Model structure of threats to resources of information and telecommunication networks as a basic asset of a critically important infrastructure facility

DOI: 10.31673/2412-9070.2023.011320

  • Шавловський Я. С. (Shavlovskyi Ya. S.) State University of Telecommunications, Kyiv

Abstract

The paper classifies the models of cyberattacks aimed at computer networks and complexes and which represent the greatest threat. A classification based on the main trends in the practical implementation of cyberattacks is proposed. This approach is new for the classification of cyberattacks on computer networks and complexes that serve critical infrastructure objects and takes into account ten components of the threat cycle: from a comprehensive study of the object of influence to the implementation of a cyberattack.

Keywords: critical infrastructure object; information and communication system; classification; classifier; information and telecommunication network; computer network; information protection; cyberspace; computer cyberattack; network device.

References
1. Paulauskas N., Garsva E. Computer system attack classification // Electronics and Electrical Engineering.
2. Jang Wei., Zhi-Hong Tian, Xiang Cui. DMAT: a new network and computer attack classification // Journal of Engineering Science and Technology Review. 2013. №6(5). Р. 101–106.
3. AVOIDIT: a cyber attack taxonomy / C. Simmons, C. Ellis, S. Shiva [et al.] // Department of Computer Science University of Memphis, TN, USA. URL: http://www.teraits.com/pitagoras/marcio/segapp/CyberAttackTaxonomy_IEEE_Mag.pdf.
4. Joinia Mouna, Latifa Ben Arfa Rabaia, Anis Ben Aissab. Classification of security threats in information systems // 5-th International Conference on Ambient Systems, Networks and Technologie (ANT-2014).
5. A computer network attack taxonomy and ontology / R. van Heerden, B. Irwin, ID Burke, L. Leenen // International Journal of Cyber Warfare and Terrorism.
6. Common cyber attacks reducing the impact. URL: https://www.ncsc.gov.uk/guidance/white -papers/common-cyber-attacks-reducing-impact (дата звернення 10.04.20).
7. loannis A., Nurse J. R. C., Goldsmith M. A taxonomy of cyber-harms defining the impacts of cyberattacks and understanding how they propagate // Journal of Cybersecurity.
8. Pienta D., Johnston A. C. A taxonomy of phishing attack types spanning economic, temporal, breadth, and target boundaries // Association for information Systems AIS Electronic Library.
9. Cybersecurity Incident Taxonomy NIS Cooparation Group // CG Publication, 04/2018.
10. Applegate S. D., Stavrou A. Towards a cyber conflict taxonomy // 5th International Conference of Cyber Conflict, 2013.
11. Harry C., Gallagher N. Classifying cyber events a proposed taxonomy // CISSM Working Paper, 2018.
12. Aruna M., Gayathri K., Inbavalli M. Network security and types of attacks in network security // IOSR Journal of Engineering (IOSRJEN).
13. Cyber risk definition and classification for financial risk management / F. Curti, J. Gerlach, S. Kazzinik [et al.] // Federal Reserve Bank of Richmond.
14. Basumallik S. A taxonomy of data attacks in power systems // Systems and Control. Pub. Date: 2020-02-25. URL: https://www.x-mol.com/paper/1232734050568916992.
15. Cyber attack taxonomy for digital environment in nuclear power plants / S. Kim, G. Heo, E. Zio [et al.] // ELSEVIER Nuclear Engineering and Technology. 50(2020)/ P. 995–1001.
16. Douad M. A., Dahmani Y. ARTT taxonomy and cyber-attack framework / Mohamed Amine Douad // 2015 First International Conference on New Technologies of information and Communication (NTIC).
17. Zhu Bonnie, Anthony Joseph, Shankar Sastru. A taxonomy of cyber attacks on SCADA systems // 2011 International Conference on Internet of Thigs and 4th International Conference on Cyber, Physical and Social Computing.
18. A novel approach for network attack classification / Md Mehedi Hassan Onik, Nasr AL-Zaben, Hung Ohan Hoo, Chul-Soo Kim // Annals of Emerging Technologies in Computing (AETiC). 2018. vol. 2/ No. 2.
19. A Cyber – Kill-Chain based taxonomy of crypto-ransomware features / T. Dargahi, All Dehghantanha, Pooneh Nikkhah Bahrami [et al.] // Journal of Computer Virology and Hacking Techniques. 2019. №5. P. 277–305.
20. A taxonomy and survey of attacks against machine learning / N. Pitropakis, E. Panaousis, Th. Giannetsos [et al.] // ELSEVIER Computers Scuence Review. 2019.
21. Chapman lan M., Sylvain P. Leblanc, A. Partington. Taxonomy of cyber attacks and simulation of their effects // 2011 Spring Simulation Multi-Conference, SpringSim 11.

Section
Articles