Skip to main content

2020 | OriginalPaper | Buchkapitel

Towards the Creation of a Threat Intelligence Framework for Maritime Infrastructures

verfasst von : Nikolaos Pitropakis, Marios Logothetis, Gennady Andrienko, Jason Stefanatos, Eirini Karapistoli, Costas Lambrinoudakis

Erschienen in: Computer Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The maritime ecosystem has undergone through changes due to the increasing use of information systems and smart devices. The newly introduced technologies give rise to new attack surface in maritime infrastructures. In this position paper, we propose the MAritime Threat INtelligence FRAMEwork (MAINFRAME), which is tailored towards collection and analysis of threat intelligence in maritime environments. MAINFRAME combines: (i) data collection from ship sensors; (ii) collection of publicly available data from social media; (iii) variety of honeypots emulating different hardware and software component; (iv) event detection assisted by deep learning; (v) blockchain implementation that maintains audit trail for activities and transactions, and electronic IDs; and (vi) visual threat analytics. To highlight the interdependencies between cyber and cyber-physical threats in autonomous ships, MAINFRAME’s operation is evaluated through the liquefied natural gas (LNG) Carrier case study.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Greenberg, A.: The untold story of NotPetya, the most devastating cyberattack in history. Wired, August 2018 Greenberg, A.: The untold story of NotPetya, the most devastating cyberattack in history. Wired, August 2018
2.
Zurück zum Zitat Taddeo, M., Floridi, L.: Regulate artificial intelligence to avert cyber arms race. Nature 556(7701), 296–298 (2018) CrossRef Taddeo, M., Floridi, L.: Regulate artificial intelligence to avert cyber arms race. Nature 556(7701), 296–298 (2018) CrossRef
3.
Zurück zum Zitat Apostolou, B., Apostolou, N., Schaupp, L.C.: Assessing and responding to cyber risk: the energy industry as example. J. Forensic Investig. Account. 10(1) (2018) Apostolou, B., Apostolou, N., Schaupp, L.C.: Assessing and responding to cyber risk: the energy industry as example. J. Forensic Investig. Account. 10(1) (2018)
5.
Zurück zum Zitat Mansfield-Devine, S.: The imitation game: how business email compromise scams are robbing organisations. Comput. Fraud Secur. 2016(11), 5–10 (2016)CrossRef Mansfield-Devine, S.: The imitation game: how business email compromise scams are robbing organisations. Comput. Fraud Secur. 2016(11), 5–10 (2016)CrossRef
7.
Zurück zum Zitat Shapo, V.: Cybersecurity implementation aspects at shipping 4.0 and industry 4.0 concepts realization. J. Sci. Perspect. 2(4), 1–12 (2018) Shapo, V.: Cybersecurity implementation aspects at shipping 4.0 and industry 4.0 concepts realization. J. Sci. Perspect. 2(4), 1–12 (2018)
8.
Zurück zum Zitat Johnson, B., Caban, D., Krotofil, M., Scali, D., Brubaker, N., Glyer, C.: Attackers deploy new ICS attack framework “TRITON” and cause operational disruption to critical infrastructure. Threat Research Blog (2017) Johnson, B., Caban, D., Krotofil, M., Scali, D., Brubaker, N., Glyer, C.: Attackers deploy new ICS attack framework “TRITON” and cause operational disruption to critical infrastructure. Threat Research Blog (2017)
9.
Zurück zum Zitat Marks, P.: Why the Stuxnet worm is like nothing seen before. News Science (2010) Marks, P.: Why the Stuxnet worm is like nothing seen before. News Science (2010)
10.
Zurück zum Zitat Cachin, C.: Architecture of the hyperledger blockchain fabric. In: Workshop on Distributed Cryptocurrencies and Consensus Ledgers, vol. 310 (2016) Cachin, C.: Architecture of the hyperledger blockchain fabric. In: Workshop on Distributed Cryptocurrencies and Consensus Ledgers, vol. 310 (2016)
14.
Zurück zum Zitat Carasso, D.: Exploring Splunk. CITO Research, New York (2012) Carasso, D.: Exploring Splunk. CITO Research, New York (2012)
15.
Zurück zum Zitat Wei, J., Mendis, G.J.: A deep learning-based cyber-physical strategy to mitigate false data injection attack in smart grids. In: Joint Workshop on Cyber-Physical Security and Resilience in Smart Grids (CPSR-SG), pp. 1–6. IEEE (2016) Wei, J., Mendis, G.J.: A deep learning-based cyber-physical strategy to mitigate false data injection attack in smart grids. In: Joint Workshop on Cyber-Physical Security and Resilience in Smart Grids (CPSR-SG), pp. 1–6. IEEE (2016)
16.
Zurück zum Zitat Bezemskij, A., Loukas, G., Gan, D., Anthony, R.: Detecting cyber-physical threats in an autonomous robotic vehicle using Bayesian networks, pp. 98–103 (2017) Bezemskij, A., Loukas, G., Gan, D., Anthony, R.: Detecting cyber-physical threats in an autonomous robotic vehicle using Bayesian networks, pp. 98–103 (2017)
20.
Zurück zum Zitat Jasek, R., Kolarik, M., Vymola, T.: APT detection system using honeypots. In: Proceedings of the 13th International Conference on Applied Informatics and Communications (AIC 2013), pp. 25–29. WSEAS Press (2013) Jasek, R., Kolarik, M., Vymola, T.: APT detection system using honeypots. In: Proceedings of the 13th International Conference on Applied Informatics and Communications (AIC 2013), pp. 25–29. WSEAS Press (2013)
21.
22.
Zurück zum Zitat Solomon, J.F.: Maritime deception and concealment: concepts for defeating wide-area oceanic surveillance-reconnaissance-strike networks. Naval War Coll. Rev. 66(4), 87 (2013) Solomon, J.F.: Maritime deception and concealment: concepts for defeating wide-area oceanic surveillance-reconnaissance-strike networks. Naval War Coll. Rev. 66(4), 87 (2013)
23.
Zurück zum Zitat Bou-Harb, E., Kaisar, E.I., Austin, M.: On the impact of empirical attack models targeting marine transportation. In: 2017 5th IEEE International Conference on Models and Technologies for Intelligent Transportation Systems (MT-ITS), pp. 200–205. IEEE (2017) Bou-Harb, E., Kaisar, E.I., Austin, M.: On the impact of empirical attack models targeting marine transportation. In: 2017 5th IEEE International Conference on Models and Technologies for Intelligent Transportation Systems (MT-ITS), pp. 200–205. IEEE (2017)
25.
Zurück zum Zitat Wood, G.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Pap. 151, 1–32 (2014) Wood, G.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Pap. 151, 1–32 (2014)
26.
Zurück zum Zitat Keim, E.D., Kohlhammer, J., Ellis, G.: Mastering the information age: solving problems with visual analytics. Eurographics Association (2010) Keim, E.D., Kohlhammer, J., Ellis, G.: Mastering the information age: solving problems with visual analytics. Eurographics Association (2010)
27.
Zurück zum Zitat Andrienko, N., et al.: Viewing visual analytics as model building. In: Computer Graphics Forum. Wiley Online Library (2018) Andrienko, N., et al.: Viewing visual analytics as model building. In: Computer Graphics Forum. Wiley Online Library (2018)
28.
Zurück zum Zitat Andrienko, G., Andrienko, N., Fuchs, G.: Understanding movement data quality. J. Locat. Based Serv. 10(1), 31–46 (2016)CrossRef Andrienko, G., Andrienko, N., Fuchs, G.: Understanding movement data quality. J. Locat. Based Serv. 10(1), 31–46 (2016)CrossRef
29.
Zurück zum Zitat Endert, A., et al.: The state of the art in integrating machine learning into visual analytics. In: Computer Graphics Forum, vol. 36, pp. 458–486. Wiley Online Library (2017) Endert, A., et al.: The state of the art in integrating machine learning into visual analytics. In: Computer Graphics Forum, vol. 36, pp. 458–486. Wiley Online Library (2017)
30.
Zurück zum Zitat Shiravi, H., Shiravi, A., Ghorbani, A.A.: A survey of visualization systems for network security. IEEE Trans. Vis. Comput. Graph. 18(8), 1313–1329 (2012)CrossRef Shiravi, H., Shiravi, A., Ghorbani, A.A.: A survey of visualization systems for network security. IEEE Trans. Vis. Comput. Graph. 18(8), 1313–1329 (2012)CrossRef
31.
Zurück zum Zitat Fischer, F., Keim, D.A.: NStreamAware: real-time visual analytics for data streams to enhance situational awareness. In: Proceedings of the Eleventh Workshop on Visualization for Cyber Security, pp.65–72. ACM (2014) Fischer, F., Keim, D.A.: NStreamAware: real-time visual analytics for data streams to enhance situational awareness. In: Proceedings of the Eleventh Workshop on Visualization for Cyber Security, pp.65–72. ACM (2014)
32.
Zurück zum Zitat Chen, S., Guo, C., Yuan, X., Merkle, F., Schaefer, H., Ertl, T.: OCEANS: online collaborative explorative analysis on network security. In: Proceedings of the Eleventh Workshop on Visualization for Cyber Security, pp. 1–8. ACM (2014) Chen, S., Guo, C., Yuan, X., Merkle, F., Schaefer, H., Ertl, T.: OCEANS: online collaborative explorative analysis on network security. In: Proceedings of the Eleventh Workshop on Visualization for Cyber Security, pp. 1–8. ACM (2014)
33.
Zurück zum Zitat Chen, S., et al.: User behavior map: visual exploration for cyber security session data (2018) Chen, S., et al.: User behavior map: visual exploration for cyber security session data (2018)
Metadaten
Titel
Towards the Creation of a Threat Intelligence Framework for Maritime Infrastructures
verfasst von
Nikolaos Pitropakis
Marios Logothetis
Gennady Andrienko
Jason Stefanatos
Eirini Karapistoli
Costas Lambrinoudakis
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-42048-2_4