CNA tactics and techniques: A structure proposal

4Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.

Abstract

Destructive and control operations are today a major threat for cyber physical systems. These operations, known as Computer Network Attack (CNA), and usually linked to state-sponsored actors, are much less analyzed than Computer Network Exploitation activities (CNE), those related to intelligence gathering. While in CNE operations the main tactics and techniques are defined and well structured, in CNA there is a lack of such consensuated approaches. This situation hinders the modeling of threat actors, which prevents an accurate definition of control to identify and to neutralize malicious activities. In this paper, we propose the first global approach for CNA operations that can be used to map real-world activities. The proposal significantly reduces the amount of effort need to identify, analyze, and neutralize advanced threat actors targeting cyber physical systems. It follows a logical structure that can be easy to expand and adapt.

Cite

CITATION STYLE

APA

Villalón-Huerta, A., Ripoll-Ripoll, I., & Marco-Gisbert, H. (2021). CNA tactics and techniques: A structure proposal. Journal of Sensor and Actuator Networks, 10(1). https://doi.org/10.3390/jsan10010014

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free