On the impact of empirical attack models targeting marine transportation

作者: Elias Bou-Harb , Evangelos I. Kaisar , Mark Austin

DOI: 10.1109/MTITS.2017.8005665

关键词:

摘要: It is known that 75% of international freight through maritime transportation. Indeed, as trade increases, ports face the pressure to improve their infrastructure in order maintain operations and respond market demands. Given such high level competition, ought leverage resources efficiently effectively, which has resulted increased automation capabilities adoption Cyber-Physical Systems (CPS). For reasons, container terminal sector increasingly becoming susceptible various types debilitating threats. While a plethora research efforts, from both, control cyber perspectives have been dedicated tackling security CPS sectors, there still exists significant gap, rendered by lack properly comprehending accurately characterizing malicious attackers' capabilities, intents aims, when targeting systems. This largely due real empirical data can be captured, inferred, analyzed within boundaries operational realms. Undoubtedly, goal endeavors capture notions “true maliciousness” context significantly challenging, many factors, including, (1) complete maturity scarcity elaborative technical details related CPS, (2) diversity systems, (3) logistic privacy constraints are often strictly enforced owners operators. To this end, paper presents first step towards inferring tangible maliciousness accomplished innovating mechanisms, namely, investigating passive darknet Internet-scale traffic, instrumenting analyzing millions recent malware samples, deploying tailored, highly-interactive honeypots. Additionally, we analyze effect derived attack, Distributed Denial Service (DDoS) using discrete event simulation vessel passing canal. We postulate envisioned attack models associated impact could effectively exploited successfully provide marine transportation resiliency.

参考文章(36)
Henrik Sandberg, K. H. Johansson, André Teixeira, On Security Indices for State Estimators in Power Networks Preprints of the First Workshop on Secure Control Systems, CPSWEEK 2010,  Stockholm, Sweden. ,(2010)
Michael Bailey, Evan Cooke, Farnam Jahanian, Jose Nazario, David Watson, None, The Internet Motion Sensor - A Distributed Blackhole Monitoring System. network and distributed system security symposium. ,(2005)
Martin Roesch, Snort - Lightweight Intrusion Detection for Networks usenix large installation systems administration conference. pp. 229- 238 ,(1999)
BooJoong Kang, Peter Maynard, Kieran McLaughlin, Sakir Sezer, Filip Andrén, Christian Seitl, Friederich Kupzog, Thomas Strasser, Investigating cyber-physical attacks against IEC 61850 photovoltaic inverter installations 2015 IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA). pp. 1- 8 ,(2015) , 10.1109/ETFA.2015.7301457
André Teixeira, Iman Shames, Henrik Sandberg, Karl Henrik Johansson, A secure control framework for resource-limited adversaries Automatica. ,vol. 51, pp. 135- 148 ,(2015) , 10.1016/J.AUTOMATICA.2014.10.067
Christian Rossow, Amplification Hell: Revisiting Network Protocols for DDoS Abuse network and distributed system security symposium. ,(2014) , 10.14722/NDSS.2014.23233
Elias Bou-Harb, Mourad Debbabi, Chadi Assi, A Statistical Approach for Fingerprinting Probing Activities availability, reliability and security. pp. 21- 30 ,(2013) , 10.1109/ARES.2013.9
Fabio Pasqualetti, Florian Dorfler, Francesco Bullo, Attack Detection and Identification in Cyber-Physical Systems IEEE Transactions on Automatic Control. ,vol. 58, pp. 2715- 2729 ,(2013) , 10.1109/TAC.2013.2266831
Elias Bou-Harb, Nour-Eddine Lakhdari, Hamad Binsalleeh, Mourad Debbabi, None, Multidimensional investigation of source port 0 probing Digital Investigation. ,vol. 11, pp. S114- S123 ,(2014) , 10.1016/J.DIIN.2014.05.012
Marco Caselli, Emmanuele Zambon, Frank Kargl, Sequence-aware Intrusion Detection in Industrial Control Systems Proceedings of the 1st ACM Workshop on Cyber-Physical System Security. pp. 13- 24 ,(2015) , 10.1145/2732198.2732200