A Diamond Model Approach to Analyzing GhostSec's Intrusion Paths

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

The convergence of Operational Technology (OT) and Information Technology (IT) has heightened risks for critical infrastructure (CI) and industrial control systems (ICS), leading to a surge in diverse and sophisticated OT attacks with severe consequences. Thus, this study combines the Diamond Model with the Cyber Kill Chain to analyze potential attack paths and methods in the GhostSec case, where attackers compromised a Berghof PLC to demonstrate their access capabilities. Understanding these attack paths offers valuable insights into adversary strategies, aiding in the development of defense measures to prevent similar attacks.

Original languageEnglish
Title of host publicationProceedings of The 2025 International Conference on Artificial Life and Robotics, ICAROB 2025
EditorsYingmin Jia, Takao Ito, Ju-Jang Lee
PublisherALife Robotics Corporation Ltd
Pages114-118
Number of pages5
ISBN (Print)9784991333729
Publication statusPublished - 2025
Event30th International Conference on Artificial Life and Robotics, ICAROB 2025 - Oita, Japan
Duration: 2025 Feb 132025 Feb 16

Publication series

NameProceedings of International Conference on Artificial Life and Robotics
ISSN (Electronic)2435-9157

Conference

Conference30th International Conference on Artificial Life and Robotics, ICAROB 2025
Country/TerritoryJapan
CityOita
Period25-02-1325-02-16

All Science Journal Classification (ASJC) codes

  • Artificial Intelligence
  • Computer Vision and Pattern Recognition
  • Hardware and Architecture
  • Information Systems
  • Control and Systems Engineering
  • Electrical and Electronic Engineering
  • Modelling and Simulation

Fingerprint

Dive into the research topics of 'A Diamond Model Approach to Analyzing GhostSec's Intrusion Paths'. Together they form a unique fingerprint.

Cite this