scholarly journals Intrusion Detection in Critical Infrastructures: A Literature Review

Smart Cities ◽  
2021 ◽  
Vol 4 (3) ◽  
pp. 1146-1157
Author(s):  
Fountas Panagiotis ◽  
Kouskouras Taxiarxchis ◽  
Kranas Georgios ◽  
Leandros Maglaras ◽  
Mohamed Amine Ferrag

Over the years, the digitization of all aspects of life in modern societies is considered an acquired advantage. However, like the terrestrial world, the digital world is not perfect and many dangers and threats are present. In the present work, we conduct a systematic review on the methods of network detection and cyber attacks that can take place in a critical infrastructure. As is shown, the implementation of a system that learns from the system behavior (machine learning), on multiple levels and spots any diversity, is one of the most effective solutions.

Author(s):  
Merve Şener

Critical infrastructures ensure that activities that are vital and important for individuals can be safely delivered to the society uninterruptedly. The damage on these critical infrastructures caused by cyber-attacks whose control is carried out through computers and network systems is very large. Cyber-attacks directly or indirectly affect companies, institutions, and organizations economically and cause great financial losses. In this chapter, two different categories, energy and finance sector, which are described as critical infrastructure, are discussed; cyber-attacks carried out on these sectors, cyber-attack weapons, and economic losses caused by these attacks are examined.


Energetika ◽  
2018 ◽  
Vol 63 (4) ◽  
Author(s):  
Heinz-Peter Berg

In the last years, cybersecurity has become a crucial essential element within the security framework of critical infrastructures such as process industry, railways, hospitals and also nuclear facilities. The types of threats change, and not only organizations requiring money from the affected organization but also nation states seem to be involved. The number of cyber-attacks to all types of critical infrastructure increased and these attacks are seen as a threatening problem. For the specific aspects of nuclear facilities in Germany, current experiences and future activities regarding these facilities under the German IT Act are discussed. Moreover, respective regulatory requirements recently set in force in Germany are presented. In addition, ongoing international activities in this area are discussed.


Electronics ◽  
2020 ◽  
Vol 9 (2) ◽  
pp. 219 ◽  
Author(s):  
Sweta Bhattacharya ◽  
Siva Rama Krishnan S ◽  
Praveen Kumar Reddy Maddikunta ◽  
Rajesh Kaluri ◽  
Saurabh Singh ◽  
...  

The enormous popularity of the internet across all spheres of human life has introduced various risks of malicious attacks in the network. The activities performed over the network could be effortlessly proliferated, which has led to the emergence of intrusion detection systems. The patterns of the attacks are also dynamic, which necessitates efficient classification and prediction of cyber attacks. In this paper we propose a hybrid principal component analysis (PCA)-firefly based machine learning model to classify intrusion detection system (IDS) datasets. The dataset used in the study is collected from Kaggle. The model first performs One-Hot encoding for the transformation of the IDS datasets. The hybrid PCA-firefly algorithm is then used for dimensionality reduction. The XGBoost algorithm is implemented on the reduced dataset for classification. A comprehensive evaluation of the model is conducted with the state of the art machine learning approaches to justify the superiority of our proposed approach. The experimental results confirm the fact that the proposed model performs better than the existing machine learning models.


Sensors ◽  
2020 ◽  
Vol 20 (12) ◽  
pp. 3537 ◽  
Author(s):  
Georgia Lykou ◽  
Dimitrios Moustakas ◽  
Dimitris Gritzalis

As the fastest growing segment of aviation, unmanned aerial systems (UAS) continue to increase in number, technical complexity and capabilities. Numerous civilian and commercial uses are drastically transforming civil protection, asset delivery, commercial and entertaining activities. However, UAS pose significant challenges in terms of safety, security and privacy within society. An increasing phenomenon, nowadays, is drone-related incidents near airport facilities, which are expected to proliferate in frequency, complexity and severity, as drones become larger and more powerful. Critical infrastructures need to be protected from such aerial attacks, through effective counteracting technologies, risk management and resilience plans. In this paper, we present a survey of drone incidents near airports and a literature review of sensor technologies, able to prevent, detect, identify and mitigate rogue drones. We exhibit the benefits and limitations of available counter-drone technologies (C-UAS); however, defending airports against misused drone activity is a hard problem. Therefore, we analyze three realistic attack scenarios from malicious drones and propose an effective C-UAS protection plan for each case. We discuss applicability limitations of C-UAS in the aviation context and propose a resilience action plan for airport stakeholders for defending against airborne threats from misused drones.


2020 ◽  
Vol 3 (1) ◽  
Author(s):  
Ivana Cesarec

States, organizations and individuals are becoming targets of both individual and state-sponsored cyber-attacks, by those who recognize the impact of disrupting security systems and effect to people and governments. The energy sector is seen as one of the main targets of cyber-attacks against critical infrastructure, but transport, public sector services, telecommunications and critical (manufacturing) industries are also very vulnerable. One of most used example of cyber-attack is the Ukraine power grid attack in 2015 that left 230,000 people without power for up to 6 hours. Another most high profile example of a cyber-attack against critical infrastructure is the Stuxnet computer virus (first used on Iranian nuclear facility) which could be adapted to attack the SCADA systems (industrial control systems) used by many critical infrastructures in Europe.Wide range of critical infrastructure sectors are reliant on industrial control systems for monitoring processes and controlling physical devices (sensors, pumps, etc.) and for that reason, physical connected devices that support industrial processes are becoming more vulnerable. Not all critical infrastructure operators in all sectors are adequately prepared to manage protection (and raise resilience) effectively across both cyber and physical environments. Additionally there are few challenges in implementation of protection measures, such as lack of collaboration between private and public sector and low levels of awareness on existence of national key legislation.From supranational aspect, in relation to this papers topic, the European Union has took first step in defense to cyber threats in 2016 with „Directive on security of network and information systems“ (NIS Directive) by prescribing member states to adopt more rigid cyber-security standards. The aim of directive is to improve the deterrent and increase the EU’s defenses and reactions to cyber attacks by expanding the cyber security capacity, increasing collaboration at an EU level and introducing measures to prevent risk and handle cyber incidents. There are lot of other „supporting tools“ for Member States countries, such as European Union Agency for Network and Information Security – ENISA (which organize regular cyber security exercises at an EU level, including a large and comprehensive exercise every two years, raising preparedness of EU states); Network of National Coordination Centers and the European Cybersecurity Industrial, Technology and Research Competence Centre; and Coordinated response to major cyber security incidents and crises (Blueprint) with aim to ensure a rapid and coordinated response to large-scale cyber attacks by setting out suitable processes within the EU.Yet, not all Member States share the same capacities for achieving the highest level of cyber-security. They need to continuously work on enhancing the capability of defense against cyber threats as increased risk to state institutions information and communication systems but also the critical infrastructure objects. In Southeast Europe there are few additional challenges – some countries even don't have designated critical infrastructures (lower level of protection; lack of „clear vision“ of criticality) and critical infrastructures are only perceived through physical prism; non-EU countries are not obligated to follow requirements of European Union and its legislation, and there are interdependencies and transboundary cross-sector effects that needs to be taken in consideration. Critical infrastructure Protection (CIP) is the primary area of action, and for some of SEE countries (like the Republic of Croatia) the implementation of cyber security provisions just complements comprehensive activities which are focused on physical protection.This paper will analyze few segments of how SEE countries cope with new security challenges and on which level are they prepared for cyber-attacks and threats: 1. Which security mechanisms they use; 2. The existing legislation (Acts, Strategies, Plan of Action, etc.) related to cyber threats in correlation with strategic critical infrastructure protection documents. Analysis will have two perspectives: from EU member states and from non-EU member states point of view. Additionally, for EU member states it will be analyzed if there were any cyber security legislation before NIS directive that meets same aims. The aim of research is to have an overall picture of efforts in region regarding cyber-security as possibility for improvement thorough cooperation, organizational measures, etc. providing also some recommendations to reduce the gap in the level of cyber-security development with other regions of EU.


Internet of Things(IoT) is a next generation of Internet in that every object in the universe connect, communicate with sensor devices through Internet. In that inter-connected communication devices as well as sensor devices share the data through IoT gateway for a relevant application like whether forecasting, healthcare, smart city, disaster management are providing without human interaction. IoT enhances comfortable for human being even security is one of the challenging tasks. Intrusion detection system (IDS) will protect IoT devices from intruders. Now a day i.e in this era, as per user requirement and day-to-day increasing new innovative technologies as IoT, cloud computing, big data analytics, AIapplications implementation a network traffic will be generating a heavy data. To manage these data intrusion detection system is essential technique to detect, collect analyze the data is transmission through IoT gateway network. It is essential to improve the accuracy as well speed of intrusion detection system model by applying machine learning approach to detect IoT systems and gateway network to protect from cyber-attacks. In this paper providing a detailed study of Intrusion detection system (IDS) classification system for IoT gateway communication to protect IoT gateway by machine learning algorithms ina intelligent fashion.


2021 ◽  
Author(s):  
Jailma Januário da Silva ◽  
Norton Trevisan Roman

In this article, we present a systematic literature review, carried out from February to March 2020, on the application of a machine learning technique to predict student dropout in higher education institutions. Besides describing the protocol followed during our research, which includes the research questions, searched databases and query strings, along with criteria for inclusion and exclusion of articles, we also present our main results, in terms of the attributes used by current research on this theme, along with adopted approaches, specific algorithms, and evalution metrics. The Decision Tree technique is the most used for the construction of models, and accuracy and recall and precision being the most used metric for evaluating models.


Sign in / Sign up

Export Citation Format

Share Document