Yan Zhang, Degang Zhu, Menglin Wang, Junhan Li, Jie Zhang
{"title":"A comparative study of cyber security intrusion detection in healthcare systems","authors":"Yan Zhang, Degang Zhu, Menglin Wang, Junhan Li, Jie Zhang","doi":"10.1016/j.ijcip.2023.100658","DOIUrl":"10.1016/j.ijcip.2023.100658","url":null,"abstract":"<div><p><span><span>Due to the proliferation of network devices and the presence of sensitive information, healthcare systems have become prime targets for cyber attackers. Therefore, it is crucial to design an efficient and accurate </span>intrusion detection system<span><span> (IDS) specifically tailored for healthcare systems. In this regard, we conducted a comprehensive comparative study<span><span> on network security intrusion detection in healthcare systems. In order to tackle the challenges arising from </span>information redundancy<span> and noise in feature selection, we developed the Maximum Information Coefficient (MIC) method to effectively analyse the nonlinear relationships among traffic features. This method was utilized in a comparative analysis involving ten models on three datasets. The experiments demonstrated that the detection models using MIC-based feature selection outperformed other feature selection approaches, especially when applied to the WUSTL-EHMS-2020 dataset, which includes patients' biometric features. The MIC-enhanced </span></span></span>Extreme Gradient Boosting<span> detection model achieved remarkable results, attaining an accuracy of 95.01%, precision of 94.94%, and recall of 95.01%. These findings underscore the efficacy of our comparative study in safeguarding healthcare systems against cyber attacks<span>. Furthermore, our study highlights the importance of feature selection and the incorporation of patient biometric features in healthcare IDS. It is imperative for medical managers to consider these factors when making informed decisions regarding </span></span></span></span>cyber security measures.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"44 ","pages":"Article 100658"},"PeriodicalIF":3.6,"publicationDate":"2023-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139027911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lazaros Papadopoulos , Konstantinos Demestichas , Eva Muñoz-Navarro , Juan José Hernández-Montesinos , Stephane Paul , Nicolas Museux , Sandra König , Stefan Schauer , Alfonso Climente Alarcón , Israel Perez Llopis , Tim Stelkens-Kobsch , Tamara Hadjina , Jelena Levak
{"title":"Protection of critical infrastructures from advanced combined cyber and physical threats: The PRAETORIAN approach","authors":"Lazaros Papadopoulos , Konstantinos Demestichas , Eva Muñoz-Navarro , Juan José Hernández-Montesinos , Stephane Paul , Nicolas Museux , Sandra König , Stefan Schauer , Alfonso Climente Alarcón , Israel Perez Llopis , Tim Stelkens-Kobsch , Tamara Hadjina , Jelena Levak","doi":"10.1016/j.ijcip.2023.100657","DOIUrl":"10.1016/j.ijcip.2023.100657","url":null,"abstract":"<div><p><span>This work describes the PRAETORIAN system, an advanced framework for the protection of critical infrastructures from combined physical and cyber threats. It integrates components for detecting threats and generating alerts related with the physical and the cyber domains of Critical Infrastructures (CIs). These alerts are correlated by a hybrid situation awareness system that calculates the cascading effects<span> of the attacks. Finally, a response coordination system manages notifications and assists decision making by providing mitigation actions and sharing information with the public and relevant authorities. The PRAETORIAN system was extensively validated by a large number of end users and was demonstrated in real-world environments in terms of providing support for the detection and mitigation of physical and/or </span></span>cyber attacks in CIs.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"44 ","pages":"Article 100657"},"PeriodicalIF":3.6,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139027747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey on safeguarding critical infrastructures: Attacks, AI security, and future directions","authors":"Khushi Jatinkumar Raval , Nilesh Kumar Jadav , Tejal Rathod , Sudeep Tanwar , Vrince Vimal , Nagendar Yamsani","doi":"10.1016/j.ijcip.2023.100647","DOIUrl":"10.1016/j.ijcip.2023.100647","url":null,"abstract":"<div><p><span><span>Technologies such as artificial intelligence<span><span> (AI), blockchain, and the </span>Internet of Things (IoT) have converged in driving the next wave of digital revolution. Amalgamating the aforementioned advancements with critical infrastructure (CI) can significantly help society by offering a quality of life and boosting the nation’s economy and productivity. However, the lack of cybersecurity in CI gave rise to advanced threats and vulnerabilities that hindered the aforementioned societal benefits. In this vein, the paper provides an in-depth analysis of cyber threats and risks associated with different critical infrastructures, such as the financial, agriculture, energy, and </span></span>healthcare sectors. Further, we thoroughly investigate the staggering benefits of AI and, based on it, present an exhaustive solution taxonomy to showcase the competency of AI mechanisms in confronting cyberattacks on CI. The taxonomy specifically addresses issues like data privacy, algorithmic bias, and human-AI collaboration for CI. Further, we proposed an AI-based secure data exchange framework for smart grid CI, where we attempt to secure the sensor’s data (i.e., </span>power consumption<span>, energy readings, and network data) from malicious adversaries<span>. The proposed framework is evaluated using statistical measures, such as accuracy, training time, and receiver operating characteristic (ROC) curve, and anomaly detection. Further, the paper examines the research challenges that still adhere to the critical systems and require stringent AI-based mechanisms to tackle them.</span></span></p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"44 ","pages":"Article 100647"},"PeriodicalIF":3.6,"publicationDate":"2023-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138575674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Chance-constrained vulnerability assessment of smart water distribution systems against stealthy false data injection attacks","authors":"Nazia Raza, Faegheh Moazeni","doi":"10.1016/j.ijcip.2023.100645","DOIUrl":"10.1016/j.ijcip.2023.100645","url":null,"abstract":"<div><p><span>Smart water distribution systems (SWDSs) have not only enhanced the monitoring and control of the entire water infrastructure but have also jeopardized its security and resilience. The state-of-the-art examined the uncertainties in the water supply network to obtain optimal design parameters to ensure hydraulic integrity. However, the investigations of uncertainties in SWDSs from the cybersecurity perspective remain unexplored. To address this limitation, this paper utilizes a robust chance-constrained optimization strategy to scrutinize the vulnerable location of SWDSs against False Data Injection (FDI) attacks. This is achieved by factoring in the probabilistic behavior of water demand at junctions that can potentially facilitate stealthy FDI attacks on the hourly measurements of the pump’s flow rate. The </span>proposed nonlinear model<span> is validated with several case studies reflecting the real-world cyberattack consequences including cutoff water supply of the network, enhanced power consumption<span> of the pump, and the undesirable pressure surge in the system at strategic locations of SWDSs. As a result of the studied cases, the cyberattack consequences on the entire water supply network are obtained while highlighting the threat-prone regions of the network. This paper contributes to embedding additional security layers to the existing water infrastructure at the vulnerable links and junctions.</span></span></p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"44 ","pages":"Article 100645"},"PeriodicalIF":3.6,"publicationDate":"2023-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138493157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine learning applications in the resilience of interdependent critical infrastructure systems—A systematic literature review","authors":"Basem A. Alkhaleel","doi":"10.1016/j.ijcip.2023.100646","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100646","url":null,"abstract":"<div><p><span><span>The resilience of interdependent critical infrastructure systems (ICISs) is critical for the functioning of society and the economy. ICISs such as power grids and telecommunication networks are complex systems characterized by a wide range of interconnections, and disruptions to such systems can cause significant socioeconomic losses. This vital role requires the adaptation of new tools and technologies to improve the modeling of such complex systems and achieve the highest levels of resilience. One of the trending tools in many research fields to model complex systems is </span>machine learning (ML). In this article, a </span>systematic review<span> of the literature on ML applications in ICISs resilience is conducted, considering the protocol of Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA), to address the lack of knowledge and scattered research articles on the topic. The main objective of this systematic review is to determine the state of the art of ML applications in the area of ICISs resilience engineering by exploring the current literature. The results found were summarized and some of the future opportunities for ML in ICISs resilience applications were outlined to encourage resilience engineering communities to adapt and use ML for various ICISs applications and to utilize its potential.</span></p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"44 ","pages":"Article 100646"},"PeriodicalIF":3.6,"publicationDate":"2023-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138490153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Matthew J. Maier , Hunter S. Hayden , Michael A. Temple , Matthew C. Fickus
{"title":"Ensuring the longevity of WirelessHART devices in industrial automation and control systems using distinct native attribute fingerprinting","authors":"Matthew J. Maier , Hunter S. Hayden , Michael A. Temple , Matthew C. Fickus","doi":"10.1016/j.ijcip.2023.100641","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100641","url":null,"abstract":"<div><p><span>Distinct native attribute fingerprinting is considered as a means to ensure the longevity of WirelessHART communication devices used in industrial automation and control systems. The aim is for these devices to reach full life expectancy using a technical cradle-to-grave lifecycle protection strategy. The protection addressed here includes pre-deployment near-cradle counterfeit device detection using active fingerprinting<span> and operational mid-life rogue device detection using passive fingerprinting. The counterfeit and rogue device detection rates are estimated for 56 five-class </span></span>multiple discriminant analysis<span> models. Detection demonstrations include using three non-modeled devices to complete a total of 3 × 5 × 56 = 840 individual rogue and counterfeit device identity (ID) verification demonstrations. The device ID verification process uses binary accept/reject decisions with false positive outcomes used to estimate rogue and counterfeit device detection rates. For device ID verification using active fingerprints, the demonstrated counterfeit detection rate approached 99 % using only 15-of-99 available features—an approximate 85 % dimensional-reduction. Device ID verification using passive fingerprints was more challenging and the rogue detection rate approached 94 % using 120-of-243 available features—an approximate 50 % dimensional-reduction.. Collectively, the dimensionally-reduced implementations support efficiency improvement objectives required for providing near-cradle counterfeit device and mid-life operational rogue device detection in critical industrial automation and control systems.</span></p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"43 ","pages":"Article 100641"},"PeriodicalIF":3.6,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138501770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christine Heinzel, Sophie van der Heijden, Aljoscha Mayer, Nathalie Sänger, Simone Sandholz
{"title":"Need for intensive care? A socio-technical systems perspective on water supply failure preparedness in German health care facilities","authors":"Christine Heinzel, Sophie van der Heijden, Aljoscha Mayer, Nathalie Sänger, Simone Sandholz","doi":"10.1016/j.ijcip.2023.100644","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100644","url":null,"abstract":"<div><p>Health care facilities play a crucial role in the well-being of society. They are heavily dependent on other critical infrastructures including water supply for their daily operations and failure of water supply can have severe consequences. However, health care facilities are often underprepared for this scenario. The study investigates the emergency preparedness of German health care facilities to water supply failures, utilizing a socio-technical system approach. Data from interviews with experts and a survey among German hospitals were evaluated to determine the social and technical preparedness measures, in order to identify barriers and potential approaches for solutions. The findings show that there are still many gaps and needs for improvement. In particular, the social components of emergency preparedness are often given insufficient attention, with a lack of awareness about vulnerabilities to water failures being a shortcoming. The results were used to develop a framework linking social and technical components of critical infrastructure systems. The framework demonstrates that although the technical infrastructure components form the basis of preparedness, preparedness levels depend on the functioning of social infrastructure. The results underline the necessity of understanding the interlinkages between social and technical components, which can help identify potential vulnerabilities to infrastructure failures and risks. The study highlights the urgent need to comprehend health care facilities as socio-technical systems.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"44 ","pages":"Article 100644"},"PeriodicalIF":3.6,"publicationDate":"2023-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1874548223000574/pdfft?md5=2e00abbc51028cb953a39bf3ca556a68&pid=1-s2.0-S1874548223000574-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138484492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An exploratory analysis of the last frontier: A systematic literature review of cybersecurity in space","authors":"Georgios Kavallieratos, Sokratis Katsikas","doi":"10.1016/j.ijcip.2023.100640","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100640","url":null,"abstract":"<div><p>Nowadays, assets in space are vital for the provision of critical societal functions such as transportation, communication, production and supply of food, agriculture, etc. The increasing adoption of services provided by assets in space in our every day life, as well as the high dependence on cyberphysical systems, the increased interconnection and the commercialization of space increase the attack surface and poses significant cybersecurity risks to the space infrastructure; several cybersecurity incidents have already threatened assets in space. This work systematically reviews existing studies on the cybersecurity of the space infrastructure, analyzes the main results of each work, organizes and systematizes the current knowledge in the field, and proposes future research directions towards improving the cybersecurity posture of assets in space.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"43 ","pages":"Article 100640"},"PeriodicalIF":3.6,"publicationDate":"2023-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138328440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A systematic co-engineering of safety and security analysis in requirements engineering process","authors":"Sejin Jung , Junbeom Yoo , Sam Malek","doi":"10.1016/j.ijcip.2023.100642","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100642","url":null,"abstract":"<div><p><span>Co-engineering safety and security is increasingly important in safety-critical systems as more diverse interacting functions are implemented in software. Many studies have tried to perform safety and security analyses in unified or in parallel. While the unified approach requires more complex analysis with new delicate methods, the parallel needs further improvement on additional integration activity for harmonizing safety and security analyses results. This paper tries to improve the harmonization activity seamlessly and systematically in typical requirements engineering<span> process for safety-critical systems. It encompasses both requirements elicitation and analysis as well as safety and security analyses, regardless of which analysis techniques are used. The paper suggests performing an appropriate safety analysis first to derive safety requirements as summary information. It then performs goal-tree analysis to refine the high-level safety requirements into lower-level ones, from which any security analysis can work on to derive security requirements. Another goal-tree analysis then tries to refine the high-level security requirements into specific functional ones too, and it ends the analysis activity in a cycle of requirements engineering process. The sequence of safety analysis, goal-tree refinement, security analysis and another goal-tree refinement is seamlessly iterated in the process of requirements engineering, where any conflict of requirements will have an opportunity to be resolved. Our case study of a simplified </span></span>UAV example uses STPA and STRIDE techniques for safety and security analysis respectively, and shows that the proposed approach is fully applicable up to industrial cases.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"43 ","pages":"Article 100642"},"PeriodicalIF":3.6,"publicationDate":"2023-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138413640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}