2017 Chinese Automation Congress (CAC) 2017
DOI: 10.1109/cac.2017.8243932
|View full text |Cite
|
Sign up to set email alerts
|

An attack tree-based approach for vulnerability assessment of communication-based train control systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 7 publications
0
7
0
Order By: Relevance
“…These risk assessments are generally focused on attacks that could impact safety, as defined in the functional safety standards. 10,11,[15][16][17][18][19][20][21] In rail the most common scenario modelled is a hacker compromising the ICS so as to cause: a loss of safe distance, an over-speed event or collision via disrupting signals. This bias of considering only the most catastrophic hazard and framing cybersecurity controls to make this as difficult as possible, may not do justice to the intelligence of hackers.…”
Section: Cognitive Bias In Threat and Risk Assessmentmentioning
confidence: 99%
See 2 more Smart Citations
“…These risk assessments are generally focused on attacks that could impact safety, as defined in the functional safety standards. 10,11,[15][16][17][18][19][20][21] In rail the most common scenario modelled is a hacker compromising the ICS so as to cause: a loss of safe distance, an over-speed event or collision via disrupting signals. This bias of considering only the most catastrophic hazard and framing cybersecurity controls to make this as difficult as possible, may not do justice to the intelligence of hackers.…”
Section: Cognitive Bias In Threat and Risk Assessmentmentioning
confidence: 99%
“…There may also be complexity in modern rail control systems that makes it very difficult to understand all the components and their interactions under all circumstances. 18,22…”
Section: Cognitive Bias In Threat and Risk Assessmentmentioning
confidence: 99%
See 1 more Smart Citation
“…Yeqi Ru et al [12] proposed an AHP quantitative risk assessment method based on attack tree model and AHP to assess the impact of cyber-attacks on the entire electronic physical system. Dong et al [13] established the CBTC system attack tree model to assess the rail transit control system. The above research results show that the attack tree is an effective mathematical model to judge the potential threats of the ICS system.…”
Section: Introductionmentioning
confidence: 99%
“…This paper synthesized the safety and security features of the urban rail transit train control system, comprehensively considered the security threats and vulnerabilities and the hazard sources of the train control system, and analyzed the relationship between security risks and safety risks. Dong et al [9] used attack tree to evaluate the vulnerability of a CBTC system based on its network topology, redundant structure, and operation principles. Assessments covered the current security states, port auditing, password policies, and communication protocols of systems.…”
Section: Introductionmentioning
confidence: 99%