Filters








5 Hits in 5.9 sec

Attribution of Cyber Attacks on Industrial Control Systems

Allan Cook, Andrew Nicholson, Helge Janicke, Leandros Maglaras, Richard Smith
2016 EAI Endorsed Transactions on Industrial Networks and Intelligent Systems  
In this paper we identify the current state of the art of attribution in industrial control systems.  ...  In order to deter or prosecute for cyber attacks on industrial control systems it is necessary to assign attribution to the attacker and define the type of attack so that international law enforcement  ...  This study also suggests there is merit in research into a methodology that encompasses both technical and non-technical techniques to form a probabilistic model of attribution.  ... 
doi:10.4108/eai.21-4-2016.151158 fatcat:vwx6gddunrcwhhou6gq5odc3wi

An Integrated Cybersecurity Risk Management (I-CSRM) Framework for Critical Infrastructure Protection

Halima Kure
2021
Risk management plays a vital role in tackling cyber threats within the Cyber-Physical System (CPS) for overall system resilience.  ...  Lastly, the thesis employs a case study to validate the proposed i-CSRM framework and i-CSRMT in terms of applicability.  ...  , web applications, and detecting anomalies.  ... 
doi:10.15123/uel.89ww3 fatcat:3w6q73sqy5dl7burfg2wnwli3m

Securing the Edges of IoT Networks: a Scalable SIP DDoS Defense Framework with VNF, SDN, and Blockchain [article]

Aldo Kiki Febro, UH Research Archive
2021
The SDN controller gathers threat intelligence from the switch where the attacks originate and installs them as packet filtering rules on all switches in the organisation.  ...  Three kinds of SIP attacks (scan, brute force, and DDoS) were launched against a VNF running on a virtual switch and each was successfully detected and mitigated.  ...  With that in mind, the rule-based detection method is relatively easier to implement than the anomaly-based method.  ... 
doi:10.18745/th.24127 fatcat:miik23ntg5eypgyvr6jyhzm6c4

Cyber Threat Intelligence Exchange

Florian Menges
2020
Im weiteren Verlauf der Arbeit werden Möglichkeiten zur Integration des Menschen in den Analyseprozess von Sicherheitsvorfällen und damit in die Erzeugung von CTI Informationen untersucht.  ...  On the other hand, legislators in various countries have recognized this potential and translated it into legal reporting requirements.  ...  The research of H.C.Pöhls was carried out in the project SEMIOTICS funded by EUs H2020 grant no. 780315.  ... 
doi:10.5283/epub.43650 fatcat:whc4fu3xcbbrvcaoouoqrgjeqm

Security Analysis of System Behaviour - From "Security by Design" to "Security at Runtime" -

Roland Rieke
2015
An observing system monitors an event stream from the observed system with the aim to detect faults - deviations from the specified behaviour or security compliance violations - at runtime.  ...  Security analysis is growing in complexity with the increase in functionality, connectivity, and dynamics of current electronic business processes.  ...  The work presented in this paper was developed in the context of the project Alliance Digital Product Flow (ADiWa) that is funded by the German Federal Ministry of Education and Research.  ... 
doi:10.17192/z2014.0499 fatcat:nenp5qtb45gfjjwwhqw4d5alfa