Attribution of Cyber Attacks on Industrial Control Systems
Journal Title: EAI Endorsed Transactions on Industrial Networks and Intelligent Systems - Year 2016, Vol 3, Issue 7
Abstract
In order to deter or prosecute for cyber attacks on industrial control systems it is necessary to assign attribution to the attacker and define the type of attack so that international law enforcement agencies or national governments can decide on appropriate recourse. In this paper we identify the current state of the art of attribution in industrial control systems. We highlight the critical differences between attribution in enterprise networks and attribution in industrial networks. In doing so we provide a roadmap for future research.
Authors and Affiliations
Allan Cook, Andrew Nicholson, Helge Janicke, Leandros Maglaras, Richard Smith
A2Ba: Adaptive Background Modelling for Visual Aerial Surveillance Conditions
Background modelling algorithms are widely used to define a part of an image that most time remains stationary in a video. In surveillance tasks, this model helps to recognize those outlier objects in an area under monit...
The study of the control law for carriage positioning of rodless pneumatic actuator with fuzzy regulator
The objective of this paper is to present the methods of development and study of control law of rodless pneumatic actuator with fuzzy regulator in order to improve the accuracy of the pneumatic drive carriage positionin...
A networkless data exchange and control mechanism for virtual testbed devices
Virtualization has become a key component of network testbeds. However, transmitting data or commands to the test nodes is still either a complicated task or makes use of the nodes' network interfaces, which may interfer...
A Research on Mobile Cloud Computing and Future Trends
With an exploding growth of the mobile applications and emerging of cloud computing, mobile cloud computing (MCC) has become a potential technology for mobile services. MCC is the combination of cloud computing, mobile c...
Light-weight Key Management Scheme for Active RFID Applications
Due to low-cost and its practical solution, the integration of RFID tag to the sensor node called smart RFID has become prominent solution in various fields including industrial applications. Nevertheless, the constraine...