RULE-BASED APPROACH USING THREATGET FOR AUTOMATICALLY GENERATING ATTACK PATHS IN INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS

Research output: Chapter in Book or Conference ProceedingsConference Proceedings with Oral Presentationpeer-review

Abstract

The rapid development and integration of Internet-based technologies in recent years have become essential for fully automating industrial control systems and enhancing decision-making, precision, and efficiency in managing complex and large-scale production systems. However, due to these remote connections, any vulnerable cybersecurity point could expose the entire system to cyberattacks. Therefore, it is essential and highly needed in such complex systems to identify any possible threats that could be triggered within the system. Additionally, building all possible paths based on the identified threats will be essential to highlight all attack paths that could pave the way for attackers to reach malicious goals. This paper introduces a novel, rule-based approach to determine and build any possible attack paths for critical assets in complex systems such as automated industrial environments. This approach is part of ThreatGet, which deeply investigates all attack steps, emphasizing the violated security prop
Original languageEnglish
Title of host publicationIDIMT-2024 Changes to ICT, Management, and Business Processes through AI
Subtitle of host publication32nd Interdisciplinary Information Management Talks
EditorsPetr Doucek, Michael Sonntag, Lea Nedomova
ChapterAutonomous Vehicles
Pages195-202
Number of pages8
Volume53
DOIs
Publication statusPublished - Sept 2024
EventInterdisciplinary Information Management Talks - Czech Republic, Hradec Králové, Czech Republic
Duration: 4 Sept 20246 Sept 2024
https://idimt.org/

Conference

ConferenceInterdisciplinary Information Management Talks
Abbreviated titleIDIMT2024
Country/TerritoryCzech Republic
CityHradec Králové
Period4/09/246/09/24
Internet address

Research Field

  • Dependable Systems Engineering

Keywords

  • cybersecurity
  • attack paths
  • industrial automation and control systems

Fingerprint

Dive into the research topics of 'RULE-BASED APPROACH USING THREATGET FOR AUTOMATICALLY GENERATING ATTACK PATHS IN INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS'. Together they form a unique fingerprint.

Cite this