首页> 外文学位 >Modeling cyber attacks on control protocols -- The Waterloo Campaign to critical infrastructure assets.
【24h】

Modeling cyber attacks on control protocols -- The Waterloo Campaign to critical infrastructure assets.

机译:对控制协议上的网络攻击进行建模-滑铁卢运动针对关键基础设施资产的攻击。

获取原文
获取原文并翻译 | 示例

摘要

The electric power grid, oil and gas pipelines, railways and other critical infrastructures are viable military targets. Attacks on these systems disrupt communications, hinder logistical support, create confusion, and achieve psychological effects. The majority of systems that comprise critical infrastructures rely on control protocols to command, direct and monitor operations via cyberspace. For the first time in history, non-kinetic means can achieve direct kinetic effects that can result in the loss of human life. As such, formal analysis consistent with traditional munitions (e.g., artillery and bombs) is necessary if attack capabilities for military operations are to be realized.;This research presents a model for expressing attacks on control protocols that involve the exchange of messages. Attacks are modeled using the notion of an adversary who can block and/or fabricate messages. These two attack mechanisms cover a variety of scenarios ranging from control failures in the Waterloo Campaign to cyber attacks on oil pipelines. The model helps provide a comprehensive understanding of control system failures and attacks, which supports the development of strategies for attack as well as defense. Applications of the model include the identification of intelligence requirements, the articulation of possible outcomes of operations and the evaluation of the feasibility of attacks. The work provides a foundation for formalizing the use of cyberspace weaponry that is designed to create kinetic effects.
机译:电网,石油和天然气管道,铁路和其他关键基础设施是可行的军事目标。对这些系统的攻击破坏了通信,阻碍了后勤支持,造成混乱,并产生了心理影响。构成关键基础架构的大多数系统都依赖控制协议来通过网络空间命令,指挥和监视操作。非动力学手段有史以来第一次可以实现直接的动力学效应,从而可能导致生命损失。因此,要想实现军事行动的攻击能力,就必须进行与传统弹药(例如火炮和炸弹)相符的形式化分析。;本研究提出了一种模型,用于表达对涉及信息交换的控制协议的攻击。使用可以阻止和/或捏造消息的对手的概念来模拟攻击。这两种攻击机制涵盖了各种情况,从滑铁卢运动的控制失败到对输油管道的网络攻击。该模型有助于全面了解控制系统的故障和攻击,从而支持制定攻击和防御策略。该模型的应用包括识别情报需求,明确行动的可能结果以及评估攻击的可行性。这项工作为正式使用旨在产生动力学效应的网络空间武器提供了基础。

著录项

  • 作者

    Butts, Jonathan.;

  • 作者单位

    The University of Tulsa.;

  • 授予单位 The University of Tulsa.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2010
  • 页码 86 p.
  • 总页数 86
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

  • 入库时间 2022-08-17 11:37:28

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号