From Tactics to Techniques: A Systematic Attack Modeling for Advanced Persistent Threats in Industrial Control Systems

Yunhe Yang, Mu Zhang
{"title":"From Tactics to Techniques: A Systematic Attack Modeling for Advanced Persistent Threats in Industrial Control Systems","authors":"Yunhe Yang, Mu Zhang","doi":"10.1109/EuroSPW59978.2023.00042","DOIUrl":null,"url":null,"abstract":"Advanced Persistent Threats (APTs) targeting Industrial Control Systems (ICS) have emerged as a significant challenge in the cybersecurity landscape. These sophisticated attacks can lead to catastrophic consequences on critical infrastructure and services. This paper presents an innovative attack model for ICS-APT attacks designed to provide adequate defense against real-world threats. By examining and analyzing real-world APT attacks against ICS, we identify common and unique characteristics across different attacks, bridging the gap between high-level features and low-level behaviors. We further demonstrate the effectiveness of our proposed model by simulating a false data injection attack on a realistic ICS testbed, utilizing the identified Tactics, Techniques, and Procedures (TTPs) and stages of an APT attack. This simulation enables us to validate the model’s accuracy and identify potential challenges in mitigating such complex threats. Our proposed model leverages this systematic understanding of attacker behavior, allowing for accurate characterization of attack patterns. It empowers analysts with the tools and insights needed to counteract and mitigate the risk posed by ICS-APT attacks, contributing to the protection of critical infrastructure and enhancing cybersecurity resilience in the face of evolving threats.","PeriodicalId":220415,"journal":{"name":"2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EuroSPW59978.2023.00042","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Advanced Persistent Threats (APTs) targeting Industrial Control Systems (ICS) have emerged as a significant challenge in the cybersecurity landscape. These sophisticated attacks can lead to catastrophic consequences on critical infrastructure and services. This paper presents an innovative attack model for ICS-APT attacks designed to provide adequate defense against real-world threats. By examining and analyzing real-world APT attacks against ICS, we identify common and unique characteristics across different attacks, bridging the gap between high-level features and low-level behaviors. We further demonstrate the effectiveness of our proposed model by simulating a false data injection attack on a realistic ICS testbed, utilizing the identified Tactics, Techniques, and Procedures (TTPs) and stages of an APT attack. This simulation enables us to validate the model’s accuracy and identify potential challenges in mitigating such complex threats. Our proposed model leverages this systematic understanding of attacker behavior, allowing for accurate characterization of attack patterns. It empowers analysts with the tools and insights needed to counteract and mitigate the risk posed by ICS-APT attacks, contributing to the protection of critical infrastructure and enhancing cybersecurity resilience in the face of evolving threats.
从战术到技术:工业控制系统中高级持续性威胁的系统攻击建模
针对工业控制系统(ICS)的高级持续性威胁(apt)已经成为网络安全领域的一个重大挑战。这些复杂的攻击可能会对关键的基础设施和服务造成灾难性的后果。本文提出了一种针对ICS-APT攻击的创新攻击模型,旨在为现实世界的威胁提供充分的防御。通过检查和分析现实世界中针对ICS的APT攻击,我们确定了不同攻击的共同和独特特征,弥合了高级特征和低级行为之间的差距。我们通过在现实的ICS测试平台上模拟虚假数据注入攻击,利用确定的战术,技术和程序(TTPs)以及APT攻击的阶段,进一步证明了我们提出的模型的有效性。该模拟使我们能够验证模型的准确性,并确定减轻此类复杂威胁的潜在挑战。我们提出的模型利用了对攻击者行为的系统理解,允许对攻击模式进行准确的表征。它为分析人员提供了抵御和减轻ICS-APT攻击带来的风险所需的工具和见解,有助于保护关键基础设施,并在面对不断变化的威胁时增强网络安全弹性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信