Affiliation:
1. Department of Electrical and Computer Engineering, Florida International University, Miami, FL 33174, USA
2. Department of Computer Science, Utah Valley University, Orem, UT 84058, USA
Abstract
Several critical infrastructures are integrating information technology into their operations, and as a result, the cyber attack surface extends over a broad range of these infrastructures. Cyber attacks have been a serious problem for industries since the early 2000s, causing significant interruptions to their ability to produce goods or offer services to their clients. The thriving cybercrime economy encompasses money laundering, black markets, and attacks on cyber-physical systems that result in service disruptions. Furthermore, extensive data breaches have compromised the personally identifiable information of millions of people. This paper aims to summarize some of the major cyber attacks that have occurred in the past 20 years against critical infrastructures. These data are gathered in order to analyze the types of cyber attacks, their consequences, vulnerabilities, as well as the victims and attackers. Cybersecurity standards and tools are tabulated in this paper in order to address this issue. This paper also provides an estimate of the number of major cyber attacks that will occur on critical infrastructure in the future. This estimate predicts a significant increase in such incidents worldwide over the next five years. Based on the study’s findings, it is estimated that over the next 5 years, 1100 major cyber attacks will occur on critical infrastructures worldwide, each causing more than USD 1 million in damages.
Subject
Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry
Reference87 articles.
1. The 2015 Ukraine Blackout: Implications for False Data Injection Attacks;Liang;IEEE Trans. Power Syst.,2017
2. Denial of service attack and defense method on load frequency control system;Li;J. Frankl. Inst.,2019
3. Kumar, S., Kumar, H., and Gunnam, G.R. (2019, January 28–30). Security Integrity of Data Collection from Smart Electric Meter under a Cyber Attack. Proceedings of the 2019 2nd International Conference on Data Intelligence and Security (ICDIS), Island, TX, USA.
4. Wei, L., Sundararajan, A., Sarwat, A.I., Biswas, S., and Ibrahim, E. (2017, January 18–22). A distributed intelligent framework for electricity theft detection using benford’s law and stackelberg game. Proceedings of the 2017 Resilience Week (RWS), Wilmington, DE, USA.
5. Systematically Understanding the Cyber Attack Business: A Survey;Huang;ACM Comput. Surv.,2018
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献