Skip to main content
U.S. Department of Energy
Office of Scientific and Technical Information

Identifying Adversarial Cyber-Activity in Operational Technology Environments Using Bayesian Networks

Journal Article · · IEEE Transactions on Information Forensics and Security
Critical infrastructure and other operational technology (OT) environments face increasing cybersecurity risks from adversarial behavior. This paper describes the development of a risk model using a Bayesian network to enhance the comprehension of observable cyber events caused by malicious activity in OT environments. The core of the Bayesian network is a process model that describes the stages of adversary behavior. The remainder of the model is based on the MITRE ATT&CK® for Industrial Control Systems (ICS) taxonomy, which includes tactics and techniques that may be used by the adversary. The observables provide evidence for adversary behavior through the intermediary technique and tactic nodes. One challenge in constructing this model is a lack of open-source data from cyber-attacks on OT systems. This paper discusses learning from limited data, the elicitation of expert opinion to construct the conditional probability tables when data is scarce, and the refinement of the most difficult conditional probabilities tables using several forms of sensitivity analyses. Finally, the Bayesian network is demonstrated using two historical case studies: the DarkSide ransomware attack on the Colonial Pipeline and the destructive cyberattack targeting the ThyssenKrupp blast furnace. Index Terms—Cybersecurity, industrial control systems, operational technology
Research Organization:
Idaho National Laboratory (INL), Idaho Falls, ID (United States)
Sponsoring Organization:
USDOE Office of Cybersecurity, Energy Security, and Emergency Response (CESER); USDOE Office of Nuclear Energy (NE)
Grant/Contract Number:
AC07-05ID14517; NA0003525
OSTI ID:
3011940
Report Number(s):
INL/JOU--24-77873
Journal Information:
IEEE Transactions on Information Forensics and Security, Journal Name: IEEE Transactions on Information Forensics and Security Vol. 20; ISSN 1556-6013; ISSN 1556-6021
Publisher:
IEEECopyright Statement
Country of Publication:
United States
Language:
English

References (17)

Machine learning in cybersecurity: A review journal February 2019
On the hardness of approximate reasoning journal April 1996
Lazy propagation: A junction tree inference algorithm based on lazy evaluation journal September 1999
A Bayesian network approach for cybersecurity risk assessment implementing and extending the FAIR model journal February 2020
Bayesian network based weighted APT attack paths modeling in cloud computing journal July 2019
Dynamic bayesian networks based abnormal event classifier for nuclear power plants in case of cyber security threats journal October 2020
Machine Learning and Deep Learning Methods for Cybersecurity journal January 2018
Detection of Real-Time Malicious Intrusions and Attacks in IoT Empowered Cybersecurity Infrastructures journal January 2023
Application of Bayesian network to data-driven cyber-security risk assessment in SCADA networks conference November 2017
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs conference December 2009
Statistical Methods for Developing Cybersecurity Response Thresholds for Operational Technology Systems Using Historical Data conference October 2024
Cyber-Attack Modeling Analysis Techniques: An Overview conference August 2016
Measuring network security using dynamic bayesian network conference January 2008
Assessing web security risks using dynamic Bayesian network conference December 2022
Development of a Bayesian Network to Model Malicious Cyber-Activity in Operational Technology Environments.
  • Maccarone, Lee; Buede, Dennis; Bowman, Scott
  • Proposed for presentation at the Uncertainty in AI Conference held August 1-5, 2022 in , https://doi.org/10.2172/2006367
conference August 2022
IT/OT Convergence in Industry 4.0 : Risks and Analisy of the Problems conference June 2023
A Layered Middleware for OT/IT Convergence to Empower Industry 5.0 Applications journal December 2021