Vulnerability Assessment of Industrial Control System with an Improved
CVSS
- URL: http://arxiv.org/abs/2306.08631v1
- Date: Wed, 14 Jun 2023 16:48:06 GMT
- Title: Vulnerability Assessment of Industrial Control System with an Improved
CVSS
- Authors: He Wen
- Abstract summary: This study proposes a method to assess the risk of cyberattacks on ICS with an improved Common Vulnerability Scoring System (CVSS)
Results show the physical system levels of ICS have the highest severity once cyberattacked.
- Score: 3.9596068699962323
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Cyberattacks on industrial control systems (ICS) have been drawing attention
in academia. However, this has not raised adequate concerns among some
industrial practitioners. Therefore, it is necessary to identify the vulnerable
locations and components in the ICS and investigate the attack scenarios and
techniques. This study proposes a method to assess the risk of cyberattacks on
ICS with an improved Common Vulnerability Scoring System (CVSS) and applies it
to a continuous stirred tank reactor (CSTR) model. The results show the
physical system levels of ICS have the highest severity once cyberattacked, and
controllers, workstations, and human-machine interface are the crucial
components in the cyberattack and defense.
Related papers
- Enhancing Network Security Management in Water Systems using FM-based Attack Attribution [43.48086726793515]
We propose a novel model-agnostic Factorization Machines (FM)-based approach that capitalizes on water system sensor-actuator interactions to provide granular explanations and attributions for cyber attacks.
In multi-feature cyber attack scenarios involving intricate sensor-actuator interactions, our FM-based attack attribution method effectively ranks attack root causes, achieving approximately 20% average improvement over SHAP and LEMNA.
arXiv Detail & Related papers (2025-03-03T06:52:00Z) - Cyber security of OT networks: A tutorial and overview [1.4361933642658902]
This manuscript explores the cybersecurity challenges of Operational Technology (OT) networks.
OT systems increasingly integrate with Information Technology (IT) systems due to Industry 4.0 initiatives.
The study examines key components of OT systems, such as SCADA (Supervisory Control and Data Acquisition), PLCs (Programmable Logic Controllers), and RTUs (Remote Terminal Units)
arXiv Detail & Related papers (2025-02-19T17:23:42Z) - Evidence-Based Threat Modeling for ICS [0.0]
ICS environments are vital to the operation of critical infrastructure such as power grids, water treatment facilities, and manufacturing plants.
We propose a novel evidence-based methodology to systematically identify threats based on existing CVE entries of components.
We have implemented our methodology as a ready-to-use tool and have applied it to a typical SCADA system to demonstrate that our methodology is practical and applicable in real-world settings.
arXiv Detail & Related papers (2024-11-29T15:05:00Z) - Exploring the Adversarial Vulnerabilities of Vision-Language-Action Models in Robotics [70.93622520400385]
This paper systematically quantifies the robustness of VLA-based robotic systems.
We introduce an untargeted position-aware attack objective that leverages spatial foundations to destabilize robotic actions.
We also design an adversarial patch generation approach that places a small, colorful patch within the camera's view, effectively executing the attack in both digital and physical environments.
arXiv Detail & Related papers (2024-11-18T01:52:20Z) - Countering Autonomous Cyber Threats [40.00865970939829]
Foundation Models present dual-use concerns broadly and within the cyber domain specifically.
Recent research has shown the potential for these advanced models to inform or independently execute offensive cyberspace operations.
This work evaluates several state-of-the-art FMs on their ability to compromise machines in an isolated network and investigates defensive mechanisms to defeat such AI-powered attacks.
arXiv Detail & Related papers (2024-10-23T22:46:44Z) - EAIRiskBench: Towards Evaluating Physical Risk Awareness for Task Planning of Foundation Model-based Embodied AI Agents [47.69642609574771]
Embodied artificial intelligence (EAI) integrates advanced AI models into physical entities for real-world interaction.
Foundation models as the "brain" of EAI agents for high-level task planning have shown promising results.
However, the deployment of these agents in physical environments presents significant safety challenges.
This study introduces EAIRiskBench, a novel framework for automated physical risk assessment in EAI scenarios.
arXiv Detail & Related papers (2024-08-08T13:19:37Z) - FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids [53.2306792009435]
FaultGuard is the first framework for fault type and zone classification resilient to adversarial attacks.
We propose a low-complexity fault prediction model and an online adversarial training technique to enhance robustness.
Our model outclasses the state-of-the-art for resilient fault prediction benchmarking, with an accuracy of up to 0.958.
arXiv Detail & Related papers (2024-03-26T08:51:23Z) - Adversarial Attacks and Defenses in Fault Detection and Diagnosis: A Comprehensive Benchmark on the Tennessee Eastman Process [39.677420930301736]
Integrating machine learning into Automated Control Systems (ACS) enhances decision-making in industrial process management.
One of the limitations to the widespread adoption of these technologies is the vulnerability of neural networks to adversarial attacks.
This study explores the threats in deploying deep learning models for fault diagnosis in ACS using the Tennessee Eastman Process dataset.
arXiv Detail & Related papers (2024-03-20T10:59:06Z) - Towards Low-Barrier Cybersecurity Research and Education for Industrial
Control Systems [1.2584276673531931]
We develop a framework to automatically launch cyberattacks, collect data, train machine learning models, and evaluate for practical chemical and manufacturing processes.
On our testbed, we validate our proposed intrusion detection model called Minimal Threshold and Window SVM.
Results show that MinTWin SVM minimizes false positives and is responsive to physical process anomalies.
arXiv Detail & Related papers (2023-08-31T14:46:05Z) - A Deep Multi-Modal Cyber-Attack Detection in Industrial Control Systems [1.0312968200748118]
This research utilizes network and sensor modality data from ICS processed with a deep multi-modal cyber-attack detection model for ICS.
Results show that the proposed model can outperform existing single modality models and recent works in the literature.
arXiv Detail & Related papers (2023-04-04T01:27:21Z) - A Framework for Evaluating the Cybersecurity Risk of Real World, Machine
Learning Production Systems [41.470634460215564]
We develop an extension to the MulVAL attack graph generation and analysis framework to incorporate cyberattacks on ML production systems.
Using the proposed extension, security practitioners can apply attack graph analysis methods in environments that include ML components.
arXiv Detail & Related papers (2021-07-05T05:58:11Z) - GRAVITAS: Graphical Reticulated Attack Vectors for Internet-of-Things
Aggregate Security [5.918387680589584]
Internet-of-Things (IoT) and cyber-physical systems (CPSs) may consist of thousands of devices connected in a complex network topology.
We describe a comprehensive risk management system, called GRAVITAS, for IoT/CPS that can identify undiscovered attack vectors.
arXiv Detail & Related papers (2021-05-31T19:35:23Z) - Adversarial defense for automatic speaker verification by cascaded
self-supervised learning models [101.42920161993455]
More and more malicious attackers attempt to launch adversarial attacks at automatic speaker verification (ASV) systems.
We propose a standard and attack-agnostic method based on cascaded self-supervised learning models to purify the adversarial perturbations.
Experimental results demonstrate that the proposed method achieves effective defense performance and can successfully counter adversarial attacks.
arXiv Detail & Related papers (2021-02-14T01:56:43Z) - Poisoning Attacks on Cyber Attack Detectors for Industrial Control
Systems [34.86059492072526]
We are first to demonstrate such poisoning attacks on ICS online neural network detectors.
We propose two distinct attack algorithms, namely, back-gradient based poisoning, and demonstrate their effectiveness on both synthetic and real-world data.
arXiv Detail & Related papers (2020-12-23T14:11:26Z) - Machine Learning in Generation, Detection, and Mitigation of
Cyberattacks in Smart Grid: A Survey [1.3299946892361474]
Smart grid (SG) is a complex cyber-physical system that utilizes modern cyber and physical equipment to run at an optimal operating point.
Cyberattacks are the principal threats confronting the usage and advancement of the state-of-the-art systems.
Machine learning (ML) is being used to exploit and defend the cyberattacks in SG by the attackers and system operators.
arXiv Detail & Related papers (2020-09-01T05:16:51Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.