2017
DOI: 10.1007/978-3-319-71368-7_11
|View full text |Cite
|
Sign up to set email alerts
|

Effective Defence Against Zero-Day Exploits Using Bayesian Networks

Abstract: Abstract. Industrial Control Systems (ICS) play a crucial role in controlling industrial processes. Unlike conventional IT systems or networks, cyber attacks against ICS can cause destructive physical damage. Zero-day exploits (i.e. unknown exploits) have demonstrated their essential contributions to causing such damage by Stuxnet. In this work, we investigate the possibility of improving the tolerance of a system against zero-day attacks by defending against known weaknesses of the system. We first propose a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
2
2
2

Relationship

2
4

Authors

Journals

citations
Cited by 8 publications
(12 citation statements)
references
References 14 publications
0
12
0
Order By: Relevance
“…On the validity issue of CVE/NVD, Johnson et al conducted the assessment of several well-known vulnerability databases and concluded that NVD was actually the most trustworthy database [20]; we used NVD in this paper. Some existing work [15] [16] [21] studied malware propagation based on attack graphs to assess the risk of malware along with specific attack paths and network topology. Attack graphs have been extensively studied in the community to express the exploitation conditions of vulnerabilities.…”
Section: Related Workmentioning
confidence: 99%
“…On the validity issue of CVE/NVD, Johnson et al conducted the assessment of several well-known vulnerability databases and concluded that NVD was actually the most trustworthy database [20]; we used NVD in this paper. Some existing work [15] [16] [21] studied malware propagation based on attack graphs to assess the risk of malware along with specific attack paths and network topology. Attack graphs have been extensively studied in the community to express the exploitation conditions of vulnerabilities.…”
Section: Related Workmentioning
confidence: 99%
“…detecting anomalous behaviours of programs [24] [25] [26], botnet detection [27] and intrusion detection in Internet of Things [28]. Although conventional defensive measures may be adapted and strategically deployed to protect ICS from cyber attacks [29] [30], there are several difficulties that hinder this tactic. The survey paper [31] provides a taxonomy and metrics for SCADA-specific intrusion detection and prevention systems.…”
Section: Related Workmentioning
confidence: 99%
“…In literature [34], tolerance is defined as a metric to capture the required zero-day attack effort. However, they only consider individual zero-day weakness under different targets and ignore the multiple zero-day exploits.…”
Section: ) Applying Ag To Uvramentioning
confidence: 99%
“…With the consideration of temporal metrics of CVSS, Equation (29) and (30) are changed to (34) and (35). The definition of Bayesian decision network is given after (35).…”
Section: The Nodes In the First Slice Of A 2tbn Do Not Have Any Parammentioning
confidence: 99%
See 1 more Smart Citation