Redirigiendo al acceso original de articulo en 21 segundos...
Inicio  /  Information  /  Vol: 13 Par: 10 (2022)  /  Artículo
ARTÍCULO
TITULO

Attack Graph Utilization for Wastewater Treatment Plant

Mariam Ibrahim and Abdallah Al-Wadi    

Resumen

In general, automation involves less human intervention, which leads to dependence on preprogrammed machines and processes that operate continually and carry out numerous tasks. This leads to predictable repeating behavior that can be used to advantage. Due to the incorporation of the Internet of Things into such automated processes, these cyber?physical systems are now vulnerable to cyberattacks, the patterns of which can be difficult to identify and understand. Wastewater treatment plants (WTPs) can be challenging to run, but the treatment process is essential since drinking water and water that can be recycled are extremely important to obtain. The increasing susceptibility of WTPs to cyberattacks brought on by exploitation of their weaknesses poses a further challenge. Understanding system weaknesses and potential exploits is necessary for securing such cyber?physical systems. An attack graph utilization and visualization approach for WTPs is presented in this paper. A formal modeling and encoding of the system were carried out using a structural framework (AADL). The system model was then continuously checked by a model-checker called JKind against security requirements to create attack routes, which were then merged into an attack graph using a tool called GraphViz.

 Artículos similares

       
 
Garima Agrawal, Yuli Deng, Jongchan Park, Huan Liu and Ying-Chih Chen    
Knowledge graphs gained popularity in recent years and have been useful for concept visualization and contextual information retrieval in various applications. However, constructing a knowledge graph by scraping long and complex unstructured texts for a ... ver más
Revista: Information

 
Giuseppe Granato, Alessio Martino, Andrea Baiocchi and Antonello Rizzi    
Network traffic analysis, and specifically anomaly and attack detection, call for sophisticated tools relying on a large number of features. Mathematical modeling is extremely difficult, given the ample variety of traffic patterns and the subtle and vari... ver más
Revista: Applied Sciences

 
S. A. Zhucov     Pág. 28 - 38
The article discusses an invasion model in the form of memory destruction of one type of abstract algorithm executor introduced by Schönhage. Two invasion scenarios are defined (attack without aftereffect and attack with aftereffect), and the macros prop... ver más