首页 > 最新文献

International Journal of Critical Infrastructure Protection最新文献

英文 中文
Beyond botnets: Autonomous Firmware Zombie Attack in industrial control systems
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-07 DOI: 10.1016/j.ijcip.2024.100729
Seyed Ali Alavi, Hamed Pourvali Moghadam, Amir Hossein Jahangir
This paper introduces a novel cyberattack vector called the ”Autonomous Firmware Zombie Attack.” Unlike traditional zombie attacks that rely on botnets and direct network control, this method enables attackers to covertly modify the firmware of substation Intelligent Electronic Devices (IEDs) and other firmware-based appliances, including critical industrial equipment, without requiring an active network connection, leaving minimal trace and making an offensive attack with only one infected device instead of a set of multiple devices in botnets. Unlike conventional cyber threats, this method allows attackers to manipulate devices to cause substantial damage while leaving minimal trace, thus evading traditional detection techniques. This study demonstrates the potential of the Autonomous Firmware Zombie Attack (AFZA), which causes substantial damage while evading conventional detection techniques. We first run such an attack on a series of IEDs as proof of concept for this issue. Then, we compare this approach to traditional remote control attacks, highlighting its unique advantages and implications for industrial control system security. This research underscores the critical need for a robust cybersecurity framework tailored to industrial control systems and advances our understanding of the complex risk landscape threatening critical infrastructures.
{"title":"Beyond botnets: Autonomous Firmware Zombie Attack in industrial control systems","authors":"Seyed Ali Alavi,&nbsp;Hamed Pourvali Moghadam,&nbsp;Amir Hossein Jahangir","doi":"10.1016/j.ijcip.2024.100729","DOIUrl":"10.1016/j.ijcip.2024.100729","url":null,"abstract":"<div><div>This paper introduces a novel cyberattack vector called the ”Autonomous Firmware Zombie Attack.” Unlike traditional zombie attacks that rely on botnets and direct network control, this method enables attackers to covertly modify the firmware of substation Intelligent Electronic Devices (IEDs) and other firmware-based appliances, including critical industrial equipment, without requiring an active network connection, leaving minimal trace and making an offensive attack with only one infected device instead of a set of multiple devices in botnets. Unlike conventional cyber threats, this method allows attackers to manipulate devices to cause substantial damage while leaving minimal trace, thus evading traditional detection techniques. This study demonstrates the potential of the Autonomous Firmware Zombie Attack (AFZA), which causes substantial damage while evading conventional detection techniques. We first run such an attack on a series of IEDs as proof of concept for this issue. Then, we compare this approach to traditional remote control attacks, highlighting its unique advantages and implications for industrial control system security. This research underscores the critical need for a robust cybersecurity framework tailored to industrial control systems and advances our understanding of the complex risk landscape threatening critical infrastructures.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"48 ","pages":"Article 100729"},"PeriodicalIF":4.1,"publicationDate":"2024-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143167813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation of multi-stage attack and defense mechanisms in smart grids
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-05 DOI: 10.1016/j.ijcip.2024.100727
Ömer Sen , Bozhidar Ivanov , Christian Kloos , Christoph Zöll , Philipp Lutat , Martin Henze , Andreas Ulbig , Michael Andres
The power grid is a vital infrastructure in modern society, essential for ensuring public safety and welfare. As it increasingly relies on digital technologies for its operation, it becomes more vulnerable to sophisticated cyber threats. These threats, if successful, could disrupt the grid’s functionality, leading to severe consequences. To mitigate these risks, it is crucial to develop effective protective measures, such as intrusion detection systems and decision support systems, that can detect and respond to cyber attacks. Machine learning methods have shown great promise in this area, but their effectiveness is often limited by the scarcity of high-quality data, primarily due to confidentiality and access issues.
In response to this challenge, our work introduces an advanced simulation environment that replicates the power grid’s infrastructure and communication behavior. This environment enables the simulation of complex, multi-stage cyber attacks and defensive mechanisms, using attack trees to map the attacker’s steps and a game-theoretic approach to model the defender’s response strategies. The primary goal of this simulation framework is to generate a diverse range of realistic attack data that can be used to train machine learning algorithms for detecting and mitigating cyber attacks. Additionally, the environment supports the evaluation of new security technologies, including advanced decision support systems, by providing a controlled and flexible testing platform.
Our simulation environment is designed to be modular and scalable, supporting the integration of new use cases and attack scenarios without relying heavily on external components. It enables the entire process of scenario generation, data modeling, data point mapping, and power flow simulation, along with the depiction of communication traffic, in a coherent process chain. This ensures that all relevant data needed for cyber security investigations, including the interactions between attacker and defender, are captured under consistent conditions and constraints.
The simulation environment also includes a detailed modeling of communication protocols and grid operation management, providing insights into how attacks propagate through the network. The generated data are validated through laboratory tests, ensuring that the simulation reflects real-world conditions. These datasets are used to train machine learning models for intrusion detection and evaluate their performance, specifically focusing on how well they can detect complex attack patterns in power grid operations.
{"title":"Simulation of multi-stage attack and defense mechanisms in smart grids","authors":"Ömer Sen ,&nbsp;Bozhidar Ivanov ,&nbsp;Christian Kloos ,&nbsp;Christoph Zöll ,&nbsp;Philipp Lutat ,&nbsp;Martin Henze ,&nbsp;Andreas Ulbig ,&nbsp;Michael Andres","doi":"10.1016/j.ijcip.2024.100727","DOIUrl":"10.1016/j.ijcip.2024.100727","url":null,"abstract":"<div><div>The power grid is a vital infrastructure in modern society, essential for ensuring public safety and welfare. As it increasingly relies on digital technologies for its operation, it becomes more vulnerable to sophisticated cyber threats. These threats, if successful, could disrupt the grid’s functionality, leading to severe consequences. To mitigate these risks, it is crucial to develop effective protective measures, such as intrusion detection systems and decision support systems, that can detect and respond to cyber attacks. Machine learning methods have shown great promise in this area, but their effectiveness is often limited by the scarcity of high-quality data, primarily due to confidentiality and access issues.</div><div>In response to this challenge, our work introduces an advanced simulation environment that replicates the power grid’s infrastructure and communication behavior. This environment enables the simulation of complex, multi-stage cyber attacks and defensive mechanisms, using attack trees to map the attacker’s steps and a game-theoretic approach to model the defender’s response strategies. The primary goal of this simulation framework is to generate a diverse range of realistic attack data that can be used to train machine learning algorithms for detecting and mitigating cyber attacks. Additionally, the environment supports the evaluation of new security technologies, including advanced decision support systems, by providing a controlled and flexible testing platform.</div><div>Our simulation environment is designed to be modular and scalable, supporting the integration of new use cases and attack scenarios without relying heavily on external components. It enables the entire process of scenario generation, data modeling, data point mapping, and power flow simulation, along with the depiction of communication traffic, in a coherent process chain. This ensures that all relevant data needed for cyber security investigations, including the interactions between attacker and defender, are captured under consistent conditions and constraints.</div><div>The simulation environment also includes a detailed modeling of communication protocols and grid operation management, providing insights into how attacks propagate through the network. The generated data are validated through laboratory tests, ensuring that the simulation reflects real-world conditions. These datasets are used to train machine learning models for intrusion detection and evaluate their performance, specifically focusing on how well they can detect complex attack patterns in power grid operations.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"48 ","pages":"Article 100727"},"PeriodicalIF":4.1,"publicationDate":"2024-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143168301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Physical threats vs Cyber threats
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-01 DOI: 10.1016/S1874-5482(24)00075-1
Roberto Setola
{"title":"Physical threats vs Cyber threats","authors":"Roberto Setola","doi":"10.1016/S1874-5482(24)00075-1","DOIUrl":"10.1016/S1874-5482(24)00075-1","url":null,"abstract":"","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"47 ","pages":"Article 100734"},"PeriodicalIF":4.1,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143154825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized unmanned aerial vehicle pathway system in disaster resilience network 灾备网络中无人机路径系统的优化
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-01 DOI: 10.1016/j.ijcip.2024.100726
Yi-Wei Ma, Desti Syuhada
After a disaster, the interruption of networks in affected areas is a significant challenge, exacerbated by the malfunction of base stations and the complete absence of network infrastructure. Hence, the objective of this study is to achieve a systematic and well-supported path in the post-disaster system through the optimization of coverage area and the provision of high-quality service. Therefore, this study aims to enhance the extent of coverage and transmission efficiency by considering the specific needs of users to establish a logical and systematic flight path of Unmanned Aerial Vehicles (UAVs) in a post-disaster scenario. This study demonstrates a 12.7 % availability advantage over random methods that do not consider users and only generalize cluster length. This study optimizes the performance of the UAV by adjusting its altitude position best to meet the requirements of its coverage and transmission quality.
灾难发生后,受影响地区的网络中断是一项重大挑战,而基站的故障和网络基础设施的完全缺乏又加剧了这一挑战。因此,本研究的目标是通过优化覆盖区域和提供高质量服务,在灾后系统中实现系统和良好支持的路径。因此,本研究旨在结合用户的具体需求,提高覆盖范围和传输效率,建立灾后场景下无人机的逻辑系统飞行路径。该研究表明,与不考虑用户且仅概括集群长度的随机方法相比,该方法的可用性优势为12.7 %。本研究通过调整无人机的高度位置来优化无人机的性能,以满足其覆盖和传输质量的要求。
{"title":"Optimized unmanned aerial vehicle pathway system in disaster resilience network","authors":"Yi-Wei Ma,&nbsp;Desti Syuhada","doi":"10.1016/j.ijcip.2024.100726","DOIUrl":"10.1016/j.ijcip.2024.100726","url":null,"abstract":"<div><div>After a disaster, the interruption of networks in affected areas is a significant challenge, exacerbated by the malfunction of base stations and the complete absence of network infrastructure. Hence, the objective of this study is to achieve a systematic and well-supported path in the post-disaster system through the optimization of coverage area and the provision of high-quality service. Therefore, this study aims to enhance the extent of coverage and transmission efficiency by considering the specific needs of users to establish a logical and systematic flight path of Unmanned Aerial Vehicles (UAVs) in a post-disaster scenario. This study demonstrates a 12.7 % availability advantage over random methods that do not consider users and only generalize cluster length. This study optimizes the performance of the UAV by adjusting its altitude position best to meet the requirements of its coverage and transmission quality.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"47 ","pages":"Article 100726"},"PeriodicalIF":4.1,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142748486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FingerCI: Writing industrial process specifications from network traffic FingerCI:从网络流量中编写工业流程规范
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-19 DOI: 10.1016/j.ijcip.2024.100725
Filipe Apolinário , Nelson Escravana , Éric Hervé , Miguel L. Pardal , Miguel Correia
Critical infrastructures (CIs) are often targets of cyber-attacks, requiring accurate process specifications to identify and defend against incidents. However, discrepancies between these specifications and real-world CI conditions arise due to the costly process of manual specification by experts.
This paper introduces FingerCI, a method for automatically generating CI process specifications through network traffic analysis and physical behavior modeling. By defining a Specification Language that integrates with existing systems, FingerCI extracts industrial process specifications without infrastructure changes or downtime. The specifications include a behavior model that validates physical correctness.
We evaluated FingerCI on a digital twin of an airport baggage handling system, achieving 99.98% fitness to observed behavior. Our method improves cybersecurity and fault detection with high accuracy.
关键基础设施(CI)通常是网络攻击的目标,需要准确的流程规范来识别和防御事件。本文介绍了 FingerCI,一种通过网络流量分析和物理行为建模自动生成 CI 流程规范的方法。通过定义一种与现有系统集成的规范语言,FingerCI 可以提取工业流程规范,而无需更改基础设施或停机。我们在一个机场行李处理系统的数字孪生系统上对 FingerCI 进行了评估,结果显示其与观察行为的吻合度高达 99.98%。我们的方法提高了网络安全和故障检测的准确性。
{"title":"FingerCI: Writing industrial process specifications from network traffic","authors":"Filipe Apolinário ,&nbsp;Nelson Escravana ,&nbsp;Éric Hervé ,&nbsp;Miguel L. Pardal ,&nbsp;Miguel Correia","doi":"10.1016/j.ijcip.2024.100725","DOIUrl":"10.1016/j.ijcip.2024.100725","url":null,"abstract":"<div><div>Critical infrastructures (CIs) are often targets of cyber-attacks, requiring accurate process specifications to identify and defend against incidents. However, discrepancies between these specifications and real-world CI conditions arise due to the costly process of manual specification by experts.</div><div>This paper introduces <span>FingerCI</span>, a method for automatically generating CI process specifications through network traffic analysis and physical behavior modeling. By defining a Specification Language that integrates with existing systems, <span>FingerCI</span> extracts industrial process specifications without infrastructure changes or downtime. The specifications include a behavior model that validates physical correctness.</div><div>We evaluated <span>FingerCI</span> on a digital twin of an airport baggage handling system, achieving 99.98% fitness to observed behavior. Our method improves cybersecurity and fault detection with high accuracy.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"47 ","pages":"Article 100725"},"PeriodicalIF":4.1,"publicationDate":"2024-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142703044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Space cybersecurity challenges, mitigation techniques, anticipated readiness, and future directions 空间网络安全挑战、缓解技术、预期准备情况和未来方向
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-13 DOI: 10.1016/j.ijcip.2024.100724
Shah Khalid Khan , Nirajan Shiwakoti , Abebe Diro , Alemayehu Molla , Iqbal Gondal , Matthew Warren
Space Cybersecurity (SC) is becoming critical due to the essential role of space in global critical infrastructure – enabling communication, safe air travel, maritime trade, weather monitoring, environmental surveillance, financial services, and defence systems. Simultaneously, involving diverse stakeholders in space operations further amplifies this criticality. Similarly, previous research has identified isolated vulnerabilities in SC and proposed individual solutions to mitigate them. While such studies have provided useful insights, they do not offer a comprehensive analysis of space cyber-attack vectors and a critical evaluation of the effectiveness of mitigation strategies. This study addresses this problem by holistically examining the scope of potential space cyber-attack vectors, encompassing the ground, space, user, cloud, communication channels, and supply chain segments. Furthermore, the study evaluates the effectiveness of legacy security controls and frameworks and outlines SC-vector-aligned counterstrategies and mitigation techniques to tackle the unique SC threats. Based on the analysis, the study proposes future research directions to develop and test advanced technological solutions and regulatory and operational frameworks to establish international standards policies and foster stakeholder collaboration. The study contributes a multi-disciplinary foundation and roadmap that researchers, technology developers, and decision-makers can draw on in shaping a robust and sustainable SC framework.
空间网络安全(SC)正变得至关重要,因为空间在全球关键基础设施中发挥着至关重要的作用--使通信、安全航空旅行、海上贸易、气象监测、环境监测、金融服务和防御系统成为可能。同时,让不同的利益相关者参与太空行动,进一步扩大了这种关键性。同样,以往的研究也发现了 SC 中的个别漏洞,并提出了缓解这些漏洞的个别解决方案。虽然这些研究提供了有用的见解,但它们并没有对太空网络攻击载体进行全面分析,也没有对缓解策略的有效性进行批判性评估。为解决这一问题,本研究对潜在的太空网络攻击载体范围进行了全面检查,包括地面、太空、用户、云、通信渠道和供应链等环节。此外,该研究还评估了传统安全控制和框架的有效性,并概述了与空间网络攻击载体相匹配的应对策略和缓解技术,以应对独特的空间网络攻击威胁。在分析的基础上,研究提出了未来的研究方向,以开发和测试先进的技术解决方案以及监管和运营框架,从而制定国际标准政策并促进利益相关者的合作。本研究为研究人员、技术开发人员和决策者提供了一个多学科基础和路线图,有助于他们建立一个稳健、可持续的 SC 框架。
{"title":"Space cybersecurity challenges, mitigation techniques, anticipated readiness, and future directions","authors":"Shah Khalid Khan ,&nbsp;Nirajan Shiwakoti ,&nbsp;Abebe Diro ,&nbsp;Alemayehu Molla ,&nbsp;Iqbal Gondal ,&nbsp;Matthew Warren","doi":"10.1016/j.ijcip.2024.100724","DOIUrl":"10.1016/j.ijcip.2024.100724","url":null,"abstract":"<div><div>Space Cybersecurity (SC) is becoming critical due to the essential role of space in global critical infrastructure – enabling communication, safe air travel, maritime trade, weather monitoring, environmental surveillance, financial services, and defence systems. Simultaneously, involving diverse stakeholders in space operations further amplifies this criticality. Similarly, previous research has identified isolated vulnerabilities in SC and proposed individual solutions to mitigate them. While such studies have provided useful insights, they do not offer a comprehensive analysis of space cyber-attack vectors and a critical evaluation of the effectiveness of mitigation strategies. This study addresses this problem by holistically examining the scope of potential space cyber-attack vectors, encompassing the ground, space, user, cloud, communication channels, and supply chain segments. Furthermore, the study evaluates the effectiveness of legacy security controls and frameworks and outlines SC-vector-aligned counterstrategies and mitigation techniques to tackle the unique SC threats. Based on the analysis, the study proposes future research directions to develop and test advanced technological solutions and regulatory and operational frameworks to establish international standards policies and foster stakeholder collaboration. The study contributes a multi-disciplinary foundation and roadmap that researchers, technology developers, and decision-makers can draw on in shaping a robust and sustainable SC framework.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"47 ","pages":"Article 100724"},"PeriodicalIF":4.1,"publicationDate":"2024-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142703046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A tri-level optimization model for interdependent infrastructure network resilience against compound hazard events 相互依存的基础设施网络抵御复合灾害事件的三级优化模型
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-02 DOI: 10.1016/j.ijcip.2024.100723
Matthew R. Oster , Ilya Amburg , Samrat Chatterjee , Daniel A. Eisenberg , Dennis G. Thomas , Feng Pan , Auroop R. Ganguly
Resilient operation of interdependent infrastructures against compound hazard events is essential for maintaining societal well-being. To address consequence assessment challenges in this problem space, we propose a novel tri-level optimization model applied to a proof-of-concept case study with fuel distribution and transportation networks – encompassing one realistic network; one fictitious, yet realistic network; as well as networks drawn from three synthetic distributions. Mathematically, our approach takes the form of a defender-attacker-defender (DAD) model—a multi-agent tri-level optimization, comprised of a defender, attacker, and an operator acting in sequence. Here, our notional operator may choose proxy actions to operate an interdependent system comprised of fuel terminals and gas stations (functioning as supplies) and a transportation network with traffic flow (functioning as demand) to minimize unmet demand at gas stations. A notional attacker aims to hypothetically disrupt normal operations by reducing supply at the supply terminals, and the notional defender aims to identify best proxy defense policy options which include hardening supply terminals or allowing alternative distribution methods such as trucking reserve supplies. We solve our DAD formulation at a metropolitan scale and present practical defense policy insights against hypothetical compound hazards. We demonstrate the generalizability of our framework by presenting results for a realistic network; a fictitious, yet realistic network; as well as for three networks drawn from synthetic distributions. We also analyze the sensitivity of outputs on budget constraints through a detailed case study. Additionally, we demonstrate the scalability of the framework by investigating runtime performance as a function of the network size. Steps for future research are also discussed.
相互依存的基础设施在复合灾害事件面前的弹性运行对于维护社会福祉至关重要。为了应对这一问题领域中的后果评估挑战,我们提出了一种新颖的三层优化模型,并将其应用于燃料配送和运输网络的概念验证案例研究--包括一个现实网络、一个虚构但现实的网络以及来自三个合成分布的网络。在数学上,我们的方法采用了防御者-攻击者-防御者(DAD)模型的形式--一种多代理三层优化,由依次行动的防御者、攻击者和操作者组成。在这里,我们假想的操作者可以选择代理行动来操作一个相互依存的系统,该系统由燃料终端和加油站(作为供应)以及交通流量(作为需求)组成,目的是最大限度地减少加油站未满足的需求。假想攻击者的目标是通过减少供应终端的供应来破坏正常运营,而假想防御者的目标是确定最佳代理防御政策选项,包括加固供应终端或允许采用卡车运输储备物资等替代配送方式。我们解决了大都市规模的 DAD 问题,并针对假设的复合危害提出了实用的防御政策见解。通过展示一个现实网络、一个虚构但现实的网络以及三个合成分布网络的结果,我们证明了我们的框架的通用性。我们还通过详细的案例研究分析了输出对预算限制的敏感性。此外,我们还通过研究运行时性能与网络规模的函数关系,证明了该框架的可扩展性。我们还讨论了未来的研究步骤。
{"title":"A tri-level optimization model for interdependent infrastructure network resilience against compound hazard events","authors":"Matthew R. Oster ,&nbsp;Ilya Amburg ,&nbsp;Samrat Chatterjee ,&nbsp;Daniel A. Eisenberg ,&nbsp;Dennis G. Thomas ,&nbsp;Feng Pan ,&nbsp;Auroop R. Ganguly","doi":"10.1016/j.ijcip.2024.100723","DOIUrl":"10.1016/j.ijcip.2024.100723","url":null,"abstract":"<div><div>Resilient operation of interdependent infrastructures against compound hazard events is essential for maintaining societal well-being. To address consequence assessment challenges in this problem space, we propose a novel tri-level optimization model applied to a proof-of-concept case study with fuel distribution and transportation networks – encompassing one realistic network; one fictitious, yet realistic network; as well as networks drawn from three synthetic distributions. Mathematically, our approach takes the form of a defender-attacker-defender (DAD) model—a multi-agent tri-level optimization, comprised of a defender, attacker, and an operator acting in sequence. Here, our notional operator may choose proxy actions to operate an interdependent system comprised of fuel terminals and gas stations (functioning as supplies) and a transportation network with traffic flow (functioning as demand) to minimize unmet demand at gas stations. A notional attacker aims to hypothetically disrupt normal operations by reducing supply at the supply terminals, and the notional defender aims to identify best proxy defense policy options which include hardening supply terminals or allowing alternative distribution methods such as trucking reserve supplies. We solve our DAD formulation at a metropolitan scale and present practical defense policy insights against hypothetical compound hazards. We demonstrate the generalizability of our framework by presenting results for a realistic network; a fictitious, yet realistic network; as well as for three networks drawn from synthetic distributions. We also analyze the sensitivity of outputs on budget constraints through a detailed case study. Additionally, we demonstrate the scalability of the framework by investigating runtime performance as a function of the network size. Steps for future research are also discussed.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"47 ","pages":"Article 100723"},"PeriodicalIF":4.1,"publicationDate":"2024-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142593026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Twin-assisted anomaly detection for industrial scenarios 工业场景中的数字双胞胎辅助异常检测
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-23 DOI: 10.1016/j.ijcip.2024.100721
Cristina Alcaraz, Javier Lopez
Industry 5.0 is the current industrial paradigm that inherits the technological diversity of its predecessor, Industry 4.0, but includes three priority goals: (i) resilience, (ii) sustainability and (iii) human-centeredness. Through these three goals, Industry 5.0 pursues a more far-reaching digital transformation in industrial ecosystems with high protection guarantees. However, the deployment of innovative information technologies for this new digital transformation also requires considering their implicit vulnerabilities and threats in order to avoid any negative impacts on the three Industry 5.0 goals, and to prioritize cybersecurity aspects so as to ensure acceptable protection levels. This paper, therefore, proposes a detection framework composed of a Digital Twin (DT) and machine learning algorithms for online protection, supporting the resilience that Industry 5.0 seeks. To validate the approach, this work includes several practical studies on a real industrial control testbed to demonstrate the feasibility and accuracy of the framework, taking into account a set of malicious perturbations in several critical sections of the system. The results highlight the effectiveness of the DT in complementing the anomaly detection processes, especially for advanced and stealthy threats.
工业 5.0 是当前的工业范式,它继承了其前身工业 4.0 的技术多样性,但包括三个优先目标:(i) 复原力、(ii) 可持续性和 (iii) 以人为本。通过这三个目标,工业 5.0 在工业生态系统中追求更深远的数字化转型,并提供高度的保护保障。然而,为实现这一新的数字化转型而部署创新信息技术时,也需要考虑其隐含的脆弱性和威胁,以避免对工业 5.0 的三大目标产生任何负面影响,并优先考虑网络安全方面,以确保可接受的保护水平。因此,本文提出了一个由数字孪生(DT)和机器学习算法组成的检测框架,用于在线保护,支持工业 5.0 所寻求的复原力。为了验证这种方法,这项工作包括在一个真实的工业控制测试平台上进行几项实际研究,以证明该框架的可行性和准确性,同时考虑到系统几个关键部分的一系列恶意扰动。研究结果凸显了 DT 在补充异常检测流程方面的有效性,尤其是在高级和隐蔽威胁方面。
{"title":"Digital Twin-assisted anomaly detection for industrial scenarios","authors":"Cristina Alcaraz,&nbsp;Javier Lopez","doi":"10.1016/j.ijcip.2024.100721","DOIUrl":"10.1016/j.ijcip.2024.100721","url":null,"abstract":"<div><div>Industry 5.0 is the current industrial paradigm that inherits the technological diversity of its predecessor, Industry 4.0, but includes three priority goals: (i) <em>resilience</em>, (ii) <em>sustainability</em> and (iii) <em>human-centeredness</em>. Through these three goals, Industry 5.0 pursues a more far-reaching digital transformation in industrial ecosystems with high protection guarantees. However, the deployment of innovative information technologies for this new digital transformation also requires considering their implicit vulnerabilities and threats in order to avoid any negative impacts on the three Industry 5.0 goals, and to prioritize cybersecurity aspects so as to ensure acceptable protection levels. This paper, therefore, proposes a detection framework composed of a Digital Twin (DT) and machine learning algorithms for online protection, supporting the resilience that Industry 5.0 seeks. To validate the approach, this work includes several practical studies on a real industrial control testbed to demonstrate the feasibility and accuracy of the framework, taking into account a set of malicious perturbations in several critical sections of the system. The results highlight the effectiveness of the DT in complementing the anomaly detection processes, especially for advanced and stealthy threats.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"47 ","pages":"Article 100721"},"PeriodicalIF":4.1,"publicationDate":"2024-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142551975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of Internet and mobile communication on cyber resilience: A multivariate adaptive regression spline modeling approach 互联网和移动通信对网络复原力的影响:多变量自适应回归样条线建模方法
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-18 DOI: 10.1016/j.ijcip.2024.100722
Serhiy Lyeonov , Wadim Strielkowski , Vitaliia Koibichuk , Serhii Drozd
The spread of broadband Internet and the availability of mobile communication services expand access to digital services for businesses and the public alike. However, at the same time, it aggravates the problem of ensuring digital space security, protection against cyber threats, and the fight against cybercrime. This research aims to calculate the index of a country's resilience to cyber-hacking for 143 countries, to divide these countries into groups based on this resilience (high, above-average, average, below-average, and low), compare these results with those obtained on the basis of National Cyber Security Index (NCSI), and to identify the impact of the Internet and mobile communication prevalence in a country on this level. The selection of the countries is based on the availability of statistical data for 2022 in the databases of the Surfshark VPN service, and the International Telecommunication Union. The integral index of a country's resilience to cyber-hacking is calculated through the multiplicative convolution (with weighted geometric mean) of the number of breached accounts, the Internet penetration probability (penetration into users’ data through the Internet), and the breach density per thousand users. The influence of active mobile broadband subscriptions (per 100 inhabitants), mobile broadband basket (% of Gross National Income Per Capita), mobile cellular subscriptions (per 100 inhabitants), and total fixed broadband subscriptions on the integral index of a country's resilience to cyber-hacking is investigated using multivariate adaptive regression spline. According to the calculations, France, Iceland, Montenegro, the United States, and the United Arab Emirates were the least resistant to cyber hacking in 2022. For countries with high, above-average, and below-average levels of resilience to cyber-hacking, the most relevant factor is the number of active mobile broadband subscriptions (per 100 inhabitants). For countries with an average level, it is total fixed broadband subscriptions.
宽带互联网的普及和移动通信服务的提供扩大了企业和公众获得数字服务的机会。但同时,这也加剧了确保数字空间安全、防范网络威胁和打击网络犯罪的问题。本研究旨在计算 143 个国家对网络黑客攻击的抵御能力指数,并根据这一抵御能力将这些国家分为若干组(高、高于平均水平、一般、低于平均水平和低),将这些结果与根据国家网络安全指数(NCSI)得出的结果进行比较,并确定一个国家的互联网和移动通信普及率对这一水平的影响。选择国家的依据是 Surfshark VPN 服务数据库和国际电信联盟提供的 2022 年统计数据。一个国家抵御网络黑客攻击的综合指数是通过被入侵账户数、互联网渗透率(通过互联网对用户数据的渗透)和每千名用户的入侵密度的乘法卷积(加权几何平均)计算得出的。使用多变量自适应回归样条曲线研究了活跃移动宽带用户(每百名居民)、移动宽带篮子(占人均国民总收入的百分比)、移动手机用户(每百名居民)和固定宽带用户总数对一国抵御网络黑客攻击能力综合指数的影响。根据计算结果,法国、冰岛、黑山、美国和阿拉伯联合酋长国是 2022 年抵御网络黑客攻击能力最低的国家。对于抵御网络黑客能力较高、高于平均水平和低于平均水平的国家,最相关的因素是活跃移动宽带用户数(每 100 名居民)。对于平均水平的国家,则是固定宽带用户总数。
{"title":"Impact of Internet and mobile communication on cyber resilience: A multivariate adaptive regression spline modeling approach","authors":"Serhiy Lyeonov ,&nbsp;Wadim Strielkowski ,&nbsp;Vitaliia Koibichuk ,&nbsp;Serhii Drozd","doi":"10.1016/j.ijcip.2024.100722","DOIUrl":"10.1016/j.ijcip.2024.100722","url":null,"abstract":"<div><div>The spread of broadband Internet and the availability of mobile communication services expand access to digital services for businesses and the public alike. However, at the same time, it aggravates the problem of ensuring digital space security, protection against cyber threats, and the fight against cybercrime. This research aims to calculate the index of a country's resilience to cyber-hacking for 143 countries, to divide these countries into groups based on this resilience (high, above-average, average, below-average, and low), compare these results with those obtained on the basis of National Cyber Security Index (NCSI), and to identify the impact of the Internet and mobile communication prevalence in a country on this level. The selection of the countries is based on the availability of statistical data for 2022 in the databases of the Surfshark VPN service, and the International Telecommunication Union. The integral index of a country's resilience to cyber-hacking is calculated through the multiplicative convolution (with weighted geometric mean) of the number of breached accounts, the Internet penetration probability (penetration into users’ data through the Internet), and the breach density per thousand users. The influence of active mobile broadband subscriptions (per 100 inhabitants), mobile broadband basket (% of Gross National Income Per Capita), mobile cellular subscriptions (per 100 inhabitants), and total fixed broadband subscriptions on the integral index of a country's resilience to cyber-hacking is investigated using multivariate adaptive regression spline. According to the calculations, France, Iceland, Montenegro, the United States, and the United Arab Emirates were the least resistant to cyber hacking in 2022. For countries with high, above-average, and below-average levels of resilience to cyber-hacking, the most relevant factor is the number of active mobile broadband subscriptions (per 100 inhabitants). For countries with an average level, it is total fixed broadband subscriptions.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"47 ","pages":"Article 100722"},"PeriodicalIF":4.1,"publicationDate":"2024-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142572557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SIRT: A distinctive and smart invasion recognition tool (SIRT) for defending IoT integrated ICS from cyber-attacks SIRT:一种独特的智能入侵识别工具(SIRT),用于防御物联网集成 ICS 遭受网络攻击
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-09 DOI: 10.1016/j.ijcip.2024.100720
M.S. Kavitha , G. Sumathy , B. Sarala , J. Jasmine Hephzipah , R. Dhanalakshmi , T.D. Subha
With the rise of smart industries, Industrial Control Systems (ICS) has to move from isolated settings to networked environments to meet the objectives of Industry 4.0. Because of the inherent interconnection of these services, systems of this type are more vulnerable to cybersecurity breaches. To protect ICSs from cyberattacks, intrusion detection systems equipped with Artificial Intelligence characteristics have been used to spot unusual system behavior. The main research problem focused on this work is to guarantee ICS security, a variety of security strategies and automated technologies have been established in past literary works. However, the main problems they face include a high proportion of incorrect predictions, longer execution times, more complex system designs, and decreased efficiency. Thus, developing and putting in place a Smart Invasion Recognition Tool (SIRT) to defend critical infrastructure systems against new cyberattacks is the main goal of this project. This system cleans and normalizes the supplied ICS data using a unique preprocessing technique called Variational Data Normalization (VDN). Furthermore, a novel hybrid technique called Frog Leap-based Ant Movement Optimization (FLAMO) is applied to choose the most important and necessary features from normalized industrial data. Furthermore, the methodology of Weighted Bi-directional Gated Recurrent Network (WeBi-GRN) is utilized to precisely distinguish between genuine and malicious samples from information collected by ICS. This work validates and evaluates the performance findings using many assessment indicators and a range of open-source ICS data. According to the study's findings, the proposed SIRT model accurately classifies the different types of assaults from the industrial data with 99 % accuracy.
随着智能工业的兴起,工业控制系统(ICS)必须从孤立的设置转向联网环境,以实现工业 4.0 的目标。由于这些服务之间固有的相互联系,这类系统更容易受到网络安全漏洞的攻击。为了保护 ICS 免受网络攻击,具备人工智能特征的入侵检测系统被用来发现系统的异常行为。这项工作关注的主要研究问题是如何保障 ICS 的安全,在过去的文学作品中已经建立了各种安全策略和自动化技术。然而,它们面临的主要问题包括错误预测比例高、执行时间长、系统设计更复杂以及效率降低。因此,开发智能入侵识别工具(SIRT)并将其投入使用,以保护关键基础设施系统免受新的网络攻击,是本项目的主要目标。该系统采用一种名为变异数据归一化(VDN)的独特预处理技术,对提供的 ICS 数据进行清理和归一化处理。此外,还采用了一种名为 "基于蛙跳的蚂蚁运动优化(FLAMO)"的新型混合技术,从规范化的工业数据中选择最重要和最必要的特征。此外,还利用加权双向门控递归网络(WeBi-GRN)方法,从 ICS 收集的信息中精确区分真实样本和恶意样本。这项工作利用许多评估指标和一系列开源 ICS 数据对性能结论进行了验证和评估。研究结果表明,所提出的 SIRT 模型能从工业数据中准确地对不同类型的攻击进行分类,准确率高达 99%。
{"title":"SIRT: A distinctive and smart invasion recognition tool (SIRT) for defending IoT integrated ICS from cyber-attacks","authors":"M.S. Kavitha ,&nbsp;G. Sumathy ,&nbsp;B. Sarala ,&nbsp;J. Jasmine Hephzipah ,&nbsp;R. Dhanalakshmi ,&nbsp;T.D. Subha","doi":"10.1016/j.ijcip.2024.100720","DOIUrl":"10.1016/j.ijcip.2024.100720","url":null,"abstract":"<div><div>With the rise of smart industries, Industrial Control Systems (ICS) has to move from isolated settings to networked environments to meet the objectives of Industry 4.0. Because of the inherent interconnection of these services, systems of this type are more vulnerable to cybersecurity breaches. To protect ICSs from cyberattacks, intrusion detection systems equipped with Artificial Intelligence characteristics have been used to spot unusual system behavior. The main research problem focused on this work is to guarantee ICS security, a variety of security strategies and automated technologies have been established in past literary works. However, the main problems they face include a high proportion of incorrect predictions, longer execution times, more complex system designs, and decreased efficiency. Thus, developing and putting in place a Smart Invasion Recognition Tool (SIRT) to defend critical infrastructure systems against new cyberattacks is the main goal of this project. This system cleans and normalizes the supplied ICS data using a unique preprocessing technique called Variational Data Normalization (VDN). Furthermore, a novel hybrid technique called Frog Leap-based Ant Movement Optimization (FLAMO) is applied to choose the most important and necessary features from normalized industrial data. Furthermore, the methodology of Weighted Bi-directional Gated Recurrent Network (WeBi-GRN) is utilized to precisely distinguish between genuine and malicious samples from information collected by ICS. This work validates and evaluates the performance findings using many assessment indicators and a range of open-source ICS data. According to the study's findings, the proposed SIRT model accurately classifies the different types of assaults from the industrial data with 99 % accuracy.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"47 ","pages":"Article 100720"},"PeriodicalIF":4.1,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142526135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Critical Infrastructure Protection
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1