Detecting and Defending Against Covert Operation Mimicry in Industrial Control Systems
Industrial control systems (ICS) frequently face adversaries who blend in by replicating legitimate operator actions. Understanding this mimicry and disrupting the underlying kill chain improves detection and containment. Operational lifecycle of a covert campaign Attackeers traversing an ICS enviro...