|Title||Cyber Stealth Attacks in Critical Information Infrastructures|
|Publication Type||Journal Article|
|Year of Publication||2016|
|Authors||L. Cazorla, C. Alcaraz, and J. Lopez|
|Journal||IEEE Systems Journal|
|Keywords||Control systems, Countermeasures, Critical Infrastructures, Detection and Protection, Stealth Attacks|
Current Critical Infrastructures (CIs) are complex interconnected industrial systems that, in recent years, have incorporated information and communications technologies such as connection to the Internet and commercial off-the-shelf components. This makes them easier to operate and maintain, but exposes them to the threats and attacks that inundate conventional networks and systems. This paper contains a comprehensive study on the main stealth attacks that threaten CIs, with a special focus on Critical Information Infrastructures (CIIs). This type of attack is characterized by an adversary who is able to finely tune his actions to avoid detection while pursuing his objectives. To provide a complete analysis of the scope and potential dangers of stealth attacks we determine and analyze their stages and range, and we design a taxonomy to illustrate the threats to CIs, offering an overview of the applicable countermeasures against these attacks. From our analysis we understand that these types of attacks, due to the interdependent nature of CIs, pose a grave danger to critical systems where the threats can easily cascade down to the interconnected systems.
Cyber Stealth Attacks in Critical Information Infrastructures