dispositifs de leurrage reconfigurables et à haute interactivité pour les systèmes de contrôle industriels // Interactive Moving Target Defense for Industrial control systems
ABG-131385
ADUM-65470 |
Thesis topic | |
2025-04-24 |
Université Grenoble Alpes
Saint-Martin-d'Hères - France
dispositifs de leurrage reconfigurables et à haute interactivité pour les systèmes de contrôle industriels // Interactive Moving Target Defense for Industrial control systems
- Computer science
cybesécurité, Moving Target Defense
cybersecurity, Moving Target Defense
cybersecurity, Moving Target Defense
Topic description
Dans le cadre de la « mesure de la Force Cyber » des attaquants, il faut pouvoir comprendre leurs moyens d'attaques, aussi appelés TTPs (Tactiques, Techniques et Procédures). Dans le monde de l'IT, c'est-à-dire des systèmes d'information classiques, il existe des produits du commerce fournissant ce type de renseignements. Dans le monde des systèmes industriels et de l'OT (Operational Technology), les informations sont en revanche plus difficiles à récolter car elles concernent des attaques ultra-spécialisées, s'activant de manière rare et intempestive, et dépendantes des architectures visées. Or, l'historique des attaques récentes nous montre que des attaques sur des systèmes OT peuvent avoir des conséquences catastrophiques pour les intérêts vitaux d'un Etat, preuve en est l'attaque sur Colonial Pipeline, ou bien l'intrusion d'un réseau de traitement de l'eau potable en Floride.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------------------------------------------------------
As part of “measuring the Cyber Force” of attackers, we need to be able to understand their means of attack, also known as TTPs (Tactics, Techniques and Procedures). In the world of IT, i.e. traditional information systems, there are off-the-shelf products that provide this kind of information. In the world of industrial systems and OT (Operational Technology), on the other hand, information is more difficult to gather, as it concerns ultra-specialized attacks, activated rarely and inopportunely, and dependent on the targeted architectures. However, the history of recent attacks shows that attacks on OT systems can have catastrophic consequences for the vital interests of a state, as demonstrated by the attack on the Colonial Pipeline, or the intrusion of a drinking water treatment network in Florida.
Translated with DeepL.com (free version)
------------------------------------------------------------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Début de la thèse : 01/10/2025
------------------------------------------------------------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------------------------------------------------------
As part of “measuring the Cyber Force” of attackers, we need to be able to understand their means of attack, also known as TTPs (Tactics, Techniques and Procedures). In the world of IT, i.e. traditional information systems, there are off-the-shelf products that provide this kind of information. In the world of industrial systems and OT (Operational Technology), on the other hand, information is more difficult to gather, as it concerns ultra-specialized attacks, activated rarely and inopportunely, and dependent on the targeted architectures. However, the history of recent attacks shows that attacks on OT systems can have catastrophic consequences for the vital interests of a state, as demonstrated by the attack on the Colonial Pipeline, or the intrusion of a drinking water treatment network in Florida.
Translated with DeepL.com (free version)
------------------------------------------------------------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Début de la thèse : 01/10/2025
Funding category
Funding further details
Autres financements
Presentation of host institution and host laboratory
Université Grenoble Alpes
Institution awarding doctoral degree
Université Grenoble Alpes
Graduate school
217 MSTII - Mathématiques, Sciences et technologies de l'information, Informatique
Candidate's profile
Le profil privilégié est celui d'informaticien avec un parcours sécurité informatique architecture et systèmes. Profil automaticien avec des très bonnes connaissances en informatique et programmation est également possible.
The preferred profile is that of a computer scientist with a background in IT security, architecture and systems. The preferred profile is that of a computer scientist with a background in computer security architecture and systems. Automatician profile with very good knowledge of IT and programming is also possible.
The preferred profile is that of a computer scientist with a background in IT security, architecture and systems. The preferred profile is that of a computer scientist with a background in computer security architecture and systems. Automatician profile with very good knowledge of IT and programming is also possible.
2025-06-30
Apply
Close
Vous avez déjà un compte ?
Nouvel utilisateur ?
More information about ABG?
Get ABG’s monthly newsletters including news, job offers, grants & fellowships and a selection of relevant events…
Discover our members
ASNR - Autorité de sûreté nucléaire et de radioprotection - Siège
MabDesign
Nokia Bell Labs France
Institut Sup'biotech de Paris
PhDOOC
ANRT
Groupe AFNOR - Association française de normalisation
MabDesign
Aérocentre, Pôle d'excellence régional
CESI
TotalEnergies
ADEME
ONERA - The French Aerospace Lab
SUEZ
Tecknowmetrix
Laboratoire National de Métrologie et d'Essais - LNE
Ifremer
Généthon
CASDEN