• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

网络安全关键基础设施的影响、脆弱性和缓解策略。

Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure.

机构信息

Department of Electrical and Computer Engineering, Florida International University, Miami, FL 33174, USA.

Department of Computer Science, Utah Valley University, Orem, UT 84058, USA.

出版信息

Sensors (Basel). 2023 Apr 17;23(8):4060. doi: 10.3390/s23084060.

DOI:10.3390/s23084060
PMID:37112400
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10145335/
Abstract

Several critical infrastructures are integrating information technology into their operations, and as a result, the cyber attack surface extends over a broad range of these infrastructures. Cyber attacks have been a serious problem for industries since the early 2000s, causing significant interruptions to their ability to produce goods or offer services to their clients. The thriving cybercrime economy encompasses money laundering, black markets, and attacks on cyber-physical systems that result in service disruptions. Furthermore, extensive data breaches have compromised the personally identifiable information of millions of people. This paper aims to summarize some of the major cyber attacks that have occurred in the past 20 years against critical infrastructures. These data are gathered in order to analyze the types of cyber attacks, their consequences, vulnerabilities, as well as the victims and attackers. Cybersecurity standards and tools are tabulated in this paper in order to address this issue. This paper also provides an estimate of the number of major cyber attacks that will occur on critical infrastructure in the future. This estimate predicts a significant increase in such incidents worldwide over the next five years. Based on the study's findings, it is estimated that over the next 5 years, 1100 major cyber attacks will occur on critical infrastructures worldwide, each causing more than USD 1 million in damages.

摘要

一些关键基础设施正在将信息技术融入其运营之中,因此,网络攻击面已经扩展到了这些基础设施的广泛领域。自 21 世纪初以来,网络攻击一直是各行业的一个严重问题,严重干扰了它们生产商品或向客户提供服务的能力。蓬勃发展的网络犯罪经济包括洗钱、黑市以及针对网络物理系统的攻击,这些攻击会导致服务中断。此外,大规模的数据泄露已经泄露了数百万人的个人身份信息。本文旨在总结过去 20 年来针对关键基础设施的一些重大网络攻击。这些数据的收集目的是分析网络攻击的类型、其后果、漏洞,以及受害者和攻击者。本文还列出了一些网络安全标准和工具,以解决这一问题。本文还对未来关键基础设施将发生的重大网络攻击数量进行了估计。这一估计预测,未来五年全球此类事件将显著增加。根据研究结果,预计未来 5 年,全球将有 1100 起针对关键基础设施的重大网络攻击,每次攻击造成的损失超过 100 万美元。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/06f1/10145335/8787e70db78c/sensors-23-04060-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/06f1/10145335/b15c5f3b9880/sensors-23-04060-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/06f1/10145335/017edd9b487c/sensors-23-04060-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/06f1/10145335/365411abd48d/sensors-23-04060-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/06f1/10145335/854b96d5a01a/sensors-23-04060-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/06f1/10145335/e065a301625d/sensors-23-04060-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/06f1/10145335/579ee5dc622c/sensors-23-04060-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/06f1/10145335/f6341bf67c34/sensors-23-04060-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/06f1/10145335/8787e70db78c/sensors-23-04060-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/06f1/10145335/b15c5f3b9880/sensors-23-04060-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/06f1/10145335/017edd9b487c/sensors-23-04060-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/06f1/10145335/365411abd48d/sensors-23-04060-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/06f1/10145335/854b96d5a01a/sensors-23-04060-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/06f1/10145335/e065a301625d/sensors-23-04060-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/06f1/10145335/579ee5dc622c/sensors-23-04060-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/06f1/10145335/f6341bf67c34/sensors-23-04060-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/06f1/10145335/8787e70db78c/sensors-23-04060-g008.jpg

相似文献

1
Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure.网络安全关键基础设施的影响、脆弱性和缓解策略。
Sensors (Basel). 2023 Apr 17;23(8):4060. doi: 10.3390/s23084060.
2
Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.人为因素对医疗机构网络安全的影响:系统综述。
Sensors (Basel). 2021 Jul 28;21(15):5119. doi: 10.3390/s21155119.
3
Potential smart grid vulnerabilities to cyber attacks: Current threats and existing mitigation strategies.智能电网对网络攻击的潜在脆弱性:当前威胁与现有缓解策略。
Heliyon. 2024 Sep 16;10(19):e37980. doi: 10.1016/j.heliyon.2024.e37980. eCollection 2024 Oct 15.
4
Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions.下一代汽车中的网络攻击、缓解技术、预期就绪情况和未来方向。
Accid Anal Prev. 2020 Dec;148:105837. doi: 10.1016/j.aap.2020.105837. Epub 2020 Oct 26.
5
A Brief Survey of Recent Advances and Methodologies for the Security Control of Complex Cyber-Physical Networks.复杂网络安全控制的最新进展与方法综述。
Sensors (Basel). 2023 Apr 15;23(8):4013. doi: 10.3390/s23084013.
6
Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment.智能电网环境中广域监测、保护和控制的网络-物理安全。
J Adv Res. 2014 Jul;5(4):481-9. doi: 10.1016/j.jare.2013.12.005. Epub 2013 Dec 27.
7
A deeper look into cybersecurity issues in the wake of Covid-19: A survey.新冠疫情后对网络安全问题的深入研究:一项调查。
J King Saud Univ Comput Inf Sci. 2022 Nov;34(10):8176-8206. doi: 10.1016/j.jksuci.2022.08.003. Epub 2022 Aug 11.
8
Cyber-attack method and perpetrator prediction using machine learning algorithms.使用机器学习算法进行网络攻击方法及作案者预测
PeerJ Comput Sci. 2021 Apr 9;7:e475. doi: 10.7717/peerj-cs.475. eCollection 2021.
9
DDoS attack detection in smart grid network using reconstructive machine learning models.基于重构机器学习模型的智能电网网络中分布式拒绝服务攻击检测
PeerJ Comput Sci. 2024 Jan 9;10:e1784. doi: 10.7717/peerj-cs.1784. eCollection 2024.
10
Stochastic Counterfactual Risk Analysis for the Vulnerability Assessment of Cyber-Physical Attacks on Electricity Distribution Infrastructure Networks.基于随机反事实风险分析的电网基础设施网络中电力线通信网络脆弱性评估
Risk Anal. 2019 Sep;39(9):2012-2031. doi: 10.1111/risa.13291. Epub 2019 Feb 27.

引用本文的文献

1
A Deep Cryptographic Framework for Securing the Healthcare Network from Penetration.一种用于保护医疗保健网络免受渗透的深度加密框架。
Sensors (Basel). 2024 Nov 4;24(21):7089. doi: 10.3390/s24217089.
2
Firmware Updates over the Air via LoRa: Unicast and Broadcast Combination for Boosting Update Speed.通过LoRa进行空中固件更新:单播和广播相结合以提高更新速度。
Sensors (Basel). 2024 Mar 25;24(7):2104. doi: 10.3390/s24072104.