首页> 外文期刊>Progress in Nuclear Energy >A data analytical approach for assessing the efficacy of Operational Technology active defenses against insider threats
【24h】

A data analytical approach for assessing the efficacy of Operational Technology active defenses against insider threats

机译:评估运营技术积极防御对内幕威胁的效果的数据分析方法

获取原文
获取原文并翻译 | 示例
       

摘要

In recent years, the need for Operational Technology (OT) defenses has been recognized, serving as an additional line of defense when Information Technology (IT) defenses are bypassed. This is no longer considered an uncommon possibility when dealing with advanced persistent threat (APT) actors expected to be state-sponsored and receiving insider assistance. In these extreme adversarial situations, OT defenses aim to provide another layer of defense for the system, introduced directly at the physical process level, as described by the sensors data, the system model, and control actions. Just like IT defenses, two schools of thought, i.e., passive and active defenses, have emerged to address this challenge. In active defenses, representing the focus of this paper, known signatures, synthesized based on the system's unique characteristics, are inserted into the system. In contradistinction, passive methods rely solely on observing system behavior in search of patterns of normal behavior with deviations thereof representing abnormal behavior. In their most sophisticated implementations, both passive and active defenses rely on the use of data analytics to identify the patterns and synthesize the observed and/or inserted signatures. Past research has shown that passive defenses may be bypassed by APT actors relying on data analytics and their intimate knowledge of the system to evade detection by respecting the patterns identified by the defenders. Thus, this manuscript explores the use of active defenses under the assumption that the attacker has privileged access to the system, including access to the system's model and sensors data. Specifically, this manuscript assesses the ability of active defenses to remain invisible to the attackers, and discusses the associated challenges that must be addressed to ensure their resiliency against APT actors.
机译:近年来,已确认对操作技术(OT)防御的需求,作为绕过信息技术(IT)防御时的额外级别。在处理高级持久威胁(APT)行动者的情况下,这不再被认为是罕见的可能性,预计将被国家赞助和接受内幕援助。在这些极端的对抗情况下,OT防御旨在为系统提供另一种防御层,直接在物理过程级别引入,如传感器数据,系统模型和控制操作所描述的。就像它的防御一样,两所思想学派,即被动和积极的防御,已经出现了解决这一挑战。在主动防御中,代表本文的重点,基于系统的独特特性合成的已知签名将插入系统中。在对比中,被动方法仅依赖于观察系统行为,以寻找具有表示异常行为的偏差的正常行为模式。在最复杂的实现中,无源和主动防御依赖于使用数据分析来识别模式并综合观察和/或插入的签名。过去的研究表明,通过依赖于数据分析的APT演员可以绕过被动防御及其对系统的亲密知识来避免防守者所识别的模式来逃避检测。因此,此稿件在假设攻击者具有对系统的特权访问的情况下探讨了主动防御,包括访问系统模型和传感器数据。具体而言,该手稿评估了积极抗辩对攻击者保持看不见的能力,并讨论必须解决的相关挑战,以确保其弹性对APT演员的弹性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号