Show simple item record

dc.contributor.authorGao, Yuan
dc.contributor.authorFischer, Robert
dc.contributor.authorSeibt, Simon
dc.contributor.authorParekh, Mithil
dc.contributor.authorLi, Jianghai
dc.contributor.editorEibl, Maximilian
dc.contributor.editorGaedke, Martin
dc.date.accessioned2017-08-28T23:49:38Z
dc.date.available2017-08-28T23:49:38Z
dc.date.issued2017
dc.identifier.isbn978-3-88579-669-5
dc.identifier.issn1617-5468
dc.description.abstractThe increasing cyber threats require quick action from security experts to protect their industrial automation control system (IACS). For fulfilling the requirement, we propose to divided the classic cyber security analysis scope into three separated, yet interconnected domains: Threat, System and Security. Thus different groups of security professionals can work independently, and are not required to have the knowledge about the full scope. In addition, we proposed an asset-centric system architecture model to enable the modeling and simulation of attacks according to publicly known threats and vulnerabilities. Analysis based on the generated attack/defense trees can assist to manage and continuously monitor the deployed security controls. The proposed approach with tool supports reduces the workload of security experts as well as the incidents response team (IRT) towards an adaptive defense manner.en
dc.language.isoen
dc.publisherGesellschaft für Informatik, Bonn
dc.relation.ispartofINFORMATIK 2017
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-275
dc.subjectthreat model
dc.subjectasset management
dc.subjectattack/defense tree
dc.subjectadaptive defense
dc.titleIntegrated Security Frameworken
mci.reference.pages961-972
mci.conference.sessiontitle2nd GI/ACM Industry4.0 Security Standardisation Workshop on Industrial Automation and Control Systems (IACS)
mci.conference.locationChemnitz
mci.conference.date25.-29. September 2017
dc.identifier.doi10.18420/in2017_99
dc.title.subtitleTowards a Holistic Approach for Analysis, Simulation and Management of System Security Featuresen


Files in this item

Thumbnail

Show simple item record