Key Factors Influencing the Rise of Current Ransomware Attacks on Industrial Control Systems

被引:4
作者
Gazzan, Mazen [1 ,3 ]
Alqahtani, Abdullah [1 ,3 ]
Sheldon, Frederick T. [2 ]
机构
[1] Univ Idaho, Dept Comp Sci, Moscow, ID 83843 USA
[2] Univ Idaho, Dept Comp Sci, Coeur Dalene, ID USA
[3] Najran Univ, Najran, Iran
来源
2021 IEEE 11TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC) | 2021年
关键词
Ransomware; SCADA; Attack Model; Attack Success Factors; Malware; MALWARE; THREAT;
D O I
10.1109/CCWC51732.2021.9376179
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Ransomware is a malware type whose purpose is to lock and deny access to vital resources and services in the system. Like any other system, ransomware targets Supervisory Control and Data Acquisition (SCADA) and denies access to many components and data these systems collect. This represents a major threat to the systems that rely on SCADA to control the operational process. Although several studies have been conducted to address the issue of ransomware and mitigate the effect of its attacks, they approach the problem from the traditional systems perspective. That is, these solutions treat the ransomware attack on SCADA systems similar to those attacking conventional systems. This is not realistic because of the unique characteristics of SCADA systems, which are reflected in the nature and capability of ransomware attacks. Not only are data stored in SCADA nodes vulnerable to the ransomware attack, but also the data collected and shared with the other nodes. As such, traditional measures for ransomware detection become unable to deal with the attack as they assume that ransomware attacks the data at rest only. In SCADA systems, the attack model, success factors, and infection vectors of ransomware attacks are different. As such it is important to explore and understand the unique characteristics of ransomware that target SCADA systems as a prerequisite to thwart it. Therefore, this study is devoted to investigating the unique characteristics and main factors for successful ransomware attacks.
引用
收藏
页码:1417 / 1422
页数:6
相关论文
共 60 条
  • [1] A system call refinement-based enhanced Minimum Redundancy Maximum Relevance method for ransomware early detection
    Ahmed, Yahye Abukar
    Kocer, Baris
    Huda, Shamsul
    Al-rimy, Bander Ali Saleh
    Hassan, Mohammad Mehedi
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 167
  • [2] Al-Rimy B. A. S., 2020, IEEE ACCESS, V8, DOI [10.1109/ACCESS.2020.3012674, DOI 10.1109/ACCESS.2020.3012674]
  • [3] Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection technique for Crypto-ransomware early detection
    Al-rimy, Bander Ali Saleh
    Maarof, Mohd Aizaini
    Alazab, Mamoun
    Shaid, Syed Zainudeen Mohd
    Ghaleb, Fuad A.
    Almalawi, Abdulmohsen
    Ali, Abdullah Marish
    Al-Hadhrami, Tawfik
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 115 : 641 - 658
  • [4] Zero-Day Aware Decision Fusion-Based Model for Crypto-Ransomware Early Detection
    Al-rimy, Bander Ali Saleh
    Maarof, Mohd Aizaini
    Prasetyo, Yuli Adam
    Shaid, Syed Zainudeen Mohd
    Ariffin, Aswami Fadillah Mohd
    [J]. INTERNATIONAL JOURNAL OF INTEGRATED ENGINEERING, 2018, 10 (06): : 82 - 88
  • [5] Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions
    Al-rimy, Bander Ali Saleh
    Maarof, Mohd Aizaini
    Shaid, Syed Zainudeen Mohd
    [J]. COMPUTERS & SECURITY, 2018, 74 : 144 - 166
  • [6] Alexander Gostev R. U., 2016, IT THREAT EVOLUTION
  • [7] A Comprehensive Study of the IoT Cybersecurity in Smart Cities
    Andrade, Roberto Omar
    Yoo, Sang Guun
    Tello-Oquendo, Luis
    Ortiz-Garces, Ivan
    [J]. IEEE ACCESS, 2020, 8 : 228922 - 228941
  • [8] Andronio Nicolo, 2015, Research in Attacks, Intrusions and Defenses. 18th International Symposium, RAID 2015. Proceedings: LNCS 9404, P382, DOI 10.1007/978-3-319-26362-5_18
  • [9] [Anonymous], 2016, RANS BUS 2016
  • [10] [Anonymous], 2011, Security NIST Special Publication