Predicting Cybersecurity Threats in Critical Infrastructure for Industry 4.0: A Proactive Approach Based on Attacker Motivations

被引:18
作者
Alqudhaibi, Adel [1 ]
Albarrak, Majed [2 ]
Aloseel, Abdulmohsan [1 ]
Jagtap, Sandeep [1 ]
Salonitis, Konstantinos [1 ]
机构
[1] Cranfield Univ, Sch Aerosp Transport & Mfg SATM, Cranfield MK43 0AL, England
[2] Syracuse Univ, Sch Informat Studies, Syracuse, NY 13244 USA
关键词
critical infrastructure; cyberattack; cybersecurity; cyberthreats; cyber-physical security; ICS security; industry; 4.0; motivation; predict; SCADA security;
D O I
10.3390/s23094539
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
In Industry 4.0, manufacturing and critical systems require high levels of flexibility and resilience for dynamic outcomes. Industrial Control Systems (ICS), specifically Supervisory Control and Data Acquisition (SCADA) systems, are commonly used for operation and control of Critical Infrastructure (CI). However, due to the lack of security controls, standards, and proactive security measures in the design of these systems, they have security risks and vulnerabilities. Therefore, efficient and effective security solutions are needed to secure the conjunction between CI and I4.0 applications. This paper predicts potential cyberattacks and threats against CI systems by considering attacker motivations and using machine learning models. The approach presents a novel cybersecurity prediction technique that forecasts potential attack methods, depending on specific CI and attacker motivations. The proposed model's accuracy in terms of False Positive Rate (FPR) reached 66% with the trained and test datasets. This proactive approach predicts potential attack methods based on specific CI and attacker motivations, and doubling the trained data sets will improve the accuracy of the proposed model in the future.
引用
收藏
页数:17
相关论文
共 46 条
[1]  
Almanei M, 2021, P 18 INT C MANUFACTU
[2]   Analytical Review of Cybersecurity for Embedded Systems [J].
Aloseel, Abdulmohsan ;
He, Hongmei ;
Shaw, Carl ;
Khan, Muhammad Ali .
IEEE ACCESS, 2021, 9 :961-982
[3]  
Alqudhaibi A., 2022, P 19 INT C MANUFACTU, P10, DOI [10.3233/atde220599, DOI 10.3233/ATDE220599]
[4]  
[Anonymous], 2006, SIGNIFICANT CYBER IN
[5]  
[Anonymous], 2019, [No title captured]
[6]  
[Anonymous], 2020, Mcafee
[7]  
[Anonymous], 2014, INTELLIGENT COMPUTIN, DOI DOI 10.1007/978-81-322-2012-1_26
[8]   Predicting Malicious Intention in CPS under Cyber-Attack [J].
Bezzo, Nicola .
2018 9TH ACM/IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS (ICCPS 2018), 2018, :351-352
[9]  
Brownlee J., 2016, Machine Learning Mastery, V1
[10]  
Commission of The European Communities, 2005, GREEN PAP EUR PROGR, VVolume 53, P1689