An Attack Simulation and Evidence Chains Generation Model for Critical Information Infrastructures

4Citations
Citations of this article
30Readers
Mendeley users who have this article in their library.

Abstract

Recently, the rapid growth of technology and the increased teleworking due to the COVID‐19 outbreak have motivated cyber attackers to advance their skills and develop new sophisticated methods, e.g., Advanced Persistent Threat (APT) attacks, to leverage their cybercriminal capabilities. They compromise interconnected Critical Information Infrastructures (CIIs) (e.g., Supervisory Control and Data Acquisition (SCADA) systems) by exploiting a series of vulnerabilities and launching multiple attacks. In this context, industry players need to increase their knowledge on the security of the CIs they operate and further explore the technical aspects of cyber‐attacks, e.g., attack’s course, vulnerabilities exploitability, attacker’s behavior, and location. Several research papers address vulnerability chain discovery techniques. Nevertheless, most of them do not focus on developing attack graphs based on incident analysis. This paper proposes an attack simulation and evidence chains generation model which computes all possible attack paths associated with specific, confirmed security events. The model considers various attack patterns through simulation experiments to estimate how an attacker has moved inside an organization to perform an intrusion. It analyzes artifacts, e.g., Indicators of Compomise (IoCs), and any other incident‐related information from various sources, e.g., log files, which are evidence of cyber‐attacks on a system or network.

Cite

CITATION STYLE

APA

Kalogeraki, E. M., Papastergiou, S., & Panayiotopoulos, T. (2022). An Attack Simulation and Evidence Chains Generation Model for Critical Information Infrastructures. Electronics (Switzerland), 11(3). https://doi.org/10.3390/electronics11030404

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free