Evolving Cybersecurity Strategies: Analyzing Trends in Critical Infrastructure Attacks and Defense Mechanisms

Authors

  • Attila Mate Kovacs

Keywords:

Cybersecurity, Critical Infrastructure, Longitudinal Analysis, Attack Vectors, Mitigation Strategies.

Abstract

This paper provides a year-based analysis of the incidents directed toward essential infrastructures and their direction. It identifies tactics that may be utilized to avoid such cases. Through the collection of a plethora of historical and incidence data that has been collected and analyzed, the study brings invaluable information to the table as it seeks to inform future cybersecurity policies and measures. To explain more about the approach of cybercriminals over the past six years, the research employs a deception network coupled with a careful study of attack patterns to establish the evolution in the strategies. Utilizing a data-driven instrument that scores a network subject's geographic, organizational, and behavioral factors, the study presents a complex method of categorizing and describing the creation of network anomalies and the interrelations and dynamics of variations within a network. Preliminary observations point to an elevation of the planned and selective attack approximate, underlining the need for progressive approaches to cybersecurity. Applying the findings in this work makes it important to establish proactive approaches to protecting the existing threat vectors and enhancing the reliability of Communicate infrastructures. This paper not only contributes to the theoretical knowledge base of cybersecurity risks but also offers resourceful guidelines in corporate, governmental, and other organizational spheres to strengthen the protection of cyber systems.

Downloads

Download data is not yet available.

References

Makrakis, Georgios Michail, Constantinos Kolias, Georgios Kambourakis, Craig Rieger, and Jacob Benjamin. "Industrial and critical infrastructure security: Technical analysis of real-life security incidents." Ieee Access 9 (2021): 165295-165325.

Li, Ye, Yu Tu, Qi Fan, Changyin Dong, and Wei Wang. "Influence of cyber-attacks on longitudinal safety of connected and automated vehicles." Accident Analysis & Prevention 121 (2018): 148-156.

Madnick, Benjamin, Keman Huang, and Stuart Madnick. "The evolution of global cybersecurity norms in the digital age: A longitudinal study of the cybersecurity norm development process." Information Security Journal: A Global Perspective 33, no. 3 (2024): 204-225.

Kuypers, Marshall A., Thomas Maillart, and Elisabeth Paté-Cornell. "An empirical analysis of cyber security incidents at a large organization." Department of Management Science and Engineering, Stanford University, School of Information, UC Berkeley 30 (2016).

Falowo, Olufunsho I., Murat Ozer, Chengcheng Li, and Jacques Bou Abdo. "Evolving Malware & DDoS Attacks: Decadal Longitudinal Study." IEEE Access (2024).

Edwards, Benjamin, Steven Hofmeyr, Stephanie Forrest, and Michel Van Eeten. "Analyzing and modeling longitudinal security data: Promise and pitfalls." In Proceedings of the 31st Annual Computer Security Applications Conference, pp. 391-400. 2015.

Walker-Roberts, Steven, Mohammad Hammoudeh, and Ali Dehghantanha. "A systematic review of the availability and efficacy of countermeasures to internal threats in healthcare critical infrastructure." IEEE Access 6 (2018): 25167-25177.

Moore, Erik, Steven Fulton, and Dan Likarish. "Evaluating a multi agency cyber security training program using pre-post event assessment and longitudinal analysis." In Information Security Education for a Global Digital Society: 10th IFIP WG 11.8 World Conference, WISE 10, Rome, Italy, May 29-31, 2017, Proceedings 10, pp. 147-156. Springer International Publishing, 2017.

Farokhnia Hamedani, M. Essays on Cybersecurity and Information Privacy. ProQuest Dissertations Publishing, University of South Florida, 2023. 30421027.

Rosa, F. R. Global Internet Interconnection Infrastructure: Materiality, Concealment, and Surveillance in Contemporary Communication. ProQuest Dissertations Publishing, American University, 2019. 13902857.

Adewopo, V. Exploring Open Source Intelligence for Cyber Threat Prediction. ProQuest Dissertations Publishing, University of Cincinnati, 2021. 28890231.

Cho, S. Tackling Network-Level Adversaries Using Models and Empirical Observations. ProQuest Dissertations Publishing, State University of New York at Stony Brook, 2021. 28718487.

[13] Muoi, T. D. Handling Network Attacks Exploiting Routing Information Asymmetries. ProQuest Dissertations Publishing, National University of Singapore (Singapore), 2022. 29352339.

Li, G. An Empirical Analysis on Threat Intelligence: Data Characteristics and Real-World Uses. ProQuest Dissertations Publishing, University of California, San Diego, 2020. 27955013.

Hillis, J. S. Enterprise Advanced Persistent Threat Group Identification and Technique Discovery. ProQuest Dissertations Publishing, Marymount University, 2023. 30484790.

Alsarhan, H. F. Real-Time Machine Learning-based Intrusion Detection System (IDS) for Internet of Things (IoT) Networks. ProQuest Dissertations Publishing, The George Washington University, 2023. 30000678.

Al-Haija, Q. A.; Krichen, M.; Elhaija, W. A. Machine-Learning-Based Darknet Traffic Detection System for IoT Applications. Electronics, 11(4), 556. DOI: 10.3390/electronics11040556.

Luitel, A. A Framework for Modeling Data Breach Risk Using Machine Learning Models for High-Dimensional Panel Data. ProQuest Dissertations Publishing, The George Washington University, 2022. 28865998.

Ongun, T. Resilient Machine Learning Methods for Cyber-Attack Detection. ProQuest Dissertations Publishing, Northeastern University, 2023. 30418436.

Mengidis, N.; Panagiotou, P.; Tsikrika, T.; Vrochidis, S.; Kompatsiaris, I. Host-based Intrusion Detection Using Signaturebased and AI-driven Anomaly Detection Methods. Information & Security, 50(1), 37-48. DOI: 10.11610/isij.5016.

Panagiotou, P.; Mengidis, N.; Tsikrika, T.; Vrochidis, S.; Kompatsiaris, I. An in Depth Analysis of Open Source Tools: Host Intrusion Detection System, Intrusion Detection System, and Honeypots, and How They Can Protect a SME’s Network.

ProQuest Dissertations Publishing, Utica College, 2019. 22622076.

Butt, S. M.; Reaiche, C. Cognitive Analysis of Intrusion Detection System. Journal of Siberian Federal University. Engineering & Technologies, 15(1), 102-120. DOI: 10.17516/1999-494X-0377.

Barron, T. Addressing the Imbalance between Attackers and Defenders Using Cyber Deception. ProQuest Dissertations Publishing, State University of New York at Stony Brook, 2020. 28091212.

Bobish, M. Sharing Cyber Threat Information Between the United States’ Public and Private Sectors. ProQuest Dissertations Publishing, Utica University, 2023. 30488959.

Alowaisheq, E. Security Traffic Analysis Through the Lenses Of: Defenders, Attackers, and Bystanders. ProQuest Dissertations Publishing, Indiana University, 2020. 28259642.

Downloads

Published

12.06.2024

How to Cite

Attila Mate Kovacs. (2024). Evolving Cybersecurity Strategies: Analyzing Trends in Critical Infrastructure Attacks and Defense Mechanisms. International Journal of Intelligent Systems and Applications in Engineering, 12(4), 2941–2952. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/6779

Issue

Section

Research Article