Estimating the Time-To-Compromise of Exploiting Industrial Control System Vulnerabilities
Engla Rencelj Ling, Mathias Ekstedt
2022
Abstract
The metric Time-To-Compromise (TTC) can be used for estimating the time taken for an attacker to compromise a component or a system. The TTC helps to identify the most critical attacks, which is useful when allocating resources for strengthening the cyber security of a system. In this paper we describe our updated version of the original definition of TTC. The updated version is specifically developed for the Industrial Control Systems domain. The Industrial Control Systems are essential for our society since they are a big part of producing, for example, electricity and clean water. Therefore, it is crucial that we keep these systems secure from cyberattacks. We align the method of estimating the TTC to Industrial Control Systems by updating the original definition’s parameters and use a vulnerability dataset specific for the domain. The new definition is evaluated by comparing estimated Time-To-Compromise values for Industrial Control System attack scenarios to previous research results.
DownloadPaper Citation
in Harvard Style
Rencelj Ling E. and Ekstedt M. (2022). Estimating the Time-To-Compromise of Exploiting Industrial Control System Vulnerabilities. In Proceedings of the 8th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-553-1, pages 96-107. DOI: 10.5220/0010817400003120
in Bibtex Style
@conference{icissp22,
author={Engla Rencelj Ling and Mathias Ekstedt},
title={Estimating the Time-To-Compromise of Exploiting Industrial Control System Vulnerabilities},
booktitle={Proceedings of the 8th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2022},
pages={96-107},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0010817400003120},
isbn={978-989-758-553-1},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 8th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - Estimating the Time-To-Compromise of Exploiting Industrial Control System Vulnerabilities
SN - 978-989-758-553-1
AU - Rencelj Ling E.
AU - Ekstedt M.
PY - 2022
SP - 96
EP - 107
DO - 10.5220/0010817400003120