A METHOD FOR CALCULATING THE GENERAL RESOURCE PATH OF DESTRUCTIVE CYBERATTACKS ON INDUSTRIAL OBJECTS OF CRITICAL INFRASTRUCTURE

Authors

DOI:

https://doi.org/10.28925/2663-4023.2025.31.1064

Keywords:

cybersecurity, technological system, simulation-analytical modeling, PERT analysis, Colored Petri Nets

Abstract

For the purpose of effective cybersecurity prioritization under limited human, time, and financial resources at industrial critical infrastructure facilities, this study proposes the application of a symbiosis between the mathematical apparatus of simulation-analytical structural modeling using Colored Petri Nets and the assessment of adversary resource expenditures under uncertainty based on PERT analysis. This combination enables a formalized description of various cyberattack vectors and tactics, modeling the propagation trajectories of specialized technological Trojan malware, as well as quantitative calculation of the resource component required to implement each attack scenario against a technological system.

The proposed method can be practically applied in the process of cyber-threat modeling, as it makes it possible to present their resource indicators in a format convenient for analytical evaluation. This creates a foundation for informed decision-making on cybersecurity measures by both managerial and operational levels of cybersecurity units. The approach allows calculating the necessary resource expenditures both from the adversary’s perspective and that of the defensive side when planning effective countermeasures, as well as identifying the most vulnerable segments of the technological system that require priority attention.

For practical implementation of the method, cybersecurity specialists must assess the full spectrum of relevant cyberattack vectors and tactics and subsequently compute their overall resource pathway. The resulting quantitative indicators are used for further ranking of cyber threats and assigning them to short-term, medium-term, or long-term cybersecurity priorities. This ensures a rational allocation of available resources, increases the adaptability of the cybersecurity system, and supports timely implementation of countermeasures against the most resource-efficient and potentially dangerous tactics capable of enabling destructive cyber-impact.

 

 

Downloads

Download data is not yet available.

References

Krotofil, M., Kursawe, K., & Gollmann, D. (2019). Securing industrial control systems. In Security and privacy trends in the industrial Internet of Things (pp. 3–27). Springer. https://doi.org/10.1007/978-3-030-12330-7_1

Dunn, D. G., & Cosman, E. (2024). Cybersecurity fundamentals are not just for industrial control systems: Guidance and direction are available. IEEE.

Davidrajuh, R. (2022). Colored Petri nets for modeling of discrete systems. Springer Nature.

Jensen, K., & Kristensen, L. M. (2009). Coloured Petri nets: Modelling and validation of concurrent systems (pp. 1–56). Springer.

Afenu, D. S., Asiri, M., & Saxena, N. (2024). Industrial control systems security validation based on the MITRE adversarial tactics, techniques, and common knowledge framework. Electronics, 13(5), Article 917. https://doi.org/10.3390/electronics13050917

Bergantiños, G., & Vidal-Puga, J. (2009). A value for PERT problems. International Journal of Information Technology & Decision Making. https://doi.org/10.1142/S0219198909002418

Savchenko, V. A., & Khaver, A. V. (2025). Assessing the impact of artificial intelligence–based software tools on resource efficiency in conducting destructive cyber operations against critical infrastructure facilities. Modern Information Protection, 3(63).

Mandiant. (2023, March 20). Move, patch, get out the way: 2022 zero-day exploitation continues at an elevated pace. https://cloud.google.com/blog/topics/threat-intelligence/zero-days-exploited-2022/

El Amin, H., Samhat, A. E., Chamoun, M., Oueidat, L., & Feghali, A. (2024). An integrated approach to cyber risk management with a cyber threat intelligence framework to secure critical infrastructure. Journal of Cybersecurity and Privacy, 4(2), Article 18. https://doi.org/10.3390/jcp4020018

Paté-Cornell, M.-E. L., Kuypers, M., Smith, M., & Keller, P. (2020). Cyber risk management for critical infrastructure: A risk analysis model and three case studies. Risk Analysis, 38(2). https://doi.org/10.1111/risa.12844

Downloads


Abstract views: 1

Published

2025-12-16

How to Cite

Khaver, A. (2025). A METHOD FOR CALCULATING THE GENERAL RESOURCE PATH OF DESTRUCTIVE CYBERATTACKS ON INDUSTRIAL OBJECTS OF CRITICAL INFRASTRUCTURE. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 3(31), 727–740. https://doi.org/10.28925/2663-4023.2025.31.1064