Protecting Water Utility Networks from Advanced Persistent Threats: A Case Study View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2018-07-07

AUTHORS

Antonios Gouglidis , Sandra König , Benjamin Green , Karl Rossegger , David Hutchison

ABSTRACT

The sovereignty and well-being of nations are highly dependent on the continuous and uninterrupted operation of critical infrastructures. Thus, the protection of utilities that provision critical services (e.g., water, electricity, telecommunications) is of vital importance given the severity imposed by any failure of these services. Recent security incidents in the context of critical infrastructures indicate that threats in such environments appear to be increasing both in frequency and intensity. The complexity of typical critical infrastructures is among the factors that make these environments vulnerable to threats. One of the most problematic types of threat is an advanced persistent threat (APT). This usually refers to a sophisticated, targeted, and costly attack that employs multiple attack vectors to gain access to the target system, then to operate in stealth mode when penetration is achieved, and to exfiltrate data or cause failures inside the system. In this chapter, we demonstrate how a set of processes developed in the context of HyRiM’s framework can assist in minimizing the damage caused to a utility organization that is subjected to an APT style of attack. Specifically, the framework is demonstrated using data from a real-world water utility network and an industrial control system (ICS) test-bed, and in which optimal defensive strategies are investigated. More... »

PAGES

313-333

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-319-75268-6_13

DOI

http://dx.doi.org/10.1007/978-3-319-75268-6_13

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1105344159


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information Systems", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "School of Computing and Communications, InfoLab21, Lancaster University, LA1 4WA, Lancaster, UK", 
          "id": "http://www.grid.ac/institutes/grid.9835.7", 
          "name": [
            "School of Computing and Communications, InfoLab21, Lancaster University, LA1 4WA, Lancaster, UK"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Gouglidis", 
        "givenName": "Antonios", 
        "id": "sg:person.011353374772.69", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011353374772.69"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "AIT Austrian Institute of Technology GmbH, Centre for Digital Safety and Security, Giefinggasse 4, 1210, Vienna, Austria", 
          "id": "http://www.grid.ac/institutes/grid.4332.6", 
          "name": [
            "AIT Austrian Institute of Technology GmbH, Centre for Digital Safety and Security, Giefinggasse 4, 1210, Vienna, Austria"
          ], 
          "type": "Organization"
        }, 
        "familyName": "K\u00f6nig", 
        "givenName": "Sandra", 
        "id": "sg:person.07522234405.16", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07522234405.16"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "School of Computing and Communications, InfoLab21, Lancaster University, LA1 4WA, Lancaster, UK", 
          "id": "http://www.grid.ac/institutes/grid.9835.7", 
          "name": [
            "School of Computing and Communications, InfoLab21, Lancaster University, LA1 4WA, Lancaster, UK"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Green", 
        "givenName": "Benjamin", 
        "id": "sg:person.013311511622.89", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013311511622.89"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Linz AG Telekom, Wiener Stra\u00dfe 151, 4021, Linz, Austria", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Linz AG Telekom, Wiener Stra\u00dfe 151, 4021, Linz, Austria"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Rossegger", 
        "givenName": "Karl", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "School of Computing and Communications, InfoLab21, Lancaster University, LA1 4WA, Lancaster, UK", 
          "id": "http://www.grid.ac/institutes/grid.9835.7", 
          "name": [
            "School of Computing and Communications, InfoLab21, Lancaster University, LA1 4WA, Lancaster, UK"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Hutchison", 
        "givenName": "David", 
        "id": "sg:person.012636622347.55", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012636622347.55"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2018-07-07", 
    "datePublishedReg": "2018-07-07", 
    "description": "The sovereignty and well-being of nations are highly dependent on the continuous and uninterrupted operation of critical infrastructures. Thus, the protection of utilities that provision critical services (e.g., water, electricity, telecommunications) is of vital importance given the severity imposed by any failure of these services. Recent security incidents in the context of critical infrastructures indicate that threats in such environments appear to be increasing both in frequency and intensity. The complexity of typical critical infrastructures is among the factors that make these environments vulnerable to threats. One of the most problematic types of threat is an advanced persistent threat (APT). This usually refers to a sophisticated, targeted, and costly attack that employs multiple attack vectors to gain access to the target system, then to operate in stealth mode when penetration is achieved, and to exfiltrate data or cause failures inside the system. In this chapter, we demonstrate how a set of processes developed in the context of HyRiM\u2019s framework can assist in minimizing the damage caused to a utility organization that is subjected to an APT style of attack. Specifically, the framework is demonstrated using data from a real-world water utility network and an industrial control system (ICS) test-bed, and in which optimal defensive strategies are investigated.", 
    "editor": [
      {
        "familyName": "Rass", 
        "givenName": "Stefan", 
        "type": "Person"
      }, 
      {
        "familyName": "Schauer", 
        "givenName": "Stefan", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-319-75268-6_13", 
    "inLanguage": "en", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-319-75267-9", 
        "978-3-319-75268-6"
      ], 
      "name": "Game Theory for Security and Risk Management", 
      "type": "Book"
    }, 
    "keywords": [
      "Advanced Persistent Threats", 
      "industrial control systems", 
      "critical infrastructure", 
      "persistent threat", 
      "recent security incidents", 
      "multiple attack vectors", 
      "water utility network", 
      "utility network", 
      "attack vectors", 
      "security incidents", 
      "optimal defensive strategy", 
      "costly attacks", 
      "critical services", 
      "such environments", 
      "set of processes", 
      "stealth mode", 
      "target system", 
      "infrastructure", 
      "utility organizations", 
      "control system", 
      "network", 
      "uninterrupted operation", 
      "attacks", 
      "framework", 
      "services", 
      "case study", 
      "threat", 
      "environment", 
      "system", 
      "complexity", 
      "vital importance", 
      "defensive strategies", 
      "set", 
      "context", 
      "access", 
      "data", 
      "operation", 
      "vector", 
      "organization", 
      "style", 
      "utility", 
      "process", 
      "strategies", 
      "incidents", 
      "chapter", 
      "protection", 
      "failure", 
      "types", 
      "importance", 
      "mode", 
      "penetration", 
      "study", 
      "factors", 
      "nations", 
      "frequency", 
      "problematic types", 
      "intensity", 
      "damage", 
      "sovereignty", 
      "severity"
    ], 
    "name": "Protecting Water Utility Networks from Advanced Persistent Threats: A Case Study", 
    "pagination": "313-333", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1105344159"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-319-75268-6_13"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-319-75268-6_13", 
      "https://app.dimensions.ai/details/publication/pub.1105344159"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-05-20T07:48", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220519/entities/gbq_results/chapter/chapter_431.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-319-75268-6_13"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-75268-6_13'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-75268-6_13'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-75268-6_13'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-75268-6_13'


 

This table displays all metadata directly associated to this object as RDF triples.

158 TRIPLES      23 PREDICATES      84 URIs      77 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-319-75268-6_13 schema:about anzsrc-for:08
2 anzsrc-for:0806
3 schema:author N3da80808e25c4ccf8075f0ceb400540a
4 schema:datePublished 2018-07-07
5 schema:datePublishedReg 2018-07-07
6 schema:description The sovereignty and well-being of nations are highly dependent on the continuous and uninterrupted operation of critical infrastructures. Thus, the protection of utilities that provision critical services (e.g., water, electricity, telecommunications) is of vital importance given the severity imposed by any failure of these services. Recent security incidents in the context of critical infrastructures indicate that threats in such environments appear to be increasing both in frequency and intensity. The complexity of typical critical infrastructures is among the factors that make these environments vulnerable to threats. One of the most problematic types of threat is an advanced persistent threat (APT). This usually refers to a sophisticated, targeted, and costly attack that employs multiple attack vectors to gain access to the target system, then to operate in stealth mode when penetration is achieved, and to exfiltrate data or cause failures inside the system. In this chapter, we demonstrate how a set of processes developed in the context of HyRiM’s framework can assist in minimizing the damage caused to a utility organization that is subjected to an APT style of attack. Specifically, the framework is demonstrated using data from a real-world water utility network and an industrial control system (ICS) test-bed, and in which optimal defensive strategies are investigated.
7 schema:editor N91b07ef1fe1b477ea6f6030b341962a7
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree false
11 schema:isPartOf N58f898570e7543d0a16d7b2102b53bfa
12 schema:keywords Advanced Persistent Threats
13 access
14 attack vectors
15 attacks
16 case study
17 chapter
18 complexity
19 context
20 control system
21 costly attacks
22 critical infrastructure
23 critical services
24 damage
25 data
26 defensive strategies
27 environment
28 factors
29 failure
30 framework
31 frequency
32 importance
33 incidents
34 industrial control systems
35 infrastructure
36 intensity
37 mode
38 multiple attack vectors
39 nations
40 network
41 operation
42 optimal defensive strategy
43 organization
44 penetration
45 persistent threat
46 problematic types
47 process
48 protection
49 recent security incidents
50 security incidents
51 services
52 set
53 set of processes
54 severity
55 sovereignty
56 stealth mode
57 strategies
58 study
59 style
60 such environments
61 system
62 target system
63 threat
64 types
65 uninterrupted operation
66 utility
67 utility network
68 utility organizations
69 vector
70 vital importance
71 water utility network
72 schema:name Protecting Water Utility Networks from Advanced Persistent Threats: A Case Study
73 schema:pagination 313-333
74 schema:productId N42c20da6a4334ba7962a9f95112ec87b
75 Ne826a26d779c43bbb8aa6d7dc6a131cc
76 schema:publisher N97cdf81d47d8456d8d15d16de5bde5f5
77 schema:sameAs https://app.dimensions.ai/details/publication/pub.1105344159
78 https://doi.org/10.1007/978-3-319-75268-6_13
79 schema:sdDatePublished 2022-05-20T07:48
80 schema:sdLicense https://scigraph.springernature.com/explorer/license/
81 schema:sdPublisher N5a74f44afaa94052b21f35c7e44d7bd3
82 schema:url https://doi.org/10.1007/978-3-319-75268-6_13
83 sgo:license sg:explorer/license/
84 sgo:sdDataset chapters
85 rdf:type schema:Chapter
86 N3da80808e25c4ccf8075f0ceb400540a rdf:first sg:person.011353374772.69
87 rdf:rest Ne6bf9c3af9b449f89e633f82599dfe89
88 N42c20da6a4334ba7962a9f95112ec87b schema:name doi
89 schema:value 10.1007/978-3-319-75268-6_13
90 rdf:type schema:PropertyValue
91 N58f898570e7543d0a16d7b2102b53bfa schema:isbn 978-3-319-75267-9
92 978-3-319-75268-6
93 schema:name Game Theory for Security and Risk Management
94 rdf:type schema:Book
95 N5a74f44afaa94052b21f35c7e44d7bd3 schema:name Springer Nature - SN SciGraph project
96 rdf:type schema:Organization
97 N5fdf258d1ef14911b0caacef613cdefd rdf:first Nf28a6be949ad4583ba36431992460ea2
98 rdf:rest Ncbf1469d62794fd1a3db7f13606283dd
99 N60d096ce135741b8922f577d2866ece7 schema:familyName Rass
100 schema:givenName Stefan
101 rdf:type schema:Person
102 N91b07ef1fe1b477ea6f6030b341962a7 rdf:first N60d096ce135741b8922f577d2866ece7
103 rdf:rest Nf27471a08ba64b77a5a3063e94f7f322
104 N97cdf81d47d8456d8d15d16de5bde5f5 schema:name Springer Nature
105 rdf:type schema:Organisation
106 Nb210c06ff44d41eb9ed996413f152272 schema:familyName Schauer
107 schema:givenName Stefan
108 rdf:type schema:Person
109 Ncbf1469d62794fd1a3db7f13606283dd rdf:first sg:person.012636622347.55
110 rdf:rest rdf:nil
111 Ncfbbb0f518794ba687acca50d02e7545 rdf:first sg:person.013311511622.89
112 rdf:rest N5fdf258d1ef14911b0caacef613cdefd
113 Ne6bf9c3af9b449f89e633f82599dfe89 rdf:first sg:person.07522234405.16
114 rdf:rest Ncfbbb0f518794ba687acca50d02e7545
115 Ne826a26d779c43bbb8aa6d7dc6a131cc schema:name dimensions_id
116 schema:value pub.1105344159
117 rdf:type schema:PropertyValue
118 Nf27471a08ba64b77a5a3063e94f7f322 rdf:first Nb210c06ff44d41eb9ed996413f152272
119 rdf:rest rdf:nil
120 Nf28a6be949ad4583ba36431992460ea2 schema:affiliation grid-institutes:None
121 schema:familyName Rossegger
122 schema:givenName Karl
123 rdf:type schema:Person
124 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
125 schema:name Information and Computing Sciences
126 rdf:type schema:DefinedTerm
127 anzsrc-for:0806 schema:inDefinedTermSet anzsrc-for:
128 schema:name Information Systems
129 rdf:type schema:DefinedTerm
130 sg:person.011353374772.69 schema:affiliation grid-institutes:grid.9835.7
131 schema:familyName Gouglidis
132 schema:givenName Antonios
133 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011353374772.69
134 rdf:type schema:Person
135 sg:person.012636622347.55 schema:affiliation grid-institutes:grid.9835.7
136 schema:familyName Hutchison
137 schema:givenName David
138 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012636622347.55
139 rdf:type schema:Person
140 sg:person.013311511622.89 schema:affiliation grid-institutes:grid.9835.7
141 schema:familyName Green
142 schema:givenName Benjamin
143 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013311511622.89
144 rdf:type schema:Person
145 sg:person.07522234405.16 schema:affiliation grid-institutes:grid.4332.6
146 schema:familyName König
147 schema:givenName Sandra
148 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07522234405.16
149 rdf:type schema:Person
150 grid-institutes:None schema:alternateName Linz AG Telekom, Wiener Straße 151, 4021, Linz, Austria
151 schema:name Linz AG Telekom, Wiener Straße 151, 4021, Linz, Austria
152 rdf:type schema:Organization
153 grid-institutes:grid.4332.6 schema:alternateName AIT Austrian Institute of Technology GmbH, Centre for Digital Safety and Security, Giefinggasse 4, 1210, Vienna, Austria
154 schema:name AIT Austrian Institute of Technology GmbH, Centre for Digital Safety and Security, Giefinggasse 4, 1210, Vienna, Austria
155 rdf:type schema:Organization
156 grid-institutes:grid.9835.7 schema:alternateName School of Computing and Communications, InfoLab21, Lancaster University, LA1 4WA, Lancaster, UK
157 schema:name School of Computing and Communications, InfoLab21, Lancaster University, LA1 4WA, Lancaster, UK
158 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...