File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: An Incident Response Model for Industrial Control System Forensics Based on Historical Events

TitleAn Incident Response Model for Industrial Control System Forensics Based on Historical Events
Authors
KeywordsIndustrial control systems
incident response
forensics
Issue Date2019
PublisherSpringer.
Citation
International Conference on Critical Infrastructure Protection (ICCIP) 2019, Arlington, VA, USA, 11-12 March 2019. In Staggs, J & Shenoi, S (eds.). Critical Infrastructure Protection XIII: 13th IFIP WG 11.10 International Conference, ICCIP 2019: Revised Selected Papers, p. 331-328 How to Cite?
AbstractCyber attacks on industrial control systems are increasing. Malware such as Stuxnet, Havex and BlackEnergy have demonstrated that industrial control systems are attractive targets for attackers. However, industrial control systems are not limited to malware attacks. Other attacks include SQL injection, distributed denial-of-service, spear phishing, social engineering and man-in-the-middle attacks. Additionally, methods such as unauthorized access, brute forcing and insider attacks have also targeted industrial control systems. Accidents such as fires and explosions at industrial plants also provide valuable insights into the targets of attacks, failure methods and potential impacts. This chapter presents an incident response model for industrial control system forensics based on historical events. In particular, representative industrial control system incidents – cyber attacks and accidents – that have occurred over the past 25 years are categorized and analyzed.The resulting incident response model is useful for forensic planning and investigations. The model enables incident response teams and forensic investigators to decide on the expertise, techniques and tools to be applied to ensure sound evidence acquisition, analysis and reporting.
Persistent Identifierhttp://hdl.handle.net/10722/289178
ISBN
ISI Accession Number ID
Series/Report no.IFIP Advances in Information and Communication Technology (IFIPAICT) ; v. 570

 

DC FieldValueLanguage
dc.contributor.authorYau, KK-
dc.contributor.authorChow, KP-
dc.contributor.authorYiu, SM-
dc.date.accessioned2020-10-22T08:08:56Z-
dc.date.available2020-10-22T08:08:56Z-
dc.date.issued2019-
dc.identifier.citationInternational Conference on Critical Infrastructure Protection (ICCIP) 2019, Arlington, VA, USA, 11-12 March 2019. In Staggs, J & Shenoi, S (eds.). Critical Infrastructure Protection XIII: 13th IFIP WG 11.10 International Conference, ICCIP 2019: Revised Selected Papers, p. 331-328-
dc.identifier.isbn978-3-030-34646-1-
dc.identifier.urihttp://hdl.handle.net/10722/289178-
dc.description.abstractCyber attacks on industrial control systems are increasing. Malware such as Stuxnet, Havex and BlackEnergy have demonstrated that industrial control systems are attractive targets for attackers. However, industrial control systems are not limited to malware attacks. Other attacks include SQL injection, distributed denial-of-service, spear phishing, social engineering and man-in-the-middle attacks. Additionally, methods such as unauthorized access, brute forcing and insider attacks have also targeted industrial control systems. Accidents such as fires and explosions at industrial plants also provide valuable insights into the targets of attacks, failure methods and potential impacts. This chapter presents an incident response model for industrial control system forensics based on historical events. In particular, representative industrial control system incidents – cyber attacks and accidents – that have occurred over the past 25 years are categorized and analyzed.The resulting incident response model is useful for forensic planning and investigations. The model enables incident response teams and forensic investigators to decide on the expertise, techniques and tools to be applied to ensure sound evidence acquisition, analysis and reporting.-
dc.languageeng-
dc.publisherSpringer.-
dc.relation.ispartofCritical Infrastructure Protection XIII: 13th IFIP WG 11.10 International Conference on Critical Infrastructure Protection-
dc.relation.ispartofseriesIFIP Advances in Information and Communication Technology (IFIPAICT) ; v. 570-
dc.subjectIndustrial control systems-
dc.subjectincident response-
dc.subjectforensics-
dc.titleAn Incident Response Model for Industrial Control System Forensics Based on Historical Events-
dc.typeConference_Paper-
dc.identifier.emailChow, KP: chow@cs.hku.hk-
dc.identifier.emailYiu, SM: smyiu@cs.hku.hk-
dc.identifier.authorityChow, KP=rp00111-
dc.identifier.authorityYiu, SM=rp00207-
dc.identifier.doi10.1007/978-3-030-34647-8_16-
dc.identifier.hkuros317131-
dc.identifier.spage331-
dc.identifier.epage328-
dc.identifier.isiWOS:000582700000016-
dc.publisher.placeCham, Switzerland-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats