Special Issues
Table of Content

Cybersecurity for Cyber-attacks in Critical Applications in Industry

Submission Deadline: 31 December 2023 (closed) View: 329

Guest Editors

Prof. Tri Gia Nguyen, FPT University, Vietnam.
Dr. Tra Huong Thi Le, Kyung Hee University, Korea.
Prof. Chakchai So-In, Khon Kaen University, Thailand.

Summary

As we are moving towards a world full of software and internet applications, we are increasing the chances of cyber threats and breaches. Nowadays, cyber security problems are happening more in targeted critical sectors of the world, including the energy and utility sector, defence, transportation, communication, finance, and many more. These industries are critical by their value and importance to the society on which we depend more. Hence, attackers focus mainly on these industries for ransomware attacks and hacking data. In recent years many attacks have been recorded in the food processing companies, solar-wind generation facilities, and many more crippling the users and service providers. Thus the need for enhanced and more secured connectivity is required for protecting potential security threats and breaches. With the growth of information technologies, we can design and build robust security gateways to prevent hackers from getting into critical industrial applications.


While looking from a business perspective, businesses like E-commerce, finance, and retail, we witness many threats with access to Omnichannel and networking of the supply chains where loads of consumer and financial data are stored. Usually, this is more often applicable to small-scale enterprises without any cyber-security systems on priority. Millions of losses are inherited by industries if no cyber-security systems are built for business. As information technology grows and improves connectivity, the complexity of the threat also increases gradually. The emergence of IoT and smart city infrastructures for critical industries expands the surface of threat and breach attacks inviting cyber warfare and crimes. However, the growth of legacy technologies and systems improves the operational frameworks and gateway points with advanced firewalls protecting the crucial sectors. The layered vigilance and resilience of the advanced networks with ML and AI solutions are helping critical industries to identify threats prior to happening and respond to the system, effectively protecting the servers. Protecting vital infrastructures is crucial when it is shared on a public source. However, with these critical sectors' adequate security monitoring systems through advanced government protocols and intelligent cyber systems, we can prevent thefts, crashes, enhance privacy, secure infrastructures from malware attacks, and protect the central systems efficiently.


Furthermore, the need for internal resources and training among critical industrial applications is an obstacle in preventing cyber threats. Undermining the national securities is possible without a proper CNI system enabled in the critical infrastructures while installed through third parties. Prioritizing cost and leaving the security networks without up-gradation would lead to catastrophic consequences to the networks. Lack of personal and situational awareness can be one of the primary concerns for critical industries when stabilizing cyber securities. Henceforth, we will require more platform research for building resilient critical infrastructures with effective cyber-secure networks and protocols. This special issue enumerates the importance of cybersecurity on critical industrial infrastructures and invites researchers to present innovative solutions to overcome cybersecurity threats and breaches for future resilient critical sectors.


Keywords

I. Advances of cyber security protocols for critical industrial sectors
II. Effective cyber security models to protect critical energy sectors against threats
III. Emerging trends of cybersecurity with Artificial intelligence and Machine learning
IV. New frontiers of cyber security for financial industries
V. Cybersecurity and its impact on small scale business enterprises
VI. Effective security measures for protecting healthcare industries
VII. Cybersecurity for banking and credit business
VIII. Breach prevention and firewall advances for critical industrial applications
IX. Critical challenges of cybersecurity protocols for defence and natural security
X. Cloud vulnerability and its impact on cyber security threats
XI. Advanced cyber security trends to protect industries against hacking and ransomware attacks

Published Papers


  • Open Access

    ARTICLE

    Software Vulnerability Mining and Analysis Based on Deep Learning

    Shibin Zhao, Junhu Zhu, Jianshan Peng
    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 3263-3287, 2024, DOI:10.32604/cmc.2024.041949
    (This article belongs to the Special Issue: Cybersecurity for Cyber-attacks in Critical Applications in Industry)
    Abstract In recent years, the rapid development of computer software has led to numerous security problems, particularly software vulnerabilities. These flaws can cause significant harm to users’ privacy and property. Current security defect detection technology relies on manual or professional reasoning, leading to missed detection and high false detection rates. Artificial intelligence technology has led to the development of neural network models based on machine learning or deep learning to intelligently mine holes, reducing missed alarms and false alarms. So, this project aims to study Java source code defect detection methods for defects like null pointer… More >

  • Open Access

    ARTICLE

    Big Data Access Control Mechanism Based on Two-Layer Permission Decision Structure

    Aodi Liu, Na Wang, Xuehui Du, Dibin Shan, Xiangyu Wu, Wenjuan Wang
    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1705-1726, 2024, DOI:10.32604/cmc.2024.049011
    (This article belongs to the Special Issue: Cybersecurity for Cyber-attacks in Critical Applications in Industry)
    Abstract Big data resources are characterized by large scale, wide sources, and strong dynamics. Existing access control mechanisms based on manual policy formulation by security experts suffer from drawbacks such as low policy management efficiency and difficulty in accurately describing the access control policy. To overcome these problems, this paper proposes a big data access control mechanism based on a two-layer permission decision structure. This mechanism extends the attribute-based access control (ABAC) model. Business attributes are introduced in the ABAC model as business constraints between entities. The proposed mechanism implements a two-layer permission decision structure composed… More >

  • Open Access

    ARTICLE

    A Holistic Secure Communication Mechanism Using a Multilayered Cryptographic Protocol to Enhanced Security

    Fauziyah, Zhaoshun Wang, Mujahid Tabassum
    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4417-4452, 2024, DOI:10.32604/cmc.2024.046797
    (This article belongs to the Special Issue: Cybersecurity for Cyber-attacks in Critical Applications in Industry)
    Abstract In an era characterized by digital pervasiveness and rapidly expanding datasets, ensuring the integrity and reliability of information is paramount. As cyber threats evolve in complexity, traditional cryptographic methods face increasingly sophisticated challenges. This article initiates an exploration into these challenges, focusing on key exchanges (encompassing their variety and subtleties), scalability, and the time metrics associated with various cryptographic processes. We propose a novel cryptographic approach underpinned by theoretical frameworks and practical engineering. Central to this approach is a thorough analysis of the interplay between Confidentiality and Integrity, foundational pillars of information security. Our method… More >

  • Open Access

    ARTICLE

    Unknown DDoS Attack Detection with Fuzzy C-Means Clustering and Spatial Location Constraint Prototype Loss

    Thanh-Lam Nguyen, Hao Kao, Thanh-Tuan Nguyen, Mong-Fong Horng, Chin-Shiuh Shieh
    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2181-2205, 2024, DOI:10.32604/cmc.2024.047387
    (This article belongs to the Special Issue: Cybersecurity for Cyber-attacks in Critical Applications in Industry)
    Abstract Since its inception, the Internet has been rapidly evolving. With the advancement of science and technology and the explosive growth of the population, the demand for the Internet has been on the rise. Many applications in education, healthcare, entertainment, science, and more are being increasingly deployed based on the internet. Concurrently, malicious threats on the internet are on the rise as well. Distributed Denial of Service (DDoS) attacks are among the most common and dangerous threats on the internet today. The scale and complexity of DDoS attacks are constantly growing. Intrusion Detection Systems (IDS) have… More >

  • Open Access

    ARTICLE

    An Industrial Intrusion Detection Method Based on Hybrid Convolutional Neural Networks with Improved TCN

    Zhihua Liu, Shengquan Liu, Jian Zhang
    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 411-433, 2024, DOI:10.32604/cmc.2023.046237
    (This article belongs to the Special Issue: Cybersecurity for Cyber-attacks in Critical Applications in Industry)
    Abstract Network intrusion detection systems (NIDS) based on deep learning have continued to make significant advances. However, the following challenges remain: on the one hand, simply applying only Temporal Convolutional Networks (TCNs) can lead to models that ignore the impact of network traffic features at different scales on the detection performance. On the other hand, some intrusion detection methods consider multi-scale information of traffic data, but considering only forward network traffic information can lead to deficiencies in capturing multi-scale temporal features. To address both of these issues, we propose a hybrid Convolutional Neural Network that supports… More >

  • Open Access

    ARTICLE

    Blockchain-Based Cognitive Computing Model for Data Security on a Cloud Platform

    Xiangmin Guo, Guangjun Liang, Jiayin Liu, Xianyi Chen
    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3305-3323, 2023, DOI:10.32604/cmc.2023.044529
    (This article belongs to the Special Issue: Cybersecurity for Cyber-attacks in Critical Applications in Industry)
    Abstract Cloud storage is widely used by large companies to store vast amounts of data and files, offering flexibility, financial savings, and security. However, information shoplifting poses significant threats, potentially leading to poor performance and privacy breaches. Blockchain-based cognitive computing can help protect and maintain information security and privacy in cloud platforms, ensuring businesses can focus on business development. To ensure data security in cloud platforms, this research proposed a blockchain-based Hybridized Data Driven Cognitive Computing (HD2C) model. However, the proposed HD2C framework addresses breaches of the privacy information of mixed participants of the Internet of… More >

  • Open Access

    ARTICLE

    Programmable Logic Controller Block Monitoring System for Memory Attack Defense in Industrial Control Systems

    Mingyu Lee, Jiho Shin, Jung Taek Seo
    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2427-2442, 2023, DOI:10.32604/cmc.2023.041774
    (This article belongs to the Special Issue: Cybersecurity for Cyber-attacks in Critical Applications in Industry)
    Abstract Cyberattacks targeting industrial control systems (ICS) are becoming more sophisticated and advanced than in the past. A programmable logic controller (PLC), a core component of ICS, controls and monitors sensors and actuators in the field. However, PLC has memory attack threats such as program injection and manipulation, which has long been a major target for attackers, and it is important to detect these attacks for ICS security. To detect PLC memory attacks, a security system is required to acquire and monitor PLC memory directly. In addition, the performance impact of the security system on the… More >

Share Link