2022
DOI: 10.1109/access.2022.3197195
|View full text |Cite
|
Sign up to set email alerts
|

A Formal Model and Verification for HESTIA: An Automated, Adversary-Aware Risk Assessment Process for Cyber Infrastructure

Abstract: Due to the characteristics and connectivity of today's critical infrastructure systems, cyberattacks on these systems are currently difficult to prevent in an efficient and sustainable manner. Prevention and mitigation strategies need accurate identification and evaluation of: system vulnerabilities, potential threats and attacks, and applicable hardening measures. Furthermore, the ability to prioritize hardening measures based on accurate assessments of risk is needed. In addition, the consideration of the av… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 23 publications
0
1
0
Order By: Relevance
“…Critical infrastructure organizations have been experiencing a technological transition for their devices from Industrial Control Systems (ICS) to CPS [1]. The transition is opening previously unavailable or limited networking capabilities to improve operational capabilities and efficiencies for industrial systems and infrastructure such as the power grid [1]. Expanded use of networked communications in turn is increasing the attack vectors for the organizations, especially from outside actors [2].…”
Section: Introductionmentioning
confidence: 99%
“…Critical infrastructure organizations have been experiencing a technological transition for their devices from Industrial Control Systems (ICS) to CPS [1]. The transition is opening previously unavailable or limited networking capabilities to improve operational capabilities and efficiencies for industrial systems and infrastructure such as the power grid [1]. Expanded use of networked communications in turn is increasing the attack vectors for the organizations, especially from outside actors [2].…”
Section: Introductionmentioning
confidence: 99%