Attribution of Cyber Attacks on Industrial Control Systems

Abstract

In order to deter or prosecute for cyber attacks on industrial control systems it is necessary to assign attribution to the attacker and define the type of attack so that international law enforcement agencies or national governments can decide on appropriate recourse. In this paper we identify the current state of the art of attribution in industrial control systems. We highlight the critical differences between attribution in enterprise networks and attribution in industrial networks. In doing so we provide a roadmap for future research.

Authors and Affiliations

Allan Cook, Andrew Nicholson, Helge Janicke, Leandros Maglaras, Richard Smith

Keywords

Related Articles

Performance evaluation of composite Web services

Composite Web service architectures are demanding much guarantee on the Quality of Service (QoS) in order to meet user requirements. Performance evaluation of these architectures has become therefore a very challenging i...

Applying algorithm finding shortest path in the multiple- weighted graphs to find maximal flow in extended linear multicomodity multicost network

The shortest path finding algorithm is used in many problems on graphs and networks. This article will introduce the algorithm to find the shortest path between two vertices on the extended graph. Next, the algorithm fin...

Linking Data According to Their Degree of Representativeness (DoR)

This contribution addresses the problem of extracting some representative data from complex datasets and connecting them in a directed graph. First we define a degree of representativeness (DoR) inspired of the Borda vot...

VIRTUAL TABLE-SIMULATOR FOR MONITORING DISTRIBUTED OBJECTS

There is presented a determination to the concept of "a distributed subobject for monitoring". There are revealed the common features of such objects. There are analyzed the virtual and hardware cloud computing technolog...

Controlling Sensitivity of Gaussian Bayes Predictions based on Eigenvalue Thresholding

Gaussian Bayes classifiers are widely used in machine learning for various purposes. Its special characteristic has provided a great capacity for estimating the likelihood and reliability of individual classification dec...

Download PDF file
  • EP ID EP46044
  • DOI http://dx.doi.org/10.4108/eai.21-4-2016.151158
  • Views 316
  • Downloads 0

How To Cite

Allan Cook, Andrew Nicholson, Helge Janicke, Leandros Maglaras, Richard Smith (2016). Attribution of Cyber Attacks on Industrial Control Systems. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 3(7), -. https://europub.co.uk/articles/-A-46044