A review: Towards practical attack taxonomy for industrial control systems

Supervisory Control and Data Acquisition (SCADA) system is the underlying control system of most national critical infrastructures such as power, energy, water, transportation and telecommunication. In order to understand the potential threats to these infrastructures and the mechanisms to protect them, different types of cyber-attacks applicable to these infrastructures need to be identified. Therefore, there is a significant need to have a comprehensive understanding of various types of cyber-attacks and its classification associated with both Opera-tion Technology (OT) and Information Technology (IT). This paper presents a comprehensive review of existing cyberattack taxonomies available in the literature and evaluates these taxonomies based on defined criteria.

[1]  Seyyed MohsenHashemi,et al.  Taxonomy of the Security Aspects of Cloud Computing Systems - A Survey , 2012 .

[2]  Gianluca Stringhini,et al.  Targeted Attacks against Industrial Control Systems: Is the Power Industry Prepared? , 2014, SEGS@CCS.

[3]  Mathias Ekstedt,et al.  Issues of cyber security in SCADA-systems - On the importance of awareness , 2009 .

[4]  Ray Hunt,et al.  A taxonomy of network and computer attacks , 2005, Comput. Secur..

[5]  Dale C. Rowe,et al.  A survey SCADA of and critical infrastructure incidents , 2012, RIIT '12.

[6]  Wei Gao,et al.  Industrial Control System Cyber Attacks , 2013, ICS-CSR.

[7]  William B Miller Classifying and Cataloging Cyber-Security Incidents Within Cyber-Physical Systems , 2014 .

[8]  G. Dondossola,et al.  Cyber risk assessment of power control systems — A metrics weighed by attack experiments , 2011, 2011 IEEE Power and Energy Society General Meeting.

[9]  Xiaohui Liang,et al.  Securing smart grid: cyber attacks, countermeasures, and challenges , 2012, IEEE Communications Magazine.

[10]  Yuan Xue,et al.  Taxonomy for description of cross-domain attacks on CPS , 2013, HiCoNS '13.

[11]  Thomas A. Longstaff,et al.  A common language for computer security incidents , 1998 .

[12]  Sujeet Shenoi,et al.  A Taxonomy of Attacks on the DNP3 Protocol , 2009, Critical Infrastructure Protection.

[13]  Maria Kjaerland,et al.  A taxonomy and comparison of computer security incidents from the commercial and government sectors , 2006, Comput. Secur..

[14]  Todd R. Andel,et al.  Trust Management and Security in the Future Communication-Based "Smart" Electric Power Grid , 2011, 2011 44th Hawaii International Conference on System Sciences.

[15]  D. L. Lough,et al.  A taxonomy of computer attacks with applications to wireless networks , 2001 .

[16]  Wei Jiang,et al.  DMAT : A New Network and Computer Attack Classification , 2013 .

[17]  S. Shankar Sastry,et al.  A Taxonomy of Cyber Attacks on SCADA Systems , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.

[18]  Jugal K. Kalita,et al.  Network attacks: Taxonomy, tools and systems , 2014, J. Netw. Comput. Appl..

[19]  Louise Leenen,et al.  A Computer Network Attack Taxonomy and Ontology , 2012, Int. J. Cyber Warf. Terror..

[20]  Himanshu Khurana,et al.  Towards A Taxonomy Of Attacks Against Energy Control Systems , 2008, Critical Infrastructure Protection.

[21]  Stamatis Karnouskos,et al.  Stuxnet worm impact on industrial cyber-physical system security , 2011, IECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society.

[22]  Qishi Wu,et al.  AVOIDIT: A Cyber Attack Taxonomy , 2009 .

[23]  D M Faissol,et al.  Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches , 2009 .