Visible to the public Biblio

Filters: Keyword is attacker profile  [Clear All Filters]
2022-01-25
Jha, Ashish, Novikova, Evgeniya S., Tokarev, Dmitry, Fedorchenko, Elena V..  2021.  Feature Selection for Attacker Attribution in Industrial Automation amp; Control Systems. 2021 IV International Conference on Control in Technical Systems (CTS). :220–223.
Modern Industrial Automation & Control Systems (IACS) are essential part of the critical infrastructures and services. They are used in health, power, water, and transportation systems, and the impact of cyberattacks on IACS could be severe, resulting, for example, in damage to the environment, public or employee safety or health. Thus, building IACS safe and secure against cyberattacks is extremely important. The attacker model is one of the key elements in risk assessment and other security related information system management tasks. The aim of the study is to specify the attacker's profile based on the analysis of network and system events. The paper presents an approach to the selection of attacker's profile attributes from raw network and system events of the Linux OS. To evaluate the approach the experiments were performed on data collected within the Global CPTC 2019 competition.