Abstract
The rapid development and integration of Internet-based technologies in recent years have become essential for fully automating industrial control systems and enhancing decision-making, precision, and efficiency in managing complex and large-scale production systems. However, due to these remote connections, any vulnerable cybersecurity point could expose the entire system to cyberattacks. Therefore, it is essential and highly needed in such complex systems to identify any possible threats that could be triggered within the system. Additionally, building all possible paths based on the identified threats will be essential to highlight all attack paths that could pave the way for attackers to reach malicious goals. This paper introduces a novel, rule-based approach to determine and build any possible attack paths for critical assets in complex systems such as automated industrial environments. This approach is part of ThreatGet, which deeply investigates all attack steps, emphasizing the violated security prop
Original language | English |
---|---|
Title of host publication | IDIMT-2024 Changes to ICT, Management, and Business Processes through AI |
Subtitle of host publication | 32nd Interdisciplinary Information Management Talks |
Editors | Petr Doucek, Michael Sonntag, Lea Nedomova |
Chapter | Autonomous Vehicles |
Pages | 195-202 |
Number of pages | 8 |
Volume | 53 |
DOIs | |
Publication status | Published - Sept 2024 |
Event | Interdisciplinary Information Management Talks - Czech Republic, Hradec Králové, Czech Republic Duration: 4 Sept 2024 → 6 Sept 2024 https://idimt.org/ |
Conference
Conference | Interdisciplinary Information Management Talks |
---|---|
Abbreviated title | IDIMT2024 |
Country/Territory | Czech Republic |
City | Hradec Králové |
Period | 4/09/24 → 6/09/24 |
Internet address |
Research Field
- Dependable Systems Engineering
Keywords
- cybersecurity
- attack paths
- industrial automation and control systems