Threat-based Security Controls to Protect Industrial Control Systems
- URL: http://arxiv.org/abs/2501.13268v1
- Date: Wed, 22 Jan 2025 23:15:14 GMT
- Title: Threat-based Security Controls to Protect Industrial Control Systems
- Authors: Maryam Karimi, Haritha Srinivasan,
- Abstract summary: This paper analyzes the reported threats to Industrial Control Systems (ICS)/Operational Technology (OT) and identifies common tactics, techniques, and procedures (TTP) used by threat actors.
The paper then uses the MITRE ATT&CK framework to map the common TTPs and provide an understanding of the security controls needed to defend against the reported ICS threats.
- Score: 0.4450536872346658
- License:
- Abstract: This paper analyzes the reported threats to Industrial Control Systems (ICS)/Operational Technology (OT) and identifies common tactics, techniques, and procedures (TTP) used by threat actors. The paper then uses the MITRE ATT&CK framework to map the common TTPs and provide an understanding of the security controls needed to defend against the reported ICS threats. The paper also includes a review of ICS testbeds and ideas for future research using the identified controls.
Related papers
- MITRE ATT&CK Applications in Cybersecurity and The Way Forward [18.339713576170396]
The MITRE ATT&CK framework is a widely adopted tool for enhancing cybersecurity, supporting threat intelligence, incident response, attack modeling, and vulnerability prioritization.
This paper synthesizes research on its application across these domains by analyzing 417 peer-reviewed publications.
We identify commonly used adversarial tactics, techniques, and procedures (TTPs) and examine the integration of natural language processing (NLP) and machine learning (ML) with ATT&CK to improve threat detection and response.
arXiv Detail & Related papers (2025-02-15T15:01:04Z) - Towards Provable Security in Industrial Control Systems Via Dynamic Protocol Attestation [0.0]
Cyber attackers can infiltrate industrial control systems (ICSs) and execute malicious actions.
These attacks have resulted in dramatic consequences such as physical damage, economic loss, and environmental catastrophes.
This paper introduces a methodology that restricts actions using protocols.
arXiv Detail & Related papers (2024-12-19T02:28:35Z) - Securing Legacy Communication Networks via Authenticated Cyclic Redundancy Integrity Check [98.34702864029796]
We propose Authenticated Cyclic Redundancy Integrity Check (ACRIC)
ACRIC preserves backward compatibility without requiring additional hardware and is protocol agnostic.
We show that ACRIC offers robust security with minimal transmission overhead ( 1 ms)
arXiv Detail & Related papers (2024-11-21T18:26:05Z) - Assessing Effectiveness of Cyber Essentials Technical Controls [14.373036416154397]
We reconstruct 45 breaches mapped to MiTRE ATT&CK using an Incident Fault Tree approach.
Our method reveals the intersections where the placement of controls could have protected organisations.
We identify appropriate Cyber Essential controls and/or Additional Controls for these vulnerable intersections.
arXiv Detail & Related papers (2024-06-21T14:52:36Z) - ICS-Sniper: A Targeted Blackhole Attack on Encrypted ICS Traffic [7.188557101906752]
We show that an Internet adversary in the path of an ICS's communication can cause damage to the ICS without infiltrating it.
We present ICS-Sniper, a targeted blackhole attack that analyzes the packet metadata to identify the packets carrying critical ICS commands or data, and drops the critical packets to disrupt the ICS's operations.
arXiv Detail & Related papers (2023-12-11T06:02:56Z) - Vulnerability Assessment of Industrial Control System with an Improved
CVSS [3.9596068699962323]
This study proposes a method to assess the risk of cyberattacks on ICS with an improved Common Vulnerability Scoring System (CVSS)
Results show the physical system levels of ICS have the highest severity once cyberattacked.
arXiv Detail & Related papers (2023-06-14T16:48:06Z) - ThreatKG: An AI-Powered System for Automated Open-Source Cyber Threat Intelligence Gathering and Management [65.0114141380651]
ThreatKG is an automated system for OSCTI gathering and management.
It efficiently collects a large number of OSCTI reports from multiple sources.
It uses specialized AI-based techniques to extract high-quality knowledge about various threat entities.
arXiv Detail & Related papers (2022-12-20T16:13:59Z) - Towards Automated Classification of Attackers' TTPs by combining NLP
with ML Techniques [77.34726150561087]
We evaluate and compare different Natural Language Processing (NLP) and machine learning techniques used for security information extraction in research.
Based on our investigations we propose a data processing pipeline that automatically classifies unstructured text according to attackers' tactics and techniques.
arXiv Detail & Related papers (2022-07-18T09:59:21Z) - A System for Automated Open-Source Threat Intelligence Gathering and
Management [53.65687495231605]
SecurityKG is a system for automated OSCTI gathering and management.
It uses a combination of AI and NLP techniques to extract high-fidelity knowledge about threat behaviors.
arXiv Detail & Related papers (2021-01-19T18:31:35Z) - A System for Efficiently Hunting for Cyber Threats in Computer Systems
Using Threat Intelligence [78.23170229258162]
We build ThreatRaptor, a system that facilitates cyber threat hunting in computer systems using OSCTI.
ThreatRaptor provides (1) an unsupervised, light-weight, and accurate NLP pipeline that extracts structured threat behaviors from unstructured OSCTI text, (2) a concise and expressive domain-specific query language, TBQL, to hunt for malicious system activities, and (3) a query synthesis mechanism that automatically synthesizes a TBQL query from the extracted threat behaviors.
arXiv Detail & Related papers (2021-01-17T19:44:09Z) - Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence [94.94833077653998]
ThreatRaptor is a system that facilitates threat hunting in computer systems using open-source Cyber Threat Intelligence (OSCTI)
It extracts structured threat behaviors from unstructured OSCTI text and uses a concise and expressive domain-specific query language, TBQL, to hunt for malicious system activities.
Evaluations on a broad set of attack cases demonstrate the accuracy and efficiency of ThreatRaptor in practical threat hunting.
arXiv Detail & Related papers (2020-10-26T14:54:01Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.