Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Systematization of Cyber Threats to Large-Scale Systems with Adaptive Network Topology

Systematization of Cyber Threats to Large-Scale Systems with Adaptive Network Topology This work is devoted to the study and systematization of cyber threats to large-scale cyber-physical systems (CPSs) with a dynamic network infrastructure. The proposed systematization provides a one-time view of the specifics of such systems in terms of security, attacker’s goals, and levels of the TCP/IP network stack. In general, the systematization is the basis for creating a new technology for protecting complex dynamic systems, allowing one to gain knowledge about what network interaction parameters need to be controlled to protect against certain cyber threats. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Automatic Control and Computer Sciences Springer Journals

Systematization of Cyber Threats to Large-Scale Systems with Adaptive Network Topology

Loading next page...
 
/lp/springer-journals/systematization-of-cyber-threats-to-large-scale-systems-with-adaptive-edJ4qs7EMm
Publisher
Springer Journals
Copyright
Copyright © Allerton Press, Inc. 2022. ISSN 0146-4116, Automatic Control and Computer Sciences, 2022, Vol. 56, No. 8, pp. 906–915. © Allerton Press, Inc., 2022. Russian Text © The Author(s), 2022, published in Problemy Informatsionnoi Bezopasnosti, Komp’yuternye Sistemy.
ISSN
0146-4116
eISSN
1558-108X
DOI
10.3103/s0146411622080132
Publisher site
See Article on Publisher Site

Abstract

This work is devoted to the study and systematization of cyber threats to large-scale cyber-physical systems (CPSs) with a dynamic network infrastructure. The proposed systematization provides a one-time view of the specifics of such systems in terms of security, attacker’s goals, and levels of the TCP/IP network stack. In general, the systematization is the basis for creating a new technology for protecting complex dynamic systems, allowing one to gain knowledge about what network interaction parameters need to be controlled to protect against certain cyber threats.

Journal

Automatic Control and Computer SciencesSpringer Journals

Published: Dec 1, 2022

Keywords: ad hoc networks; MANET; wireless sensor networks; cyber threat; TCP/IP stack

References