Simulating Attack Plans Against ICT Infrastructures
نویسندگان
چکیده
Goal-oriented, rational threat agents attack a complex ICT infrastructure by composing elementary attacks against distinct components into an attack chain or attack plan. To compute statistics on the success probabilities of these plans, we have designed and implemented Haruspex, a tool that implements a Monte Carlo method by simulating the agent plans. A proper set of Haruspex experiments returns a set of data to compute statistics on the agent plans and their success probabilities even before deploying a system. In this way, we can assess with high confidence the robustness of a system and the risk it poses by considering scenarios where it is attacked by a set of agent. To fully automate the assessment, we have developed GVScan, a tool that maps the output of a vulnerability scanning into the inputs of Haruspex. This paper describes both Haruspex and GVScan and their adoption to assess the control plant of a power generation system.
منابع مشابه
Security Assessment of Modern Data Aggregation Platforms in the Internet of Things
With the popularity of the Internet of Things on the rise, sensor networks have become essential parts of traditional Information and Communication Technology (ICT) infrastructures in a wide variety of applications. However, their increasing complexity, inter-connectivity, and pervasive implementation, exposes these infrastructures to a large variety of security threats. As a result, practical ...
متن کاملModeling and Managing Risk in Billing Infrastructures
This paper discusses risk modeling and risk management in information and communications technology (ICT) systems for which the attack impact distribution is heavy tailed (e.g., power law distribution) and the average risk is unbounded. Systems with these properties include billing infrastructures used to charge customers for services they access. Attacks against billing infrastructures can be ...
متن کاملSimulative Evaluation of Security Attacks in Networked Critical Infrastructures
ICT is becoming a fundamental and pervasive component of critical infrastructures (CIs). Despite the advantages that it brings about, ICT also exposes CIs to a number of security attacks that can severely compromise human safety, service availability and business interests. Although it is vital to ensure an adequate level of security, it is practically infeasible to counteract all possible atta...
متن کاملSimulations on Resilience and Malware Containment in Smart Grid Communication Architectures
Smart grids utilize Information & Communication Technology (ICT) to increase efficiency and reliability, by managing dynamics in power grids. However, ICT opens additional vulnerabilities affecting critical infrastructures, by increasing their attack surface. According to Igure et al. [1] legacy control systems experience an increasing number of attacks, as they were developed for good performa...
متن کاملGenerative mechanisms for innovation in information infrastructures
This paper investigates how innovation of ICT based services takes place within existing infrastructures, including the whole network of technology, vendors and customers. Our research question is, how can an information infrastructure provide generative mechanisms for innovation of ICT based services? Building on a critical realist approach, our empirical evidence was a case study within an in...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013