A classification of cybersecurity strategies in the context of Discrete Event Systems

IF 7.3 2区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS
Samuel Oliveira , André B. Leal , Marcelo Teixeira , Yuri K. Lopes
{"title":"A classification of cybersecurity strategies in the context of Discrete Event Systems","authors":"Samuel Oliveira ,&nbsp;André B. Leal ,&nbsp;Marcelo Teixeira ,&nbsp;Yuri K. Lopes","doi":"10.1016/j.arcontrol.2023.100907","DOIUrl":null,"url":null,"abstract":"<div><p>In recent years, cybersecurity has received increasing attention due to the demand from a large class of networked systems for resilience against cyberattacks that may compromise privacy, integrity and availability. Many of these systems are abstracted as Discrete Event Systems (DES) as their evolution occurs through the occurrence of discrete events. Since they use communication networks and consequently may be vulnerable to attacks, cybersecurity must be considered in DES. Based on this challenging scenario, this work focuses on cybersecurity strategies in the context of DES. A systematic literature mapping (SLM) was carried out, which selected 208 papers on the aforementioned topic. These papers were analyzed and categorized regarding the characteristics of each cybersecurity strategy, the types of attacks considered and also the modeling formalism used. The primary objective of this work is to collect all relevant research in the literature to provide the state of the art on cybersecurity strategies for DES, as well as identify research trends and directions for future work on the topic. The results show that the majority of the selected papers present cybersecurity methods based on the strategy of protecting systems against passive attacks, using automata as the modeling formalism. In contrast, the topic of active attacks has gained attention in recent years, with an increasing number of papers published in several journals and conferences. Finally, research gaps and challenges are presented to provide future directions in the domain of the cybersecurity of DES.</p></div>","PeriodicalId":50750,"journal":{"name":"Annual Reviews in Control","volume":"56 ","pages":"Article 100907"},"PeriodicalIF":7.3000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Annual Reviews in Control","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1367578823000718","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

In recent years, cybersecurity has received increasing attention due to the demand from a large class of networked systems for resilience against cyberattacks that may compromise privacy, integrity and availability. Many of these systems are abstracted as Discrete Event Systems (DES) as their evolution occurs through the occurrence of discrete events. Since they use communication networks and consequently may be vulnerable to attacks, cybersecurity must be considered in DES. Based on this challenging scenario, this work focuses on cybersecurity strategies in the context of DES. A systematic literature mapping (SLM) was carried out, which selected 208 papers on the aforementioned topic. These papers were analyzed and categorized regarding the characteristics of each cybersecurity strategy, the types of attacks considered and also the modeling formalism used. The primary objective of this work is to collect all relevant research in the literature to provide the state of the art on cybersecurity strategies for DES, as well as identify research trends and directions for future work on the topic. The results show that the majority of the selected papers present cybersecurity methods based on the strategy of protecting systems against passive attacks, using automata as the modeling formalism. In contrast, the topic of active attacks has gained attention in recent years, with an increasing number of papers published in several journals and conferences. Finally, research gaps and challenges are presented to provide future directions in the domain of the cybersecurity of DES.

Abstract Image

离散事件系统背景下的网络安全策略分类
近年来,由于一大类网络系统对可能损害隐私、完整性和可用性的网络攻击的抵御能力的需求,网络安全受到了越来越多的关注。这些系统中的许多都被抽象为离散事件系统(DES),因为它们的进化是通过离散事件的发生而发生的。由于它们使用通信网络,因此可能容易受到攻击,因此必须在DES中考虑网络安全。基于这一具有挑战性的场景,本工作重点关注DES背景下的网络安全策略。进行了一次系统的文献测绘,选择了208篇关于上述主题的论文。这些论文根据每种网络安全策略的特点、考虑的攻击类型以及使用的建模形式进行了分析和分类。这项工作的主要目标是收集文献中的所有相关研究,以提供DES网络安全策略的最新技术,并确定该主题未来工作的研究趋势和方向。结果表明,大多数被选中的论文都提出了基于保护系统免受被动攻击策略的网络安全方法,使用自动机作为建模形式。相比之下,近年来,主动攻击的话题引起了人们的关注,在一些期刊和会议上发表的论文越来越多。最后,提出了DES网络安全领域的研究空白和挑战,以提供未来的方向。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Annual Reviews in Control
Annual Reviews in Control 工程技术-自动化与控制系统
CiteScore
19.00
自引率
2.10%
发文量
53
审稿时长
36 days
期刊介绍: The field of Control is changing very fast now with technology-driven “societal grand challenges” and with the deployment of new digital technologies. The aim of Annual Reviews in Control is to provide comprehensive and visionary views of the field of Control, by publishing the following types of review articles: Survey Article: Review papers on main methodologies or technical advances adding considerable technical value to the state of the art. Note that papers which purely rely on mechanistic searches and lack comprehensive analysis providing a clear contribution to the field will be rejected. Vision Article: Cutting-edge and emerging topics with visionary perspective on the future of the field or how it will bridge multiple disciplines, and Tutorial research Article: Fundamental guides for future studies.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信