{"id":1954,"date":"2025-01-06T13:01:22","date_gmt":"2025-01-06T18:01:22","guid":{"rendered":"https:\/\/carleton.ca\/cybersea\/?p=1954"},"modified":"2026-01-26T10:41:49","modified_gmt":"2026-01-26T15:41:49","slug":"new-publication-interplay-of-attacker-behaviors-and-dependability-attributes-in-industrial-control-system-impact-analysis","status":"publish","type":"post","link":"https:\/\/carleton.ca\/cybersea\/2025\/new-publication-interplay-of-attacker-behaviors-and-dependability-attributes-in-industrial-control-system-impact-analysis\/","title":{"rendered":"New Publication: Interplay of Attacker Behaviors and Dependability Attributes in Industrial Control System Impact Analysis"},"content":{"rendered":"\n<section class=\"w-screen px-6 cu-section cu-section--white ml-offset-center md:px-8 lg:px-14\">\n    <div class=\"space-y-6 cu-max-w-child-5xl  md:space-y-10 cu-prose-first-last\">\n\n            <div class=\"cu-textmedia flex flex-col lg:flex-row mx-auto gap-6 md:gap-10 my-6 md:my-12 first:mt-0 max-w-5xl\">\n        <div class=\"justify-start cu-textmedia-content cu-prose-first-last\" style=\"flex: 0 0 100%;\">\n            <header class=\"font-light prose-xl cu-pageheader md:prose-2xl cu-component-updated cu-prose-first-last\">\n                                    <h1 class=\"cu-prose-first-last font-semibold !mt-2 mb-4 md:mb-6 relative after:absolute after:h-px after:bottom-0 after:bg-cu-red after:left-px text-3xl md:text-4xl lg:text-5xl lg:leading-[3.5rem] pb-5 after:w-10 text-cu-black-700 not-prose\">\n                        New Publication: Interplay of Attacker Behaviors and Dependability Attributes in Industrial Control System Impact Analysis\n                    <\/h1>\n                \n                                \n                            <\/header>\n\n                    <\/div>\n\n            <\/div>\n\n    <\/div>\n<\/section>\n\n<p>Our recent paper &#8220;<a href=\"https:\/\/doi.org\/10.1109\/DSA63982.2024.00022\">Interplay of Attacker Behaviors and Dependability Attributes in Industrial Control System Impact Analysis<\/a>&#8221; is now available online. In this paper, we adopt the Structured Cyberattack Impact Analysis (SCIA) approach to visualize and quantify, respectively, using simulations and statistical model checking, the potential impact of data tampering attacks when performed by attackers with different behaviors (random, relentless, and informed). The impact analysis results highlight the interplay of ICS dependability attributes in terms of (1) how attacks on ICS security can impact system reliability and availability, (2) how improving security can improve system availability and reliability, and (3) how accepting some sacrifices on one attribute (availability) can end up improving other attributes (security and reliability). This paper was presented at&nbsp;the <a href=\"https:\/\/dsa24.techconf.org\/\">11th International Conference on Dependable Systems and Their Applications (DSA 2024)<\/a>. See <a href=\"https:\/\/carleton.ca\/cybersea\/publications\/\">Publications<\/a> for more details!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our recent paper &#8220;Interplay of Attacker Behaviors and Dependability Attributes in Industrial Control System Impact Analysis&#8221; is now available online. In this paper, we adopt the Structured Cyberattack Impact Analysis (SCIA) approach to visualize and quantify, respectively, using simulations and statistical model checking, the potential impact of data tampering attacks when performed by attackers with [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":431,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[41],"tags":[],"class_list":["post-1954","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-publication"],"acf":{"cu_post_thumbnail":""},"_links":{"self":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts\/1954","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/comments?post=1954"}],"version-history":[{"count":1,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts\/1954\/revisions"}],"predecessor-version":[{"id":1955,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/posts\/1954\/revisions\/1955"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/media\/431"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/media?parent=1954"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/categories?post=1954"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/tags?post=1954"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}