HOPE EKE h.eke@rgu.ac.uk
Completed Research Student
HOPE EKE h.eke@rgu.ac.uk
Completed Research Student
Andrei Petrovski
Dr Hatem Ahriz h.ahriz@rgu.ac.uk
Principal Lecturer
M. Omar Al-Kadri
Masoud Abbaszadeh
Editor
Ali Zemouche
Editor
An advanced persistent threatAdvanced persistent threat, (APTAPT), is an attack that uses multiple attack behavior to penetrate a system, achieve specifically targeted and highly valuable goals within a system. This type of attack has presented an increasing concern for cyber-security and business continuity. The resource availability, integrity, and confidentiality of the operational cyber-physical systems' (CPS) state and control are highly impacted by the safety and security measures adopted. In this study, we propose a framework based on deep APT steps analysis and correlation, of APTs approach abbreviated as ``APT-DASACAPT-DASAC'', for securing industrial control systems (ICSs) against APTs. This approach takes into consideration the distributed and multi-level nature of ICS architecture and reflects on multi-step APT attack lifecycle. We validated the framework with three case studies: (i) network transactions between a remote terminal unit (RTU)Remote Terminal Unit (RTU) and a master control unit (MTU)Master Control Unit (MTU) within a supervisory control and data acquisition (SCADASCADA) gas pipeline control system, (ii) a case study of command and response injection attacks, and (iii) a scenario based on network traffic containing hybrid of the real modern normal and the contemporary synthesized attack activities of the network traffic. Based on the achieved result, we show that the proposed approach achieves a significant attack detection capability and demonstrates that attack detection techniques that performed very well in one application domain may not yield the same result in another. Hence, robustness and resilience of operational CPS state or any system and performance are determined by the security measures in place, which is specific to the application system and domain.
EKE, H.N., PETROVSKI, A., AHRIZ, H. and AL-KADRI, M.O. 2022. Framework for detecting APTs based on steps analysis and correlation. In Abbaszadeh, M. and Zemouche, A. (eds.) Security and resilience in cyber-physical systems: detection, estimation and control. Cham: Springer [online], chapter 6, pages 119-147. Available from: https://doi.org/10.1007/978-3-030-97166-3_6
Online Publication Date | Aug 9, 2022 |
---|---|
Publication Date | Dec 31, 2022 |
Deposit Date | Aug 30, 2022 |
Publicly Available Date | Aug 10, 2024 |
Publisher | Springer |
Pages | 119-147 |
Book Title | Security and resilience in cyber-physical systems: detection, estimation and control |
Chapter Number | Chapter 6 |
ISBN | 9783030971656 |
DOI | https://doi.org/10.1007/978-3-030-97166-3_6 |
Keywords | Advanced persistent threat (APT); Multiple attack behavior; Cyber-security; Cyber-physical systems (CPS); Safety; Security |
Public URL | https://rgu-repository.worktribe.com/output/1741169 |
Contract Date | Aug 9, 2022 |
EKE 2022 Framework for detecting (AAM)
(1.3 Mb)
PDF
The use of machine learning algorithms for detecting advanced persistent threats.
(2019)
Presentation / Conference Contribution
Detection of false command and response injection attacks for cyber physical systems security and resilience.
(2020)
Presentation / Conference Contribution
Advanced persistent threats detection based on deep learning approach.
(2023)
Presentation / Conference Contribution
About OpenAIR@RGU
Administrator e-mail: publications@rgu.ac.uk
This application uses the following open-source libraries:
Apache License Version 2.0 (http://www.apache.org/licenses/)
Apache License Version 2.0 (http://www.apache.org/licenses/)
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search