Cargando…

Cyber-Attacks Risk Analysis Method for Different Levels of Automation of Mining Processes in Mines Based on Fuzzy Theory Use

The rising automation level and development of the Industry 4.0 concept in the mining sector increase the risk of cyber-attacks. As a result, this article focuses on developing a risk analysis method that integrates Kaplan’s and Garrick’s approach and fuzzy theory. The proposed approach takes into a...

Descripción completa

Detalles Bibliográficos
Autores principales: Tubis, Agnieszka A., Werbińska-Wojciechowska, Sylwia, Góralczyk, Mateusz, Wróblewski, Adam, Ziętek, Bartłomiej
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7766562/
https://www.ncbi.nlm.nih.gov/pubmed/33339301
http://dx.doi.org/10.3390/s20247210
_version_ 1783628748235472896
author Tubis, Agnieszka A.
Werbińska-Wojciechowska, Sylwia
Góralczyk, Mateusz
Wróblewski, Adam
Ziętek, Bartłomiej
author_facet Tubis, Agnieszka A.
Werbińska-Wojciechowska, Sylwia
Góralczyk, Mateusz
Wróblewski, Adam
Ziętek, Bartłomiej
author_sort Tubis, Agnieszka A.
collection PubMed
description The rising automation level and development of the Industry 4.0 concept in the mining sector increase the risk of cyber-attacks. As a result, this article focuses on developing a risk analysis method that integrates Kaplan’s and Garrick’s approach and fuzzy theory. The proposed approach takes into account the level of automation of the operating mining processes. Moreover, it follows five main steps, including identifying the automation level in a selected mine, definition of cyber-attack targets, identification of cyber-attack techniques, definition of cyber-attack consequences, and risk ratio assessment. The proposed risk assessment procedure was performed according to three cyber-attack targets (databases, internal networks, machinery) and seven selected types of cyber-attack techniques. The fuzzy theory is implemented in risk parameter estimation for cyber-attack scenario occurrence in the mining industry. To illustrate the given method’s applicability, seven scenarios for three levels of mine automation are analyzed. The proposed method may be used to reveal the current cybersecurity status of the mine. Moreover, it will be a valuable guide for mines in which automation is planned in the near future.
format Online
Article
Text
id pubmed-7766562
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-77665622020-12-28 Cyber-Attacks Risk Analysis Method for Different Levels of Automation of Mining Processes in Mines Based on Fuzzy Theory Use Tubis, Agnieszka A. Werbińska-Wojciechowska, Sylwia Góralczyk, Mateusz Wróblewski, Adam Ziętek, Bartłomiej Sensors (Basel) Article The rising automation level and development of the Industry 4.0 concept in the mining sector increase the risk of cyber-attacks. As a result, this article focuses on developing a risk analysis method that integrates Kaplan’s and Garrick’s approach and fuzzy theory. The proposed approach takes into account the level of automation of the operating mining processes. Moreover, it follows five main steps, including identifying the automation level in a selected mine, definition of cyber-attack targets, identification of cyber-attack techniques, definition of cyber-attack consequences, and risk ratio assessment. The proposed risk assessment procedure was performed according to three cyber-attack targets (databases, internal networks, machinery) and seven selected types of cyber-attack techniques. The fuzzy theory is implemented in risk parameter estimation for cyber-attack scenario occurrence in the mining industry. To illustrate the given method’s applicability, seven scenarios for three levels of mine automation are analyzed. The proposed method may be used to reveal the current cybersecurity status of the mine. Moreover, it will be a valuable guide for mines in which automation is planned in the near future. MDPI 2020-12-16 /pmc/articles/PMC7766562/ /pubmed/33339301 http://dx.doi.org/10.3390/s20247210 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Tubis, Agnieszka A.
Werbińska-Wojciechowska, Sylwia
Góralczyk, Mateusz
Wróblewski, Adam
Ziętek, Bartłomiej
Cyber-Attacks Risk Analysis Method for Different Levels of Automation of Mining Processes in Mines Based on Fuzzy Theory Use
title Cyber-Attacks Risk Analysis Method for Different Levels of Automation of Mining Processes in Mines Based on Fuzzy Theory Use
title_full Cyber-Attacks Risk Analysis Method for Different Levels of Automation of Mining Processes in Mines Based on Fuzzy Theory Use
title_fullStr Cyber-Attacks Risk Analysis Method for Different Levels of Automation of Mining Processes in Mines Based on Fuzzy Theory Use
title_full_unstemmed Cyber-Attacks Risk Analysis Method for Different Levels of Automation of Mining Processes in Mines Based on Fuzzy Theory Use
title_short Cyber-Attacks Risk Analysis Method for Different Levels of Automation of Mining Processes in Mines Based on Fuzzy Theory Use
title_sort cyber-attacks risk analysis method for different levels of automation of mining processes in mines based on fuzzy theory use
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7766562/
https://www.ncbi.nlm.nih.gov/pubmed/33339301
http://dx.doi.org/10.3390/s20247210
work_keys_str_mv AT tubisagnieszkaa cyberattacksriskanalysismethodfordifferentlevelsofautomationofminingprocessesinminesbasedonfuzzytheoryuse
AT werbinskawojciechowskasylwia cyberattacksriskanalysismethodfordifferentlevelsofautomationofminingprocessesinminesbasedonfuzzytheoryuse
AT goralczykmateusz cyberattacksriskanalysismethodfordifferentlevelsofautomationofminingprocessesinminesbasedonfuzzytheoryuse
AT wroblewskiadam cyberattacksriskanalysismethodfordifferentlevelsofautomationofminingprocessesinminesbasedonfuzzytheoryuse
AT zietekbartłomiej cyberattacksriskanalysismethodfordifferentlevelsofautomationofminingprocessesinminesbasedonfuzzytheoryuse