2021
DOI: 10.3390/info12100408
|View full text |Cite
|
Sign up to set email alerts
|

VERCASM-CPS: Vulnerability Analysis and Cyber Risk Assessment for Cyber-Physical Systems

Abstract: Since Cyber-Physical Systems (CPS) are widely used in critical infrastructures, it is essential to protect their assets from cyber attacks to increase the level of security, safety and trustworthiness, prevent failure developments, and minimize losses. It is necessary to analyze the CPS configuration in an automatic mode to detect the most vulnerable CPS components and reconfigure or replace them promptly. In this paper, we present a methodology to determine the most secure CPS configuration by using a public … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…In addition, the authors of [67] separately highlight the academic community, which, of course, is in the sphere of activity in which cybercrimes often occur, the degree of protection against which affects the significance of the level of national cybersecurity in each country. Another field of cyber attacks is the engineering of cyber-physical systems, which are controlled or monitored by machine algorithms and have software that is closely related to physical objects [68]. Therefore, it is advisable to use both a powerful mathematical apparatus and methods of fuzzy logic and machine learning to detect and prevent cyber threats [69].…”
Section: Discussionmentioning
confidence: 99%
“…In addition, the authors of [67] separately highlight the academic community, which, of course, is in the sphere of activity in which cybercrimes often occur, the degree of protection against which affects the significance of the level of national cybersecurity in each country. Another field of cyber attacks is the engineering of cyber-physical systems, which are controlled or monitored by machine algorithms and have software that is closely related to physical objects [68]. Therefore, it is advisable to use both a powerful mathematical apparatus and methods of fuzzy logic and machine learning to detect and prevent cyber threats [69].…”
Section: Discussionmentioning
confidence: 99%
“…The proposed research offers a major breakthrough in the field of cybersecurity for critical infrastructures. It proposes the development of an integrated MLbased framework that can provide risk assessment [45], threat intelligence, and threat hunting in a single system, making it the first of its kind in the world.…”
Section: P Recision = T P Tmentioning
confidence: 99%
“…A list of the 5 most cited scientific corpus papers in each search category is shown in Table 1. (B) Following the vulnerability analysis and risk assessment mentioned in Northern et al [18], the most dangerous common vulnerabilities and exposures (CVEs) for the years 2019 to 2021, which had scores > 9.0 and were hosted at cve.mitre.org, and the Ultimate Security Vulnerability Data source were extracted (Table 2). These vulnerabilities were used to evaluate whether those CVEs are mentioned explicitly or inexplicitly in the document corpus using text mining analysis.…”
Section: Data Collectionmentioning
confidence: 99%