RULE-BASED APPROACH USING THREATGET FOR AUTOMATICALLY GENERATING ATTACK PATHS IN INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS

Publikation: Beitrag in Buch oder TagungsbandVortrag mit Beitrag in TagungsbandBegutachtung

Abstract

The rapid development and integration of Internet-based technologies in recent years have become essential for fully automating industrial control systems and enhancing decision-making, precision, and efficiency in managing complex and large-scale production systems. However, due to these remote connections, any vulnerable cybersecurity point could expose the entire system to cyberattacks. Therefore, it is essential and highly needed in such complex systems to identify any possible threats that could be triggered within the system. Additionally, building all possible paths based on the identified threats will be essential to highlight all attack paths that could pave the way for attackers to reach malicious goals. This paper introduces a novel, rule-based approach to determine and build any possible attack paths for critical assets in complex systems such as automated industrial environments. This approach is part of ThreatGet, which deeply investigates all attack steps, emphasizing the violated security prop
OriginalspracheEnglisch
TitelIDIMT-2024 Changes to ICT, Management, and Business Processes through AI
Untertitel32nd Interdisciplinary Information Management Talks
Redakteure/-innenPetr Doucek, Michael Sonntag, Lea Nedomova
KapitelAutonomous Vehicles
Seiten195-202
Seitenumfang8
Band53
DOIs
PublikationsstatusVeröffentlicht - Sept. 2024
VeranstaltungInterdisciplinary Information Management Talks - Czech Republic, Hradec Králové, Tschechische Republik
Dauer: 4 Sept. 20246 Sept. 2024
https://idimt.org/

Konferenz

KonferenzInterdisciplinary Information Management Talks
KurztitelIDIMT2024
Land/GebietTschechische Republik
StadtHradec Králové
Zeitraum4/09/246/09/24
Internetadresse

Research Field

  • Dependable Systems Engineering

Fingerprint

Untersuchen Sie die Forschungsthemen von „RULE-BASED APPROACH USING THREATGET FOR AUTOMATICALLY GENERATING ATTACK PATHS IN INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS“. Zusammen bilden sie einen einzigartigen Fingerprint.

Diese Publikation zitieren