Cyber-Security Incidents: A Review Cases In Cyber-Physical Systems

作者: Mohammed Nasser , Rabiah Ahmad , Warusia Yassin , Aslinda Hassan , Zaheera Zainal

DOI: 10.14569/IJACSA.2018.090169

关键词:

摘要: Cyber-Physical Systems refer to systems that have an interaction between computers, communication channels and physical devices solve a real-world problem. Towards industry 4.0 revolution, currently become one of the main targets hackers any damage them lead high losses nation. According valid resources, several cases reported involved security breaches on Systems. Understanding fundamental theoretical concept in digital world was discussed worldwide. Yet, regard cyber-physical system are still remaining less explored. In addition, limited tools were introduced overcome problems System. To improve understanding introduce lot more solutions for system, study this matter is highly demand. paper, we investigate current threats propose classification matrix these threats, conduct simple statistical analysis collected data using quantitative approach. We confirmed four components i.e., (the type attack, impact, intention incident categories) contributor threat taxonomy

参考文章(22)
Keith B Alexander, Warfighting in Cyberspace ,(2007)
Robson de Oliveira Albuquerque, Luis Javier García Villalba, Ana Lucila Sandoval Orozco, Rafael Timóteo de Sousa Júnior, Tai-Hoon Kim, Leveraging information security and computational trust for cybersecurity The Journal of Supercomputing. ,vol. 72, pp. 3729- 3763 ,(2016) , 10.1007/S11227-015-1543-4
Clive Blackwell, A security ontology for incident analysis cyber security and information intelligence research workshop. pp. 46- ,(2010) , 10.1145/1852666.1852717
Chee-Wooi Ten, Chen-Ching Liu, Govindarasu Manimaran, Vulnerability Assessment of Cybersecurity for SCADA Systems IEEE Transactions on Power Systems. ,vol. 23, pp. 1836- 1846 ,(2008) , 10.1109/TPWRS.2008.2002298
Siddharth Sridhar, Adam Hahn, Manimaran Govindarasu, Cyber–Physical System Security for the Electric Power Grid Proceedings of the IEEE. ,vol. 100, pp. 210- 224 ,(2012) , 10.1109/JPROC.2011.2165269
Bill Miller, Dale Rowe, A survey SCADA of and critical infrastructure incidents Proceedings of the 1st Annual conference on Research in information technology - RIIT '12. pp. 51- 56 ,(2012) , 10.1145/2380790.2380805
Simon Hansman, Ray Hunt, A taxonomy of network and computer attacks Computers & Security. ,vol. 24, pp. 31- 43 ,(2005) , 10.1016/J.COSE.2004.06.011
Brady W. O'Hanlon, Mark L. Psiaki, Jahshan A. Bhatti, Daniel P. Shepard, Todd E. Humphreys, Real‐Time GPS Spoofing Detection via Correlation of Encrypted Signals Annual of Navigation. ,vol. 60, pp. 267- 278 ,(2013) , 10.1002/NAVI.44
Scott D. Applegate, The dawn of Kinetic Cyber international conference on cyber conflict. pp. 1- 15 ,(2013)