Consiglio Nazionale delle Ricerche

Tipo di prodottoArticolo in rivista
TitoloDetection of attacks based on known vulnerabilities in industrial networked systems
Anno di pubblicazione2017
  • Elettronico
  • Cartaceo
Autore/iM. Cheminod, L. Durante, L. Seno, A. Valenzano
Affiliazioni autoriCNR-IEIIT, Istituto di Elettronica e di Ingegneria dell'Informazione e delle Telecomunicazioni, Torino, Italy
Autori CNR e affiliazioni
  • inglese
AbstractVulnerabilities in software and hardware components can be exploited by attackers to cause damages through the cyberspace. Nowadays, this problem also affects a large number of industrial networked systems (INS) and experts are well aware that suitable prevention/detection techniques and countermeasures have to be developed, taking into account INS characteristics and peculiarities. The exposure of a large and complex system to attacks carried out by exploiting well-selected sequences of vulnerabilities can be hard to evaluate, but this is a fundamental step to prevent potential menaces in both the system design and operation phases. This paper deals with an innovative technique, which is able to compute all attack patterns leveraging known vulnerabilities present in an industrial system. The proposed approach is based on the extension of a twofold model, which was successfully developed for verifying the implementation of access control policies in INS. Our solution enables the development of an automated software analyser that can help with the design and maintenance of INS when their security is considered.
Lingua abstractinglese
Altro abstract-
Lingua altro abstract-
Pagine da153
Pagine a165
Pagine totali13
RivistaJournal of Information Security and Applications
Editore: Elsevier
Lingua: inglese
ISSN: 2214-2126
Titolo chiave: Journal of Information Security and Applications
Numero volume della rivista34
Fascicolo della rivista3
Verificato da refereeSì: Internazionale
Stato della pubblicazionePublished version
Indicizzazione (in banche dati controllate)-
Parole chiaveIndustrial distributed systems; Software vulnerabilities; Attack paths; Automated analysis
Link (URL, URI)
Titolo parallelo-
Data di accettazione-
Note/Altre informazioni-
Strutture CNR
  • IEIIT — Istituto di elettronica e di ingegneria dell'informazione e delle telecomunicazioni
Moduli/Attività/Sottoprogetti CNR
  • ICT.P07.004.001 : Reti e Protocolli per l'Automazione ed il Controllo di Processo
Progetti Europei-