Blog
About

159
views
0
recommends
+1 Recommend
1 collections
    8
    shares
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      CPS Security Assessment using Automatically Generated Attack Trees

      1 , 1 , 1 , 1

      5th International Symposium for ICS & SCADA Cyber Security Research 2018 (ICS-CSR 2018)

      ICS & SCADA Cyber Security Research

      29 - 30 August 2018

      Attack Trees, Cyber-Physical Systems, Security Assessment

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Over the last decades, cyber-physical systems have evolved from isolated to complex interconnected systems that are remotely accessible. This made them easier to attack, especially since they often contain legacy components with known vulnerabilities. This paper presents a methodology to assess the security of a cyber-physical system. It automatically generates attack trees based on the system architecture. The generated attack trees are processed to provide both technical and non-technical feedback. The assessor can define different attacker models to asses the security of the system with respect to different types of attackers. The methodology is validated by providing tool support and applying it to an example ICS.

          Related collections

          Most cited references 28

          • Record: found
          • Abstract: not found
          • Article: not found

          Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees

            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            Vulnerability Assessment of Cybersecurity for SCADA Systems Using Attack Trees

              Bookmark
              • Record: found
              • Abstract: not found
              • Book Chapter: not found

              Attack Trees

                Bookmark

                Author and article information

                Contributors
                Conference
                August 2018
                August 2018
                : 1-10
                Affiliations
                [1 ]KU Leuven, imec-DistriNet, Dept of Computer Science, Belgium
                Article
                10.14236/ewic/ICS2018.1
                © Depamelaere et al. Published by BCS Learning and Development Ltd. Proceedings of ICS & SCADA 2018

                This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

                5th International Symposium for ICS & SCADA Cyber Security Research 2018
                ICS-CSR 2018
                5
                University of Hamburg, Germany
                29 - 30 August 2018
                Electronic Workshops in Computing (eWiC)
                ICS & SCADA Cyber Security Research
                Product
                Product Information: 1477-9358BCS Learning & Development
                Self URI (journal page): https://ewic.bcs.org/
                Categories
                Electronic Workshops in Computing

                Comments

                Comment on this article