Threat Analysis of Cyber Security Exercise for Reservoir Testbed Based on Attack Tree

Su Goan Tan, I-Hsien Liu, Jung Shian Li

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

As operational technology (OT) and information technology (IT) are getting closer in industrial control systems (ICS) nowadays, the security of critical infrastructure (CI) has become an important issue, which may have a great influence on people's livelihood, economy, and even safety. Therefore, governments around the world have conducted a series of cyber security exercises, which is one of the most effective ways to maintain and optimize the security, so as to cultivate the information security capabilities of government agencies and enterprises in the face of cyber attacks. In this paper, we present the framework and situations of the cyber security exercise with two scenarios on our reservoir testbed, and then analyze the threats based on the attack tree model and give the security recommendations to protect the critical infrastructure according to the results of the practical exercise and analysis.

Original languageEnglish
Title of host publicationProceedings - 2022 10th International Symposium on Computing and Networking Workshops, CANDARW 2022
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages375-379
Number of pages5
ISBN (Electronic)9781665475327
DOIs
Publication statusPublished - 2022
Event10th International Symposium on Computing and Networking Workshops, CANDARW 2022 - Himeji, Japan
Duration: 2022 Nov 212022 Nov 22

Publication series

NameProceedings - 2022 10th International Symposium on Computing and Networking Workshops, CANDARW 2022

Conference

Conference10th International Symposium on Computing and Networking Workshops, CANDARW 2022
Country/TerritoryJapan
CityHimeji
Period22-11-2122-11-22

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Computer Science Applications
  • Hardware and Architecture
  • Information Systems and Management

Fingerprint

Dive into the research topics of 'Threat Analysis of Cyber Security Exercise for Reservoir Testbed Based on Attack Tree'. Together they form a unique fingerprint.

Cite this