TY - JOUR
T1 - Identifying and Protecting Cyber-Physical Systems' Influential Devices for Sustainable Cybersecurity
AU - Taha, Kamal
N1 - Publisher Copyright:
© 2016 IEEE.
PY - 2023/10/1
Y1 - 2023/10/1
N2 - For sustainable cyber-physical systems (CPS) security, proactive measures to cybersecurity need to be implemented instead of reactive measures. Towards this, we introduce in this paper a proactive methodology implemented in a system called IDI_CPS. It is based on the observation that CPS devices that have LAN-based network sharing (e.g., via Wi-Fi connections) need first to be clustered using some clustering criterion. Then, the influential and central devices in these clusters need to be identified to pay more attention to their file sharing. These influential devices may have network sharing with devices at the WAN level. Therefore, the influential devices at the WAN level that have network sharing with the influential devices in the clusters need also to be identified to pay more attention to their file sharing. We propose novel techniques for: (1) clustering the devices that have LAN-based network sharing using k-clique modeling, (2) employing clustering coefficient-based techniques for identifying the most influential device in each cluster, and (3) employing Independent Cascades model-based techniques for identifying the influential devices at the WAN level that have network sharing with the influential devices in the clusters. We experimentally evaluated our proposed system IDI_CPS and compared it with four comparable methods. Results showed marked improvement.
AB - For sustainable cyber-physical systems (CPS) security, proactive measures to cybersecurity need to be implemented instead of reactive measures. Towards this, we introduce in this paper a proactive methodology implemented in a system called IDI_CPS. It is based on the observation that CPS devices that have LAN-based network sharing (e.g., via Wi-Fi connections) need first to be clustered using some clustering criterion. Then, the influential and central devices in these clusters need to be identified to pay more attention to their file sharing. These influential devices may have network sharing with devices at the WAN level. Therefore, the influential devices at the WAN level that have network sharing with the influential devices in the clusters need also to be identified to pay more attention to their file sharing. We propose novel techniques for: (1) clustering the devices that have LAN-based network sharing using k-clique modeling, (2) employing clustering coefficient-based techniques for identifying the most influential device in each cluster, and (3) employing Independent Cascades model-based techniques for identifying the influential devices at the WAN level that have network sharing with the influential devices in the clusters. We experimentally evaluated our proposed system IDI_CPS and compared it with four comparable methods. Results showed marked improvement.
KW - Clustering coefficient
KW - cyber-physical systems
KW - cyberattacks
KW - network sharing
KW - sustainable information security
UR - https://www.scopus.com/pages/publications/85149372151
U2 - 10.1109/TSUSC.2023.3246087
DO - 10.1109/TSUSC.2023.3246087
M3 - Article
AN - SCOPUS:85149372151
SN - 2377-3782
VL - 8
SP - 614
EP - 626
JO - IEEE Transactions on Sustainable Computing
JF - IEEE Transactions on Sustainable Computing
IS - 4
ER -