Abstract
Shamoon attacks are one of the most recent Advanced Persistent Threat (APT) attacks that is being used against several organizations in the energy sector in Saudi Arabia. It is a very destructive malware that corrupts files on the targeted computer and overwrites the Master Boot Record (MBR) to render a computer unusable. In this paper, we propose an enhanced cybersecurity architecture that helps in the effort of halting the chain of attack at any stage and mitigate Shamoon attacks. Before that, we analyze the historical, tactical, and technical aspects of the Shamoon attacks. Our analysis explores the various methods of attack and the different stages through which the attackers achieve their penetration to the targeted organization network. By conducting such analysis, we reveal the weaknesses of the cybersecurity architecture that were exploited by the attackers.
Original language | English |
---|---|
Title of host publication | 2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies, 3ICT 2022 |
Pages | 266-277 |
Number of pages | 12 |
ISBN (Electronic) | 9781665451932 |
DOIs | |
State | Published - 2022 |
Event | 2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies, 3ICT 2022 - Virtual, Online, Bahrain Duration: Nov 20 2022 → Nov 21 2022 |
Publication series
Name | 2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies, 3ICT 2022 |
---|
Conference
Conference | 2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies, 3ICT 2022 |
---|---|
Country/Territory | Bahrain |
City | Virtual, Online |
Period | 11/20/22 → 11/21/22 |
Bibliographical note
Publisher Copyright:© 2022 IEEE.
Keywords
- Cybersecurity
- Industrial Internet of Things
- Internet of Things
- Threats Mitigation
ASJC Scopus subject areas
- Artificial Intelligence
- Computer Networks and Communications
- Computer Science Applications
- Information Systems
- Information Systems and Management
- Control and Optimization