@article{1, author = {Chee-Wooi Ten and Govindarasu Manimaran and Chen-Ching Liu}, title = {Cybersecurity for Critical Infrastructures: Attack and Defense Modeling}, abstract = {To address cybersecurity vulnerabilities in control systems, this paper proposes a supervisory control and data acquisition (SCADA) security framework that includes real-time monitoring, anomaly detection, impact analysis, and mitigation strategies, alongside an attack-tree-based methodology to evaluate system vulnerabilities.}, year = {2010}, journal = {Institute of Electrical and Electronics Engineers (IEEE)}, month = {2010-07}, issn = {1083-4427}, url = {https://ieeexplore.ieee.org/abstract/document/5477189}, doi = {10.1109/TSMCA.2010.2048028}, note = {Cybersecurity for critical infrastructures requires further research, particularly in areas like real-time correlation and intrusion detection algorithms, risk monitoring, and advanced modeling techniques that account for dynamic attacker behavior and system impacts. The proposed RAIM framework and attack-tree methodology offer a structured approach to evaluating system vulnerabilities, but further development, including test-bed validation and visualization techniques, is necessary for practical application.}, }