Review, Meta-Taxonomy, and Use Cases of Cyberattack Taxonomies of Manufacturing Cybersecurity Threat Attributes and Countermeasures

01/18/2023
by   Md Habibor Rahman, et al.
0

A thorough and systematic understanding of different elements of cyberattacks is essential for developing the necessary tools to prevent, detect, diagnose, and mitigate cyberattacks in manufacturing systems. In response, researchers have proposed several attack taxonomies as methods for recognizing and categorizing various cyberattack attributes. However, those taxonomies cover selected attack attributes depending on the research focus, sometimes accompanied by inconsistent naming and definitions. These seemingly different taxonomies often overlap and can complement each other to create a comprehensive knowledge base of cyberattack attributes that is currently missing in the literature. Additionally, there is a missing link from creating structured knowledge by using a taxonomy to applying this structure for cybersecurity tools development and aiding practitioners in using it. To tackle these challenges, this article highlights how cyberattack taxonomies can be used to better understand and characterize manufacturing cybersecurity threats. It also reviews and analyzes current taxonomical classifications of manufacturing cybersecurity threat attributes and countermeasures, as well as the proliferation of the scope and coverage in existing taxonomies. As a result, these taxonomies are compiled into a more comprehensive and consistent meta-taxonomy for the smart manufacturing space. The resulting meta-taxonomy provides a holistic analysis of current taxonomies and integrates them into a unified structure. Based on this structure, this paper identifies gaps in current attack taxonomies and provides directions for future improvements. Finally, the paper introduces potential use cases for attack taxonomies in smart manufacturing systems for assessing security threats and their associated risks, devising risk mitigation strategies, and informing the application of cybersecurity frameworks.

READ FULL TEXT

page 2

page 3

research
01/18/2023

Graph-Theoretic Approach for Manufacturing Cybersecurity Risk Modeling and Assessment

Identifying, analyzing, and evaluating cybersecurity risks are essential...
research
08/13/2022

Wireless Communications for Smart Manufacturing and Industrial IoT: Existing Technologies, 5G, and Beyond

Smart manufacturing is a vision and major driver for change in industria...
research
10/12/2021

A Taxonomy and Archetypes of Business Analytics in Smart Manufacturing

Fueled by increasing data availability and the rise of technological adv...
research
06/09/2018

A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets

With the world moving towards being increasingly dependent on computers ...
research
12/10/2022

A systematic literature review on insider threats

Insider threats is the most concerned cybersecurity problem which is poo...
research
09/20/2023

Trojan Taxonomy in Quantum Computing

Quantum computing introduces unfamiliar security vulnerabilities demandi...
research
05/06/2023

Leveraging Semantic Relationships to Prioritise Indicators of Compromise in Additive Manufacturing Systems

Additive manufacturing (AM) offers numerous benefits, such as manufactur...

Please sign up or login with your details

Forgot password? Click here to reset