Leveraging the MITRE ATT&CK Framework for Threat Identification and Evaluation in Industrial Control System Simulations

Conrad Ekisa, Diarmuid O. Briain, Yvonne Kavanagh

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

Cyberattack matrices, such as the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) framework, play a pivotal role in both understanding and defending against complex cybersecurity threats. These frameworks offer a structured and comprehensive catalog of known adversary behaviours and techniques. This paper extends the insights from 'Modelling and Simulating Advanced Cyber-threats to Industrial Control Systems with an Emulated Testbed' by aligning the demonstrated attack techniques with the MITRE ATT &CK frameworks for both Enterprise and Industrial Control Systems (ICS). The objective is to categorically map where these techniques intersect with the Tactics, Techniques, and Procedures (TTP) outlined in the MITRE framework, highlighting synergies and distinctions between cybersecurity threats in Enterprise Information Technology (IT) and ICS environments. Highlighting the synergies and distinctions between IT and Operational Technology (OT) in cybersecurity is crucial because it helps in understanding the unique threats, vulnerabilities, and security practices applicable to each domain. Through a comprehensive comparison, this paper aims to illuminate the extent to which the simulated cyberattack methodologies are represented within both frameworks, thereby offering a dual perspective on the cybersecurity landscape. This detailed examination of the MITRE ATT &CK framework against a simulated cyber attack scenario not only reinforces the relevance of the cybersecurity testbeds such as the Virtualised ICS Open-source Research Testbed (VICSORT) in the broader context of recognised cybersecurity models but also underscores the criticality of adopting a unified view of threat intelligence that bridges the gap between IT and OT security paradigms. The findings seek to contribute towards demonstrating the relevance of the MITRE ATT &CK framework in understanding cyberattack methodology. They also contribute towards the ongoing discourse in cybersecurity, particularly in enhancing cross-domain understanding and developing integrated defensive strategies against the sophisticated cyber threats of today and tomorrow.

Original languageEnglish
Title of host publicationProceedings of the 35th Irish Systems and Signals Conference, ISSC 2024
EditorsHuiru Zheng, Ian Cleland, Adrian Moore, Haiying Wang, David Glass, Joe Rafferty, Raymond Bond, Jonathan Wallace
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9798350352986
DOIs
Publication statusPublished - 13 Jun 2024
Event35th Irish Systems and Signals Conference, ISSC 2024 - Belfast, United Kingdom
Duration: 13 Jun 202414 Jun 2024

Publication series

Name2024 35th Irish Signals and Systems Conference (ISSC)

Conference

Conference35th Irish Systems and Signals Conference, ISSC 2024
Country/TerritoryUnited Kingdom
CityBelfast
Period13/06/202414/06/2024

Keywords

  • Cybersecurity
  • ICS
  • MITRE ATT &CK
  • OT
  • Testbed
  • ─Cyberattack

Fingerprint

Dive into the research topics of 'Leveraging the MITRE ATT&CK Framework for Threat Identification and Evaluation in Industrial Control System Simulations'. Together they form a unique fingerprint.

Cite this