Modeling the Stuxnet attack with BDMP: Towards more formal risk assessments
Autor: | Marc Bouissou, Siwar Kriaa, Ludovic Pietre-Cambacedes |
---|---|
Přispěvatelé: | Ecole Centrale Paris, EDF (EDF) |
Jazyk: | angličtina |
Rok vydání: | 2012 |
Předmět: |
0209 industrial biotechnology
Computer science Markov process 0102 computer and information sciences 02 engineering and technology Stuxnet computer.software_genre Computer security 01 natural sciences modelling symbols.namesake [INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] 020901 industrial engineering & automation Server [INFO.INFO-SY]Computer Science [cs]/Systems and Control [cs.SY] Boolean function Risk management BDMP Stuxnet attack business.industry Cyber-physical system [INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation 010201 computation theory & mathematics symbols Malware business Risk assessment computer |
Zdroj: | Risk and Security of Internet and Systems (CRiSIS), 2012 7th International Conference on Risk and Security of Internet and Systems (CRiSIS), 2012 7th International Conference on, Oct 2012, Cork, Ireland. ⟨10.1109/CRISIS.2012.6378942⟩ CRiSIS |
DOI: | 10.1109/CRISIS.2012.6378942⟩ |
Popis: | International audience; Attack modeling has recently been adopted by security analysts as a useful tool in risk assessment of cyber-physical systems. We propose in this paper to model the Stuxnet attack with BDMP (Boolean logic Driven Markov Processes) formalism and to show the advantages of such modeling. After a description of the architecture targeted by Stuxnet, we explain the steps of the attack and model them formally with a BDMP. Based on estimated values of the success probabilities and rates of the elementary attack steps, we give a quantification of the main possible sequences leading to the physical destruction of the targeted industrial facility. This example completes a series of papers on BDMP applied to security by modeling a real case study. It highlights the advantages of BDMP compared to attack trees often used in security assessment. |
Databáze: | OpenAIRE |
Externí odkaz: |