Abstract
The rapid development and integration of Internet-based technologies in recent years have become essential for fully automating industrial control systems and enhancing decision-making, precision, and efficiency in managing complex and large-scale production systems. However, due to these remote connections, any vulnerable cybersecurity point could expose the entire system to cyberattacks. Therefore, it is essential and highly needed in such complex systems to identify any possible threats that could be triggered within the system. Additionally, building all possible paths based on the identified threats will be essential to highlight all attack paths that could pave the way for attackers to reach malicious goals. This paper introduces a novel, rule-based approach to determine and build any possible attack paths for critical assets in complex systems such as automated industrial environments. This approach is part of ThreatGet, which deeply investigates all attack steps, emphasizing the violated security prop
| Originalsprache | Englisch |
|---|---|
| Titel | IDIMT-2024 Changes to ICT, Management, and Business Processes through AI |
| Untertitel | 32nd Interdisciplinary Information Management Talks |
| Redakteure/-innen | Petr Doucek, Michael Sonntag, Lea Nedomova |
| Kapitel | Autonomous Vehicles |
| Seiten | 195-202 |
| Seitenumfang | 8 |
| Band | 53 |
| DOIs | |
| Publikationsstatus | Veröffentlicht - Sept. 2024 |
| Veranstaltung | Interdisciplinary Information Management Talks - Czech Republic, Hradec Králové, Tschechische Republik Dauer: 4 Sept. 2024 → 6 Sept. 2024 https://idimt.org/ |
Konferenz
| Konferenz | Interdisciplinary Information Management Talks |
|---|---|
| Kurztitel | IDIMT2024 |
| Land/Gebiet | Tschechische Republik |
| Stadt | Hradec Králové |
| Zeitraum | 4/09/24 → 6/09/24 |
| Internetadresse |
Research Field
- Dependable Systems Engineering