SwePub
Sök i LIBRIS databas

  Extended search

onr:"swepub:oai:DiVA.org:his-21546"
 

Search: onr:"swepub:oai:DiVA.org:his-21546" > Vulnerability Analy...

  • 1 of 1
  • Previous record
  • Next record
  •    To hitlist

Vulnerability Analysis for Critical Infrastructures

Jiang, Yuning, 1993- (author)
Högskolan i Skövde,Institutionen för informationsteknologi,Forskningsmiljön Informationsteknologi,Distribuerade realtidssystem (DRTS), Distributed Real-Time Systems
Atif, Yacine, Professor, 1967- (thesis advisor)
Högskolan i Skövde,Institutionen för informationsteknologi,Forskningsmiljön Informationsteknologi
Ding, Jianguo, Associate Professor, 1968- (thesis advisor)
Högskolan i Skövde,Institutionen för informationsteknologi,Forskningsmiljön Informationsteknologi
show more...
Jeusfeld, Manfred A., Professor (thesis advisor)
Högskolan i Skövde,Institutionen för informationsteknologi,Forskningsmiljön Informationsteknologi
Lindström, Birgitta, Associate Professor (thesis advisor)
Högskolan i Skövde,Institutionen för informationsteknologi
Brax, Christoffer, PhD (thesis advisor)
Combitech
Katsikas, Sokratis, Professor (opponent)
Norwegian University of Science and Technology
show less...
 (creator_code:org_t)
ISBN 9789198790603
Skövde : University of Skövde, 2022
English xxv, 278 s.
Series: Dissertation Series ; 46
  • Doctoral thesis (other academic/artistic)
Abstract Subject headings
Close  
  • The rapid advances in information and communication technology enable a shift from diverse systems empowered mainly by either hardware or software to cyber-physical systems (CPSs) that are driving Critical infrastructures (CIs), such as energy and manufacturing systems. However, alongside the expected enhancements in efficiency and reliability, the induced connectivity exposes these CIs to cyberattacks exemplified by Stuxnet and WannaCry ransomware cyber incidents. Therefore, the need to improve cybersecurity expectations of CIs through vulnerability assessments cannot be overstated. Yet, CI cybersecurity has intrinsic challenges due to the convergence of information technology (IT) and operational technology (OT) as well as the crosslayer dependencies that are inherent to CPS based CIs. Different IT and OT security terminologies also lead to ambiguities induced by knowledge gaps in CI cybersecurity. Moreover, current vulnerability-assessment processes in CIs are mostly subjective and human-centered. The imprecise nature of manual vulnerability assessment operations and the massive volume of data cause an unbearable burden for security analysts. Latest advances in machine-learning (ML) based cybersecurity solutions promise to shift such burden onto digital alternatives. Nevertheless, the heterogeneity, diversity and information gaps in existing vulnerability data repositories hamper accurate assessments anticipated by these ML-based approaches. Therefore, a comprehensive approach is envisioned in this thesis to unleash the power of ML advances while still involving human operators in assessing cybersecurity vulnerabilities within deployed CI networks.Specifically, this thesis proposes data-driven cybersecurity indicators to bridge vulnerability management gaps induced by ad-hoc and subjective auditing processes as well as to increase the level of automation in vulnerability analysis. The proposed methodology follows design science research principles to support the development and validation of scientifically-sound artifacts. More specifically, the proposed data-driven cybersecurity architecture orchestrates a range of modules that include: (i) a vulnerability data model that captures a variety of publicly accessible cybersecurity-related data sources; (ii) an ensemble-based ML pipeline method that self-adjusts to the best learning models for given cybersecurity tasks; and (iii) a knowledge taxonomy and its instantiated power grid and manufacturing models that capture CI common semantics of cyberphysical functional dependencies across CI networks in critical societal domains. This research contributes data-driven vulnerability analysis approaches that bridge the knowledge gaps among different security functions, such as vulnerability management through related reports analysis. This thesis also correlates vulnerability analysis findings to coordinate mitigation responses in complex CIs. More specifically, the vulnerability data model expands the vulnerability knowledge scope and curates meaningful contexts for vulnerability analysis processes. The proposed ML methods fill information gaps in vulnerability repositories using curated data while further streamlining vulnerability assessment processes. Moreover, the CI security taxonomy provides disciplined and coherent support to specify and group semanticallyrelated components and coordination mechanisms in order to harness the notorious complexity of CI networks such as those prevalent in power grids and manufacturing infrastructures. These approaches learn through interactive processes to proactively detect and analyze vulnerabilities while facilitating actionable insights for security actors to make informed decisions.

Subject headings

TEKNIK OCH TEKNOLOGIER  -- Elektroteknik och elektronik -- Datorsystem (hsv//swe)
ENGINEERING AND TECHNOLOGY  -- Electrical Engineering, Electronic Engineering, Information Engineering -- Computer Systems (hsv//eng)
TEKNIK OCH TEKNOLOGIER  -- Elektroteknik och elektronik -- Inbäddad systemteknik (hsv//swe)
ENGINEERING AND TECHNOLOGY  -- Electrical Engineering, Electronic Engineering, Information Engineering -- Embedded Systems (hsv//eng)
TEKNIK OCH TEKNOLOGIER  -- Elektroteknik och elektronik -- Kommunikationssystem (hsv//swe)
ENGINEERING AND TECHNOLOGY  -- Electrical Engineering, Electronic Engineering, Information Engineering -- Communication Systems (hsv//eng)
TEKNIK OCH TEKNOLOGIER  -- Elektroteknik och elektronik -- Annan elektroteknik och elektronik (hsv//swe)
ENGINEERING AND TECHNOLOGY  -- Electrical Engineering, Electronic Engineering, Information Engineering -- Other Electrical Engineering, Electronic Engineering, Information Engineering (hsv//eng)

Keyword

critical infrastructure cybersecurity
vulnerability assessment
vulnerability quantification
computational intelligence in cybersecurity
cyber-physical system
INF303 Informationssäkerhet
INF303 Information Security
INF301 Data Science
INF301 Data Science
Distribuerade realtidssystem (DRTS)
Distributed Real-Time Systems

Publication and Content Type

vet (subject category)
dok (subject category)

Find in a library

To the university's database

  • 1 of 1
  • Previous record
  • Next record
  •    To hitlist

Search outside SwePub

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view