Industrial Control Systems Security Validation Based on MITRE Adversarial Tactics, Techniques, and Common Knowledge Framework

Industrial Control Systems (ICSs) have become the cornerstone of critical sectors like energy, transportation, and manufacturing. However, the burgeoning interconnectivity of ICSs has also introduced heightened risks from cyber threats. The urgency for robust ICS security validation has never been m...

Full description

Bibliographic Details
Main Authors: Divine S. Afenu, Mohammed Asiri, Neetesh Saxena
Format: Article
Language:English
Published: MDPI AG 2024-02-01
Series:Electronics
Subjects:
Online Access:https://www.mdpi.com/2079-9292/13/5/917
_version_ 1797264632496259072
author Divine S. Afenu
Mohammed Asiri
Neetesh Saxena
author_facet Divine S. Afenu
Mohammed Asiri
Neetesh Saxena
author_sort Divine S. Afenu
collection DOAJ
description Industrial Control Systems (ICSs) have become the cornerstone of critical sectors like energy, transportation, and manufacturing. However, the burgeoning interconnectivity of ICSs has also introduced heightened risks from cyber threats. The urgency for robust ICS security validation has never been more pronounced. This paper provides an in-depth exploration of using the MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) framework to validate ICS security. Although originally conceived for enterprise Information Technology (IT), the MITRE ATT&CK framework’s adaptability makes it uniquely suited to address ICS-specific security challenges, offering a methodological approach to identifying vulnerabilities and bolstering defence mechanisms. By zeroing in on two pivotal attack scenarios within ICSs and harnessing a suite of security tools, this research identifies potential weak points and proposes solutions to rectify them. Delving into Indicators of Compromise (IOCs), investigating suitable tools, and capturing indicators, this study serves as a critical resource for organisations aiming to fortify their ICS security. Through this lens, we offer tangible recommendations and insights, pushing the envelope in the domain of ICS security validation.
first_indexed 2024-04-25T00:31:59Z
format Article
id doaj.art-3844eb4ccc1f495abce3e1ef836fa124
institution Directory Open Access Journal
issn 2079-9292
language English
last_indexed 2024-04-25T00:31:59Z
publishDate 2024-02-01
publisher MDPI AG
record_format Article
series Electronics
spelling doaj.art-3844eb4ccc1f495abce3e1ef836fa1242024-03-12T16:42:35ZengMDPI AGElectronics2079-92922024-02-0113591710.3390/electronics13050917Industrial Control Systems Security Validation Based on MITRE Adversarial Tactics, Techniques, and Common Knowledge FrameworkDivine S. Afenu0Mohammed Asiri1Neetesh Saxena2School of Computer Science and Informatics, Cardiff University, Cardiff CF24 4AG, UKSchool of Computer Science and Informatics, Cardiff University, Cardiff CF24 4AG, UKSchool of Computer Science and Informatics, Cardiff University, Cardiff CF24 4AG, UKIndustrial Control Systems (ICSs) have become the cornerstone of critical sectors like energy, transportation, and manufacturing. However, the burgeoning interconnectivity of ICSs has also introduced heightened risks from cyber threats. The urgency for robust ICS security validation has never been more pronounced. This paper provides an in-depth exploration of using the MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) framework to validate ICS security. Although originally conceived for enterprise Information Technology (IT), the MITRE ATT&CK framework’s adaptability makes it uniquely suited to address ICS-specific security challenges, offering a methodological approach to identifying vulnerabilities and bolstering defence mechanisms. By zeroing in on two pivotal attack scenarios within ICSs and harnessing a suite of security tools, this research identifies potential weak points and proposes solutions to rectify them. Delving into Indicators of Compromise (IOCs), investigating suitable tools, and capturing indicators, this study serves as a critical resource for organisations aiming to fortify their ICS security. Through this lens, we offer tangible recommendations and insights, pushing the envelope in the domain of ICS security validation.https://www.mdpi.com/2079-9292/13/5/917Industrial Control Systems (ICSs)Indicators of Compromise (IOC)Denial of Service (DoS)ARP poisoningModbussecurity validation
spellingShingle Divine S. Afenu
Mohammed Asiri
Neetesh Saxena
Industrial Control Systems Security Validation Based on MITRE Adversarial Tactics, Techniques, and Common Knowledge Framework
Electronics
Industrial Control Systems (ICSs)
Indicators of Compromise (IOC)
Denial of Service (DoS)
ARP poisoning
Modbus
security validation
title Industrial Control Systems Security Validation Based on MITRE Adversarial Tactics, Techniques, and Common Knowledge Framework
title_full Industrial Control Systems Security Validation Based on MITRE Adversarial Tactics, Techniques, and Common Knowledge Framework
title_fullStr Industrial Control Systems Security Validation Based on MITRE Adversarial Tactics, Techniques, and Common Knowledge Framework
title_full_unstemmed Industrial Control Systems Security Validation Based on MITRE Adversarial Tactics, Techniques, and Common Knowledge Framework
title_short Industrial Control Systems Security Validation Based on MITRE Adversarial Tactics, Techniques, and Common Knowledge Framework
title_sort industrial control systems security validation based on mitre adversarial tactics techniques and common knowledge framework
topic Industrial Control Systems (ICSs)
Indicators of Compromise (IOC)
Denial of Service (DoS)
ARP poisoning
Modbus
security validation
url https://www.mdpi.com/2079-9292/13/5/917
work_keys_str_mv AT divinesafenu industrialcontrolsystemssecurityvalidationbasedonmitreadversarialtacticstechniquesandcommonknowledgeframework
AT mohammedasiri industrialcontrolsystemssecurityvalidationbasedonmitreadversarialtacticstechniquesandcommonknowledgeframework
AT neeteshsaxena industrialcontrolsystemssecurityvalidationbasedonmitreadversarialtacticstechniquesandcommonknowledgeframework