2018
DOI: 10.1109/jsyst.2015.2487684
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Stealth Attacks in Critical Information Infrastructures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
1
1

Relationship

3
5

Authors

Journals

citations
Cited by 47 publications
(24 citation statements)
references
References 28 publications
0
24
0
Order By: Relevance
“…Since ICSs opened their systems to adapt the new ICTs, multiple and potential attacks have not stopped appearing [7,8,9]. A simple way to address these of attacks is by means of covert channels, through which attackers might exfiltrate data and/or remotely execute commands in order to falsify or modify critical states or variables.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Since ICSs opened their systems to adapt the new ICTs, multiple and potential attacks have not stopped appearing [7,8,9]. A simple way to address these of attacks is by means of covert channels, through which attackers might exfiltrate data and/or remotely execute commands in order to falsify or modify critical states or variables.…”
Section: Discussionmentioning
confidence: 99%
“…Many of these challenges generally come from typical vulnerabilities of the cyber domains (e.g., accessible critical ports and services, irregular access control, lacks of isolation measures or uncontrolled network sections, lacks of auditing and accountability, irregularity in the governance processes, incompatibilities) [4], and they need to be properly managed 24/7 through security controls as specified by standards (e.g., the NISTIR 8183 [5]) or specific cybersecurity frameworks (e.g., [6]). Clear examples (Stuxnet, TRISIS, Flame, Night Dragon, BlackEnergy or Ex-Petr, Duqu [7,8,9]) have already shown the weak nature of the current ICSs to detect furtiveness attacks [9]. This paper envisages how OT networks may be compromised through specific IT techniques based on covert channels.…”
Section: Introductionmentioning
confidence: 96%
“…Dependability and survivability: The possibility of managing risks from a proactive and reactive perspective, allows the system to detect anomalies and response accordingly, ensuring availability of resources at all time and reliability of their services. Many of the anomalies come from the malfunctions or unsuitable configurations of systems or networks, or deficiencies in the coexistence of multiple systems [8], which may consequently bring about numerous security problems [15,50]. Moreover, this manner of offering automatic fault detection also adds a significant reduction of maintenance costs and benefits the future Industry 4.0 services allocated in the cloud, such as predictive maintenance and the optimization of operational services and equipment.…”
Section: Suitability Of the Architecture For Industry 40 Scenariosmentioning
confidence: 99%
“…Several studies have been performed for assessing the security or mitigating the effects of an attack in a IoT-based CPS. In particular, secure control theory is used to estimate the impact of cyber threats on the physical plant [9]. Given the complexity of the problem, the methods proposed in literature are usually dedicated to counteract attacks that can be roughly classified in two groups: DoS and deception-based attacks.…”
Section: Related Workmentioning
confidence: 99%