2021
DOI: 10.1109/access.2021.3111420
|View full text |Cite
|
Sign up to set email alerts
|

Last Line of Defense: Reliability Through Inducing Cyber Threat Hunting With Deception in SCADA Networks

Abstract: There exists a gap between existing security mechanisms and their ability to detect advancing threats. Antivirus and EDR (End Point Detection and Response) aim to detect and prevent threats; such security mechanisms are reactive. This approach did not prove to be effective in protecting against stealthy attacks. SCADA (Supervisory Control and Data Acquisition) security is crucial for any country. However, SCADA is always an easy target for adversaries due to a lack of security for heterogeneous devices. An att… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(8 citation statements)
references
References 28 publications
0
6
0
Order By: Relevance
“…A decoy plan has been introduced in [183] to assist in mitigating threats against Supervisory Control and Data Acquisition (SCADA). The planned decoy will take unknown threats so that researchers can find the gaps in data [183].Professionals can use SCADA to increase detection abilities more than compared to traditional mechanisms [183]. This tool will help defenders identify malicious attacks in social networks.…”
Section: Social Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…A decoy plan has been introduced in [183] to assist in mitigating threats against Supervisory Control and Data Acquisition (SCADA). The planned decoy will take unknown threats so that researchers can find the gaps in data [183].Professionals can use SCADA to increase detection abilities more than compared to traditional mechanisms [183]. This tool will help defenders identify malicious attacks in social networks.…”
Section: Social Networkmentioning
confidence: 99%
“…Towards other challenges, there is a viable work, [183], that shows last line of defense in reliability through inducing cyber threat hunting with deception in SCADA networks.…”
Section: Other Challengesmentioning
confidence: 99%
“…Recent studies on SCADA system's security have not taken unknown threats into account, which has left a security gap. As a result, taking a proactive approach is generally necessary, like cyber threat hunting 5 . Cyber threat hunting is part of cyber security, which makes user use “new threat intelligence” on the previously obtained information to recognize and categorize potential threats before their launching 1,2 …”
Section: Introductionmentioning
confidence: 99%
“…As a result, taking a proactive approach is generally necessary, like cyber threat hunting. 5 Cyber threat hunting is part of cyber security, which makes user use "new threat intelligence" on the previously obtained information to recognize and categorize potential threats before their launching. 1,2 Cyber security is now utilizing the techniques of artificial intelligence (AI) to defend and mitigate potential cyber threats/attacks.…”
mentioning
confidence: 99%
“…Furthermore, the ATT&CK for ICS matrix can help determine what types of data sources are required to detect threats in ICS environments [9] [10] [11]. Threat hunting is a human-based approach, and it is prone to human errors [12] [13] [14]. Therefore, automation of the threat hunting process can help reduce human errors and increase detection speed.…”
Section: Introductionmentioning
confidence: 99%