Samuel Oliveira , André B. Leal , Marcelo Teixeira , Yuri K. Lopes
{"title":"A classification of cybersecurity strategies in the context of Discrete Event Systems","authors":"Samuel Oliveira , André B. Leal , Marcelo Teixeira , Yuri K. Lopes","doi":"10.1016/j.arcontrol.2023.100907","DOIUrl":null,"url":null,"abstract":"<div><p>In recent years, cybersecurity has received increasing attention due to the demand from a large class of networked systems for resilience against cyberattacks that may compromise privacy, integrity and availability. Many of these systems are abstracted as Discrete Event Systems (DES) as their evolution occurs through the occurrence of discrete events. Since they use communication networks and consequently may be vulnerable to attacks, cybersecurity must be considered in DES. Based on this challenging scenario, this work focuses on cybersecurity strategies in the context of DES. A systematic literature mapping (SLM) was carried out, which selected 208 papers on the aforementioned topic. These papers were analyzed and categorized regarding the characteristics of each cybersecurity strategy, the types of attacks considered and also the modeling formalism used. The primary objective of this work is to collect all relevant research in the literature to provide the state of the art on cybersecurity strategies for DES, as well as identify research trends and directions for future work on the topic. The results show that the majority of the selected papers present cybersecurity methods based on the strategy of protecting systems against passive attacks, using automata as the modeling formalism. In contrast, the topic of active attacks has gained attention in recent years, with an increasing number of papers published in several journals and conferences. Finally, research gaps and challenges are presented to provide future directions in the domain of the cybersecurity of DES.</p></div>","PeriodicalId":50750,"journal":{"name":"Annual Reviews in Control","volume":"56 ","pages":"Article 100907"},"PeriodicalIF":7.3000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Annual Reviews in Control","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1367578823000718","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
In recent years, cybersecurity has received increasing attention due to the demand from a large class of networked systems for resilience against cyberattacks that may compromise privacy, integrity and availability. Many of these systems are abstracted as Discrete Event Systems (DES) as their evolution occurs through the occurrence of discrete events. Since they use communication networks and consequently may be vulnerable to attacks, cybersecurity must be considered in DES. Based on this challenging scenario, this work focuses on cybersecurity strategies in the context of DES. A systematic literature mapping (SLM) was carried out, which selected 208 papers on the aforementioned topic. These papers were analyzed and categorized regarding the characteristics of each cybersecurity strategy, the types of attacks considered and also the modeling formalism used. The primary objective of this work is to collect all relevant research in the literature to provide the state of the art on cybersecurity strategies for DES, as well as identify research trends and directions for future work on the topic. The results show that the majority of the selected papers present cybersecurity methods based on the strategy of protecting systems against passive attacks, using automata as the modeling formalism. In contrast, the topic of active attacks has gained attention in recent years, with an increasing number of papers published in several journals and conferences. Finally, research gaps and challenges are presented to provide future directions in the domain of the cybersecurity of DES.
期刊介绍:
The field of Control is changing very fast now with technology-driven “societal grand challenges” and with the deployment of new digital technologies. The aim of Annual Reviews in Control is to provide comprehensive and visionary views of the field of Control, by publishing the following types of review articles:
Survey Article: Review papers on main methodologies or technical advances adding considerable technical value to the state of the art. Note that papers which purely rely on mechanistic searches and lack comprehensive analysis providing a clear contribution to the field will be rejected.
Vision Article: Cutting-edge and emerging topics with visionary perspective on the future of the field or how it will bridge multiple disciplines, and
Tutorial research Article: Fundamental guides for future studies.