Cyber Stealth Attacks in Critical Information Infrastructures

TitleCyber Stealth Attacks in Critical Information Infrastructures
Publication TypeJournal Article
Year of Publication2016
AuthorsL. Cazorla, C. Alcaraz, and J. Lopez
JournalIEEE Systems Journal
Issue99
Pagination1-15
Date Published03/2016
PublisherIEEE
ISSN Number1932-8184
KeywordsControl systems, Countermeasures, Critical Infrastructures, Detection and Protection, Stealth Attacks
Abstract

Current Critical Infrastructures (CIs) are complex interconnected industrial systems that, in recent years, have incorporated information and communications technologies such as connection to the Internet and commercial off-the-shelf components. This makes them easier to operate and maintain, but exposes them to the threats and attacks that inundate conventional networks and systems. This paper contains a comprehensive study on the main stealth attacks that threaten CIs, with a special focus on Critical Information Infrastructures (CIIs). This type of attack is characterized by an adversary who is able to finely tune his actions to avoid detection while pursuing his objectives. To provide a complete analysis of the scope and potential dangers of stealth attacks we determine and analyze their stages and range, and we design a taxonomy to illustrate the threats to CIs, offering an overview of the applicable countermeasures against these attacks. From our analysis we understand that these types of attacks, due to the interdependent nature of CIs, pose a grave danger to critical systems where the threats can easily cascade down to the interconnected systems. 

DOI10.1109/JSYST.2015.2487684
Citation Keycazorla2016cyber
Paper File: 
https://www.nics.uma.es/sites/default/files/papers/cazorla2016cyber.pdf

Supported by