Cargando…

Predicting Cybersecurity Threats in Critical Infrastructure for Industry 4.0: A Proactive Approach Based on Attacker Motivations

In Industry 4.0, manufacturing and critical systems require high levels of flexibility and resilience for dynamic outcomes. Industrial Control Systems (ICS), specifically Supervisory Control and Data Acquisition (SCADA) systems, are commonly used for operation and control of Critical Infrastructure...

Descripción completa

Detalles Bibliográficos
Autores principales: Alqudhaibi, Adel, Albarrak, Majed, Aloseel, Abdulmohsan, Jagtap, Sandeep, Salonitis, Konstantinos
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10181696/
https://www.ncbi.nlm.nih.gov/pubmed/37177743
http://dx.doi.org/10.3390/s23094539
_version_ 1785041636466622464
author Alqudhaibi, Adel
Albarrak, Majed
Aloseel, Abdulmohsan
Jagtap, Sandeep
Salonitis, Konstantinos
author_facet Alqudhaibi, Adel
Albarrak, Majed
Aloseel, Abdulmohsan
Jagtap, Sandeep
Salonitis, Konstantinos
author_sort Alqudhaibi, Adel
collection PubMed
description In Industry 4.0, manufacturing and critical systems require high levels of flexibility and resilience for dynamic outcomes. Industrial Control Systems (ICS), specifically Supervisory Control and Data Acquisition (SCADA) systems, are commonly used for operation and control of Critical Infrastructure (CI). However, due to the lack of security controls, standards, and proactive security measures in the design of these systems, they have security risks and vulnerabilities. Therefore, efficient and effective security solutions are needed to secure the conjunction between CI and I4.0 applications. This paper predicts potential cyberattacks and threats against CI systems by considering attacker motivations and using machine learning models. The approach presents a novel cybersecurity prediction technique that forecasts potential attack methods, depending on specific CI and attacker motivations. The proposed model’s accuracy in terms of False Positive Rate (FPR) reached 66% with the trained and test datasets. This proactive approach predicts potential attack methods based on specific CI and attacker motivations, and doubling the trained data sets will improve the accuracy of the proposed model in the future.
format Online
Article
Text
id pubmed-10181696
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-101816962023-05-13 Predicting Cybersecurity Threats in Critical Infrastructure for Industry 4.0: A Proactive Approach Based on Attacker Motivations Alqudhaibi, Adel Albarrak, Majed Aloseel, Abdulmohsan Jagtap, Sandeep Salonitis, Konstantinos Sensors (Basel) Article In Industry 4.0, manufacturing and critical systems require high levels of flexibility and resilience for dynamic outcomes. Industrial Control Systems (ICS), specifically Supervisory Control and Data Acquisition (SCADA) systems, are commonly used for operation and control of Critical Infrastructure (CI). However, due to the lack of security controls, standards, and proactive security measures in the design of these systems, they have security risks and vulnerabilities. Therefore, efficient and effective security solutions are needed to secure the conjunction between CI and I4.0 applications. This paper predicts potential cyberattacks and threats against CI systems by considering attacker motivations and using machine learning models. The approach presents a novel cybersecurity prediction technique that forecasts potential attack methods, depending on specific CI and attacker motivations. The proposed model’s accuracy in terms of False Positive Rate (FPR) reached 66% with the trained and test datasets. This proactive approach predicts potential attack methods based on specific CI and attacker motivations, and doubling the trained data sets will improve the accuracy of the proposed model in the future. MDPI 2023-05-06 /pmc/articles/PMC10181696/ /pubmed/37177743 http://dx.doi.org/10.3390/s23094539 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Alqudhaibi, Adel
Albarrak, Majed
Aloseel, Abdulmohsan
Jagtap, Sandeep
Salonitis, Konstantinos
Predicting Cybersecurity Threats in Critical Infrastructure for Industry 4.0: A Proactive Approach Based on Attacker Motivations
title Predicting Cybersecurity Threats in Critical Infrastructure for Industry 4.0: A Proactive Approach Based on Attacker Motivations
title_full Predicting Cybersecurity Threats in Critical Infrastructure for Industry 4.0: A Proactive Approach Based on Attacker Motivations
title_fullStr Predicting Cybersecurity Threats in Critical Infrastructure for Industry 4.0: A Proactive Approach Based on Attacker Motivations
title_full_unstemmed Predicting Cybersecurity Threats in Critical Infrastructure for Industry 4.0: A Proactive Approach Based on Attacker Motivations
title_short Predicting Cybersecurity Threats in Critical Infrastructure for Industry 4.0: A Proactive Approach Based on Attacker Motivations
title_sort predicting cybersecurity threats in critical infrastructure for industry 4.0: a proactive approach based on attacker motivations
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10181696/
https://www.ncbi.nlm.nih.gov/pubmed/37177743
http://dx.doi.org/10.3390/s23094539
work_keys_str_mv AT alqudhaibiadel predictingcybersecuritythreatsincriticalinfrastructureforindustry40aproactiveapproachbasedonattackermotivations
AT albarrakmajed predictingcybersecuritythreatsincriticalinfrastructureforindustry40aproactiveapproachbasedonattackermotivations
AT aloseelabdulmohsan predictingcybersecuritythreatsincriticalinfrastructureforindustry40aproactiveapproachbasedonattackermotivations
AT jagtapsandeep predictingcybersecuritythreatsincriticalinfrastructureforindustry40aproactiveapproachbasedonattackermotivations
AT salonitiskonstantinos predictingcybersecuritythreatsincriticalinfrastructureforindustry40aproactiveapproachbasedonattackermotivations