2015 7th International Conference on Electronics, Computers and Artificial Intelligence (ECAI) 2015
DOI: 10.1109/ecai.2015.7301200
|View full text |Cite
|
Sign up to set email alerts
|

Fuzzy approach on modelling cyber attacks patterns on data transfer in industrial control systems

Abstract: Cybersecurity of industrial control system is a very complex and challenging research topic, due to the integration of these systems in national critical infrastructures. The control systems are now interconnected in industrial networks and frequently to the Internet. In this context they are becoming targets of various cyber attacks conducted by malicious people such as hackers, script kiddies, industrial spies and even foreign armies and intelligence agencies. In this paper the authors propose a way to model… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(12 citation statements)
references
References 3 publications
(4 reference statements)
0
12
0
Order By: Relevance
“…The first group of approaches consists of the techniques based on attack graph analysis [17][18][19][20][21][22][23][24][25][26][27][28], hidden Markov model [29][30][31][32][33][34], and fuzzy logic [35][36][37].…”
Section: The Comparative Analysis Of the Approaches To The Attacker'smentioning
confidence: 99%
See 2 more Smart Citations
“…The first group of approaches consists of the techniques based on attack graph analysis [17][18][19][20][21][22][23][24][25][26][27][28], hidden Markov model [29][30][31][32][33][34], and fuzzy logic [35][36][37].…”
Section: The Comparative Analysis Of the Approaches To The Attacker'smentioning
confidence: 99%
“…The attacker's profile, that is, the score [35], is used then to estimate the attack success rate. The impact of the attack is also a fuzzy function of four linguistic variables: the attacker profile (score), protection level, vulnerabilities, and restore cost.…”
Section: Attacker Behaviour Pattern Discovery Using Fuzzy Inferencementioning
confidence: 99%
See 1 more Smart Citation
“…The application of this model ranges from regular training and testing to supporting military exercises [28]. Furthermore, some methods help to profile cyberattackers based on their knowledge, motivation, and technical resources [29]. Researchers could rely on the success rates of these profiles to accordingly model their testbeds.…”
Section: Virtual Scada (Vscada) Testbedsmentioning
confidence: 99%
“…The main vulnerabilities associated to control systems are presented in [1]. Some attacker profiles are described in [5].…”
Section: Control Systems Security Basicsmentioning
confidence: 99%