Projects per year
Abstract
As the Operational Technology (OT) domain is constantly evolving, innovative approaches are needed to enhance existing cybersecurity systems. By strategically hosting intelligent cybersecurity tools (decoys - ‘Snare and Prowl’) both within and outside the utility network operator’s environment to mimic faux services and targets, internet-based, in-network adversaries, and Advanced Persistent Threats (APTs) are identified and engaged. Moreover, decoy Techniques, Tactics, and Procedures (TTPs) are tracked for attack characterisation based on their Threat Intelligence Profiles (TIPs) and narratives employed to effectively discern the attacker's capability to laterally progress across the network. This poster shares the lessons learned from a proof of concept study to investigate the capabilities of a cyber deception framework within an operational technology energy network to detect, analyse and alert of internal and external facing threats.
In this study, different cyber attack scenarios were emulated in an OT environment with and without cyber deception frameworks. The case study trial is based on servers and database attack simulations critical for a more flexible, reliable, resilient, secure and sustainable integrated energy system. In attack scenario 1, breadcrumbs are used to prevent an attempt to attack narrative deployment for Apache and SSH Servers. In the second attack scenario, decoys detect attacks with indicators of intelligence based on privileged access through active port scans. In attack scenario 3, lessons on the impact of network environment changes on the overall system’s security are monitored. In each of the test scenarios, the Common Vulnerabilities and Exposures (CVEs) specific to Distribution Network Operators (DNO), TTPs leveraged by adversaries, and strategic locations within the DNO network for deception deployment were identified to improve system security.
In this study, different cyber attack scenarios were emulated in an OT environment with and without cyber deception frameworks. The case study trial is based on servers and database attack simulations critical for a more flexible, reliable, resilient, secure and sustainable integrated energy system. In attack scenario 1, breadcrumbs are used to prevent an attempt to attack narrative deployment for Apache and SSH Servers. In the second attack scenario, decoys detect attacks with indicators of intelligence based on privileged access through active port scans. In attack scenario 3, lessons on the impact of network environment changes on the overall system’s security are monitored. In each of the test scenarios, the Common Vulnerabilities and Exposures (CVEs) specific to Distribution Network Operators (DNO), TTPs leveraged by adversaries, and strategic locations within the DNO network for deception deployment were identified to improve system security.
Original language | English |
---|---|
Number of pages | 1 |
Publication status | Published - 14 May 2024 |
Event | All-Energy & Dcarbonise Exhibition and Conference - SEC, Glasgow, United Kingdom Duration: 15 May 2024 → 16 May 2024 https://www.all-energy.co.uk/en-gb/conference.html |
Conference
Conference | All-Energy & Dcarbonise Exhibition and Conference |
---|---|
Country/Territory | United Kingdom |
City | Glasgow |
Period | 15/05/24 → 16/05/24 |
Internet address |
Keywords
- Cyber Deception
- integrated energy systems
- Attack Simulation
- Defense Mechanisms
Fingerprint
Dive into the research topics of 'Cyber Deception for Integrated Energy Systems: Cyber-Attacks Simulations and Defense Mechanisms'. Together they form a unique fingerprint.Projects
- 1 Finished
-
Evaluation of the capability and benefits of the Lupovis cyber security deception solution within smart grid infrastructures
Ugwuanyi, S. O. (Principal Investigator)
1/08/22 → 31/12/23
Project: Research