Estimating economic losses from cyber-attacks on shipping ports: An optimization-based approach

被引:14
|
作者
Weaver, Gabriel A. [1 ]
Feddersen, Brett [1 ]
Marla, Lavanya [1 ]
Wei, Dan [2 ]
Rose, Adam [2 ]
Van Moer, Mark [1 ]
机构
[1] Univ Illinois, Champaign, IL 61820 USA
[2] Univ Southern Calif, Los Angeles, CA USA
关键词
Optimization; Cybersecurity; Critical infrastructure; Transportation; Ports; CONSEQUENCES; DESIGN; TIME;
D O I
10.1016/j.trc.2021.103423
中图分类号
U [交通运输];
学科分类号
08 ; 0823 ;
摘要
The Maritime Transportation System (MTS) accounts for more than 80% of global merchandise trade in volume and roughly one-sixth of the Total Gross Output of the United States. Given that national and global economies depend upon efficient supply chains, port stakeholders must develop security plans to respond to all hazards, natural and manmade. Given recent cyber-attacks affecting shipping ports, along with the multi-billion dollar cyber insurance gap, ports need to understand the tradeoffs between increased competitiveness and higher risk through investment in automation and advanced logistics technologies. This article addresses the need to understand the economic impact of cyber-attacks that affect shipping port operations and thereby enable risk assessments that holistically evaluate interactions among port Information Technology (IT) and Operational Technology (OT) systems. Using a Nearly-Orthogonal Latin Hypercube (NOLH) experimental design, we construct transportation disruption profiles based on actual cyber-attacks that specify the range of operational effects of IT/OT dependencies on stakeholder transportation assets. To capture the costs of the physical disruption, we extend Boland et al's Dynamic Discretization Discovery (DDD) algorithm to capture capacity constraints and enable delay modeling to accommodate commodities arriving late due to disruption. Economic loss functions for seven commodity categories based on the willingness to pay literature are used to compute delay costs so that stakeholders can estimate the range of economic and operational impacts within a disruption profile. Results based on data for cyber-attacks on landlord port and terminal operator assets provided by Port Everglades, FL illustrate impacts at $80,000 and $1.2M on average during one week in October 2017 and at $141,000 and $2.8M for May 2017 respectively. The runtime performance of our enhanced DDD algorithm improves on the state of the art by an order of magnitude and on larger problem sizes based on real-world port networks.
引用
收藏
页数:29
相关论文
共 9 条
  • [1] Integrated protection of industrial control systems from cyber-attacks: the ATENA approach
    Adamsky, F.
    Aubigny, M.
    Battisti, F.
    Carli, M.
    Cimorelli, F.
    Cruz, T.
    Di Giorgio, A.
    Foglietta, C.
    Galli, A.
    Giuseppi, A.
    Liberati, F.
    Neri, A.
    Panzieri, S.
    Pascucci, F.
    Proenca, J.
    Pucci, P.
    Rosa, L.
    Soua, R.
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2018, 21 : 72 - 82
  • [2] Detection of Covert Cyber-Attacks in Interconnected Systems: A Distributed Model-Based Approach
    Barboni, Angelo
    Rezaee, Hamed
    Boem, Francesca
    Parisini, Thomas
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2020, 65 (09) : 3728 - 3741
  • [3] Context Infusion in Semantic Link Networks to Detect Cyber-attacks: A Flow-based Detection Approach
    AlEroud, Ahmed
    Karabatis, George
    2014 IEEE INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING (ICSC), 2014, : 175 - 182
  • [4] Hybrid deep architecture for intrusion detection in cyber-physical system: An optimization-based approach
    Arumugam, Sajeev Ram
    Paul, P. Mano
    Issac, Berin Jeba Jingle
    Ananth, J. P.
    INTERNATIONAL JOURNAL OF ADAPTIVE CONTROL AND SIGNAL PROCESSING, 2024, 38 (09) : 3016 - 3039
  • [5] Evading Cyber-Attacks on Hadoop Ecosystem: A Novel Machine Learning-Based Security-Centric Approach towards Big Data Cloud
    Sharma, Neeraj A.
    Kumar, Kunal
    Khorshed, Tanzim
    Ali, A. B. M. Shawkat
    Khalid, Haris M.
    Muyeen, S. M.
    Jose, Linju
    INFORMATION, 2024, 15 (09)
  • [6] Distributed Deep Neural-Network-Based Middleware for Cyber-Attacks Detection in Smart IoT Ecosystem: A Novel Framework and Performance Evaluation Approach
    Bhandari, Guru
    Lyth, Andreas
    Shalaginov, Andrii
    Gronli, Tor-Morten
    ELECTRONICS, 2023, 12 (02)
  • [7] Electrofuel Synthesis from Variable Renewable Electricity: An Optimization-Based Techno-Economic Analysis
    Sherwin, Evan D.
    ENVIRONMENTAL SCIENCE & TECHNOLOGY, 2021, 55 (11) : 7583 - 7594
  • [8] Two-Phase Optimization Models for Liner Shipping Network Based on Hub Ports Cooperation: From the Perspective of Supply-Side Reform in China
    Zhou, Jingmiao
    Zhao, Yuzhe
    Niu, Xingwen
    JOURNAL OF ADVANCED TRANSPORTATION, 2021, 2021
  • [9] Estimating heavy metals absorption efficiency in an aqueous solution using nanotube-type halloysite from weathered pegmatites and a novel Harris hawks optimization-based multiple layers perceptron neural network
    Bac, Bui Hoang
    Nguyen, Hoang
    Thao, Nguyen Thi Thanh
    Hanh, Vo Thi
    Duyen, Le Thi
    Dung, Nguyen Tien
    Du, Nguyen Khac
    Hiep, Nguyen Huu
    ENGINEERING WITH COMPUTERS, 2022, 38 (SUPPL 5) : 4257 - 4272