{"title":"From Tactics to Techniques: A Systematic Attack Modeling for Advanced Persistent Threats in Industrial Control Systems","authors":"Yunhe Yang, Mu Zhang","doi":"10.1109/EuroSPW59978.2023.00042","DOIUrl":null,"url":null,"abstract":"Advanced Persistent Threats (APTs) targeting Industrial Control Systems (ICS) have emerged as a significant challenge in the cybersecurity landscape. These sophisticated attacks can lead to catastrophic consequences on critical infrastructure and services. This paper presents an innovative attack model for ICS-APT attacks designed to provide adequate defense against real-world threats. By examining and analyzing real-world APT attacks against ICS, we identify common and unique characteristics across different attacks, bridging the gap between high-level features and low-level behaviors. We further demonstrate the effectiveness of our proposed model by simulating a false data injection attack on a realistic ICS testbed, utilizing the identified Tactics, Techniques, and Procedures (TTPs) and stages of an APT attack. This simulation enables us to validate the model’s accuracy and identify potential challenges in mitigating such complex threats. Our proposed model leverages this systematic understanding of attacker behavior, allowing for accurate characterization of attack patterns. It empowers analysts with the tools and insights needed to counteract and mitigate the risk posed by ICS-APT attacks, contributing to the protection of critical infrastructure and enhancing cybersecurity resilience in the face of evolving threats.","PeriodicalId":220415,"journal":{"name":"2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EuroSPW59978.2023.00042","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Advanced Persistent Threats (APTs) targeting Industrial Control Systems (ICS) have emerged as a significant challenge in the cybersecurity landscape. These sophisticated attacks can lead to catastrophic consequences on critical infrastructure and services. This paper presents an innovative attack model for ICS-APT attacks designed to provide adequate defense against real-world threats. By examining and analyzing real-world APT attacks against ICS, we identify common and unique characteristics across different attacks, bridging the gap between high-level features and low-level behaviors. We further demonstrate the effectiveness of our proposed model by simulating a false data injection attack on a realistic ICS testbed, utilizing the identified Tactics, Techniques, and Procedures (TTPs) and stages of an APT attack. This simulation enables us to validate the model’s accuracy and identify potential challenges in mitigating such complex threats. Our proposed model leverages this systematic understanding of attacker behavior, allowing for accurate characterization of attack patterns. It empowers analysts with the tools and insights needed to counteract and mitigate the risk posed by ICS-APT attacks, contributing to the protection of critical infrastructure and enhancing cybersecurity resilience in the face of evolving threats.