Vis enkel innførsel

dc.contributor.authorKavallieratos, Georgios
dc.contributor.authorKatsikas, Sokratis
dc.date.accessioned2021-09-22T08:27:49Z
dc.date.available2021-09-22T08:27:49Z
dc.date.created2020-12-17T14:22:14Z
dc.date.issued2020
dc.identifier.isbn978-3-030-64330-0
dc.identifier.urihttps://hdl.handle.net/11250/2780256
dc.description.abstractThe identification and analysis of potential paths that an adversary may exploit to attack Cyber Physical Systems comprising sub-systems enables the comprehensive understanding of the attacks and the impact that may have to the overall system, thus facilitating the definition of appropriate countermeasures that will satisfy the pertinent security requirements. To this end, several attack modelling techniques can be employed, the attack graph being the most prevalent among them. Unfortunately, the discovery and analysis of all possible attack paths in an attack graph is not possible in systems even of a moderate size. In this work we propose a novel systematic method for discovering and analyzing attack paths in real-world scale interconnected Cyber Physical Systems. The method considers the criticality of each sub-system in discovering paths and the risk to the overall system that each path presents to analyze and prioritize paths. We illustrate the workings of the method by applying to the navigational Cyber Physical Systems of the Cyber-Enabled Ship to identify and analyze highly critical attack paths originating from the Automatic Identification System (AIS) and targeting the Autonomous Navigation System (ANS).en_US
dc.language.isoengen_US
dc.publisherSpringeren_US
dc.relation.ispartofComputer Security: ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14–18, 2020, Revised Selected Papers
dc.titleAttack Path Analysis for Cyber Physical Systemsen_US
dc.typeChapteren_US
dc.description.versionpublishedVersionen_US
dc.rights.holderThis version of the article will not be available due to copyright restrictions by Springeren_US
dc.source.pagenumber19-33en_US
dc.identifier.doihttp://dx.doi.org/10.1007/978-3-030-64330-0_2
dc.identifier.cristin1861124
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel