2019 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA) 2019
DOI: 10.1109/cybersa.2019.8899351
|View full text |Cite
|
Sign up to set email alerts
|

Cyber attacks real time detection: towards a Cyber Situational Awareness for naval systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2
1
1

Relationship

1
9

Authors

Journals

citations
Cited by 23 publications
(13 citation statements)
references
References 3 publications
0
12
0
1
Order By: Relevance
“…In order to identify the potential cyber-risks from this embedded software, the recognition approaches can be grouped into scanning tools, online surveys, participators interviews, introducing threats and simulation, conception and elaboration method and attack graph generation, as well as the cyber-attack path discovery method (Balduzzi et al, 2014;Kalogeraki et al, 2018b;Lee and Wogan, 2018;Möller et al, 2018;Mouratidis and Diamantopoulou, 2018;Polatidis et al, 2018;Jacq et al, 2019a;Tam and Jones, 2019b). For example, we can use the industry-leading vulnerability scanning tool (i.e.…”
Section: Recognising Maritime Cyber-threatsmentioning
confidence: 99%
“…In order to identify the potential cyber-risks from this embedded software, the recognition approaches can be grouped into scanning tools, online surveys, participators interviews, introducing threats and simulation, conception and elaboration method and attack graph generation, as well as the cyber-attack path discovery method (Balduzzi et al, 2014;Kalogeraki et al, 2018b;Lee and Wogan, 2018;Möller et al, 2018;Mouratidis and Diamantopoulou, 2018;Polatidis et al, 2018;Jacq et al, 2019a;Tam and Jones, 2019b). For example, we can use the industry-leading vulnerability scanning tool (i.e.…”
Section: Recognising Maritime Cyber-threatsmentioning
confidence: 99%
“…Two main categories of IDS are observed in the literature, namely Host-based IDS (HIDS) and Network-based IDS (NIDS). Jacq et al [50] have discussed the concept of situational awareness in naval systems and indicated the challenge in the application of HIDS due to possible warranty disruptions. On the other hand, NIDS is a more suitable deployment option, as it can be added to the networks for monitoring NMEA traffic and detecting anomalies.…”
Section: Deployment Optionsmentioning
confidence: 99%
“…We believe cyber vulnerabilities could occur due to various duties discharged by the operational staff of IPPs hence, evaluating human behaviours in the power generation sector. These vulnerabilities can occur in any of the layers; physical layer, information layer, and the human layers in the CI [33]. Also see Appendix.…”
Section: E Cyber Situational Awarenessmentioning
confidence: 99%