Abstract
AbstractAdoption of information and communication technologies (ICT) in railway has improved the reliability, maintainability, operational efficiency, capacity as well as the comfort of passengers. This adoption introduces new vulnerabilities and entry points for hackers to launch attacks. Advanced cybersecurity threats with automated capabilities are increasing in such sectors as finance, health, grid, retail, government, telecommunications, transportation, etc. These cyber threats are also increasing in railways and, therefore, it needs for cybersecurity measures to predict, detect and respond these threats. The cyber kill chain (CKC) model is a widely used model to detect cyber-attacks and it consists of seven stages/chains; breaking the chain at an early stage will help the defender stop the adversary’s malicious actions. Due to lack of real cybersecurity data, this research simulates cyber-attacks to calculate the attack penetration probabilities at each stage of the cyber kill chain model. The objective of this research is to predict cyber-attack penetrations by implementing various security controls using modeling and simulation. This research is an extension of developed railway defender kill chain which provides security controls at each stage of CKC for railway organizations to minimize the risk of cyber threats.
Publisher
Springer Science and Business Media LLC
Subject
Strategy and Management,Safety, Risk, Reliability and Quality
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Cyber-Physical Power and Energy Systems with Wireless Sensor Networks: A Systematic Review;Journal of Electrical Engineering & Technology;2023-04-03
2. Towards AI-powered Cybersecurity Attack Modeling with Simulation Tools: Review of Attack Simulators;Advances on P2P, Parallel, Grid, Cloud and Internet Computing;2022-10-18
3. A review on cybersecurity in railways;Proceedings of the Institution of Mechanical Engineers, Part F: Journal of Rail and Rapid Transit;2022-04-26
4. A new approach for business process reconfiguration under uncertainty using Dempster-Shafer Theory;International Journal of Systems Science: Operations & Logistics;2022-02-04