Understanding stegomalware in ICS: Attacks and Prevention
dc.contributor.author | Edeh, Natasha | |
dc.contributor.author | Yatagha, Romarick | |
dc.contributor.author | Mejri, Oumayma | |
dc.contributor.author | Waedt, Karl | |
dc.contributor.editor | Klein, Maike | |
dc.contributor.editor | Krupka, Daniel | |
dc.contributor.editor | Winter, Cornelia | |
dc.contributor.editor | Gergeleit, Martin | |
dc.contributor.editor | Martin, Ludger | |
dc.date.accessioned | 2024-10-21T18:24:17Z | |
dc.date.available | 2024-10-21T18:24:17Z | |
dc.date.issued | 2024 | |
dc.description.abstract | This research investigates the growing threat of stego-malware in Industrial Control Systems (ICS), where attackers utilize steganography to embed malicious code covertly. Such attacks pose significant challenges due to their ability to evade traditional detection methods. The study reviews current cybersecurity frameworks and detection techniques, highlighting their strengths and limitations against stego-malware. It explores various detection approaches, including signature-based, anomaly-based, and AI/ML-based methods, assessing their effectiveness within the context of ISO/IEC 27001 and IEC 62443 standards. Case studies such as Havex and Industroyer underscore the real-world impact of stego-malware on ICS infrastructure. The research advocates for enhanced integration of AI and machine learning to bolster steganalysis capabilities, and proposes improvements to existing cybersecurity frameworks to address steganographic threats more effectively. By bridging gaps in current knowledge, this study contributes to advancing cybersecurity measures tailored to protect critical ICS environments against evolving cyber threats. | en |
dc.identifier.doi | 10.18420/inf2024_164 | |
dc.identifier.eissn | 2944-7682 | |
dc.identifier.isbn | 978-3-88579-746-3 | |
dc.identifier.issn | 2944-7682 | |
dc.identifier.pissn | 1617-5468 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/45141 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik e.V. | |
dc.relation.ispartof | INFORMATIK 2024 | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-352 | |
dc.subject | Stegomalware | |
dc.subject | ICS | |
dc.subject | Steganography | |
dc.subject | AI | |
dc.subject | ML | |
dc.subject | Steganalysis | |
dc.title | Understanding stegomalware in ICS: Attacks and Prevention | en |
dc.type | Text/Conference Paper | |
gi.citation.endPage | 1904 | |
gi.citation.publisherPlace | Bonn | |
gi.citation.startPage | 1893 | |
gi.conference.date | 24.-26. September 2024 | |
gi.conference.location | Wiesbaden | |
gi.conference.sessiontitle | 9th IACS WS'24 |
Dateien
Originalbündel
1 - 1 von 1
Lade...
- Name:
- Edeh_et_al_Understanding_stegomalware.pdf
- Größe:
- 348.25 KB
- Format:
- Adobe Portable Document Format