2021
DOI: 10.1007/978-3-030-86982-3_16
|View full text |Cite
|
Sign up to set email alerts
|

A Semantic-Based Approach for Assessing the Impact of Cyber-Physical Attacks: A Healthcare Infrastructure Use Case

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…This can be particularly useful if information about a threat actor is extracted from multiple sources and then subsequently fused and represented as a single knowledge graph. 36 https://lod-cloud.net 37 Common Attack Pattern Enumeration and Classification, https://capec.mitre.org 38 Malware Attribute Enumeration and Characterization, https://maecproject.github.io 39 Common Weakness Enumeration, https://cwe.mitre.org 40 Common Vulnerabilities and Exposures, https://cve.mitre.org 41 Common Vulnerability Scoring System, https://www.first.org/cvss/ 42 Cyber Observable eXpression, https://cyboxproject.github.io 43 Common Platform Enumeration, https://nvd.nist.gov/products/cpe 44 Open Indicators of Compromise, https://github.com/mandiant/OpenIOC_1.1 45…”
Section: Knowledge Graph-based Koses For Cybersecurity Applicationsmentioning
confidence: 99%
See 1 more Smart Citation
“…This can be particularly useful if information about a threat actor is extracted from multiple sources and then subsequently fused and represented as a single knowledge graph. 36 https://lod-cloud.net 37 Common Attack Pattern Enumeration and Classification, https://capec.mitre.org 38 Malware Attribute Enumeration and Characterization, https://maecproject.github.io 39 Common Weakness Enumeration, https://cwe.mitre.org 40 Common Vulnerabilities and Exposures, https://cve.mitre.org 41 Common Vulnerability Scoring System, https://www.first.org/cvss/ 42 Cyber Observable eXpression, https://cyboxproject.github.io 43 Common Platform Enumeration, https://nvd.nist.gov/products/cpe 44 Open Indicators of Compromise, https://github.com/mandiant/OpenIOC_1.1 45…”
Section: Knowledge Graph-based Koses For Cybersecurity Applicationsmentioning
confidence: 99%
“…Based on semantic modeling and a reasoning engine asset categories, relationships and input/output incident types, the impacts of complex cyber-physical attacks against critical infrastructure can be propagated and the mitigation of potential harming effects assisted [45].…”
Section: Automated Reasoning Over Cybersecurity Knowledge Graphsmentioning
confidence: 99%
“…This knowledge on the transformations of incidents is security expertise exclusively held by security experts evolving in the medical field, understanding the consequences of attacks. The following paragraph explains how this knowledge has been exploited to build the rules repository (initial model is to be consulted in [15]).…”
Section: Impact Propagation Approach a Propagation Mechanismsmentioning
confidence: 99%