actions are performed in order to limit the functionality of the critical infrastructure partially or totally. By doing so there are no direct victims but the Defender has limitations in conducting its operations and suffers economical losses or is unable to fully coordinate its kinetical actions (Moga & Boşcoianu, 2015;Moga & Boşcoianu, 2016).…”
Section: Figure No 1: Five Ring Modelmentioning
confidence: 99%
“…A cyber threat model focused on state actor attacker represents a way of evaluating from the risks perspective the process by which an aggressor (further referred as Challenger) is attacking the national cyber infrastructure of another state (further referred as Defender). The national cyberinfrastructure is a critical component of a country which is used to describe the environment that support advanced data acquisition, data storage, data management, data integration, data mining, data visualization and other computing and information processing services distributed over the Internet beyond the scope of a single institution (Moga & Boşcoianu, 2015;Moga & Boşcoianu, 2016).…”
Section: Introductionmentioning
confidence: 99%
“…Further on we will determine the total number of computers of the national economy infrastructure n. For two state actors (Challenger and Defender), each NUMS fleet component will use software instruments to determine the opponent's computers supporting the national economic infrastructure. This will be done following the steps [1,2]:…”
Section: Theoretical Aspectsmentioning
confidence: 99%
“…Identifying the DNS servers IP addresses can be done by the NUMS fleet components, using the Kali Linux instruments, like the script (16) of the function ServiceEnumeration(). Identifying the IP address intervals of the machines supporting the national economic network can be done using the function of the script (17) DeterminingNetworkRange(), with the help of the software tool DMitry of Kali Linux [1,2]. The next step is to use the NUMS fleet components in order to identify, using the IdentifyingActiveMachines() function built on Kali Linux, the active machines supporting the economic infrastructure of the enemy (Script (18) -in the following).…”
Section: Theoretical Aspectsmentioning
confidence: 99%
See 1 more Smart Citation