•  
  •  
 

Abstract

Operational Technology (OT) infrastructures play a critical role in modern society and economy. However, their increasing connectivity with public networks such as the Internet has made them vulnerable to cyberattacks, much like traditional Information Technology (IT) systems. In particular, cyberattacks against OT infrastructures remain relatively underexplored and little understood. In this paper, we aim to deepen our understanding of cyberattacks against OT infrastructures. For this purpose, we propose a methodology, including novel cybersecurity metrics to analyze the attack flows of these attacks in an end-to-end fashion, which allows us to draw useful insights. We demonstrate the utility of the methodology by applying it to characterize four real-world cyberattacks against OT infrastructures. This allows us to draw a number of insights, such as proactively disrupting attackers’ reconnaissance; segmenting within OT infrastructures, and from IT infrastructures via zero trust; disrupting attacks before they achieve their intended effects.

Share

COinS