Final published version
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Other chapter contribution
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Other chapter contribution
}
TY - CHAP
T1 - Assessing the Impact of Malware Attacks in Utility Networks
AU - König, Sandra
AU - Gouglidis, Antonios
AU - Green, Benjamin
AU - Solar, Alma
PY - 2018/7/7
Y1 - 2018/7/7
N2 - Utility networks are becoming more and more interconnected. Besides the natural physical interdependencies (e.g., water networks heavily depend on power grids, etc.), utility networks are nowadays often monitored and operated by industrial control systems (ICS). While these systems enhance the level of control over utility networks, they also enable new forms of attacks, such as cyberattacks. During the last years, cyberattacks have occurred more frequently with sometimes a significant impact on the company as well as the society. The first step toward preventing such incidents is to understand how an infection of one component influences the rest of the network. This malware spreading can be modeled as a stochastic process on a graph where edges transmit an infection with a specific probability. In practice, this probability depends on the type of the malware (e.g., ransomware, spyware, virus, etc.) as well as on the type of the connection between the nodes (e.g., physical or logical connections). In this chapter, we illustrate how the abstract model can be put into practice for a concrete use case.
AB - Utility networks are becoming more and more interconnected. Besides the natural physical interdependencies (e.g., water networks heavily depend on power grids, etc.), utility networks are nowadays often monitored and operated by industrial control systems (ICS). While these systems enhance the level of control over utility networks, they also enable new forms of attacks, such as cyberattacks. During the last years, cyberattacks have occurred more frequently with sometimes a significant impact on the company as well as the society. The first step toward preventing such incidents is to understand how an infection of one component influences the rest of the network. This malware spreading can be modeled as a stochastic process on a graph where edges transmit an infection with a specific probability. In practice, this probability depends on the type of the malware (e.g., ransomware, spyware, virus, etc.) as well as on the type of the connection between the nodes (e.g., physical or logical connections). In this chapter, we illustrate how the abstract model can be put into practice for a concrete use case.
U2 - 10.1007/978-3-319-75268-6_14
DO - 10.1007/978-3-319-75268-6_14
M3 - Other chapter contribution
SN - 9783319752679
T3 - Static & Dynamic Game Theory: Foundations and Applications
SP - 335
EP - 351
BT - Game Theory for Security and Risk Management
A2 - Rass, Stefan
A2 - Schauer, Stefan
PB - Springer Birkhäuser
ER -