IDEAS home Printed from https://ideas.repec.org/a/gam/jftint/v15y2023i4p144-d1118514.html
   My bibliography  Save this article

Opportunities for Early Detection and Prediction of Ransomware Attacks against Industrial Control Systems

Author

Listed:
  • Mazen Gazzan

    (Department of Computer Science, College of Engineering, University of Idaho, Moscow, ID 83844, USA
    College of Computer Science and Information Systems, Najran University, Najran P.O. Box 1988, Saudi Arabia)

  • Frederick T. Sheldon

    (Department of Computer Science, College of Engineering, University of Idaho, Moscow, ID 83844, USA)

Abstract

Industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems, which control critical infrastructure such as power plants and water treatment facilities, have unique characteristics that make them vulnerable to ransomware attacks. These systems are often outdated and run on proprietary software, making them difficult to protect with traditional cybersecurity measures. The limited visibility into these systems and the lack of effective threat intelligence pose significant challenges to the early detection and prediction of ransomware attacks. Ransomware attacks on ICS and SCADA systems have become a growing concern in recent years. These attacks can cause significant disruptions to critical infrastructure and result in significant financial losses. Despite the increasing threat, the prediction of ransomware attacks on ICS remains a significant challenge for the cybersecurity community. This is due to the unique characteristics of these systems, including the use of proprietary software and limited visibility into their operations. In this review paper, we will examine the challenges associated with predicting ransomware attacks on industrial systems and the existing approaches for mitigating these risks. We will also discuss the need for a multi-disciplinary approach that involves a close collaboration between the cybersecurity and ICS communities. We aim to provide a comprehensive overview of the current state of ransomware prediction on industrial systems and to identify opportunities for future research and development in this area.

Suggested Citation

  • Mazen Gazzan & Frederick T. Sheldon, 2023. "Opportunities for Early Detection and Prediction of Ransomware Attacks against Industrial Control Systems," Future Internet, MDPI, vol. 15(4), pages 1-18, April.
  • Handle: RePEc:gam:jftint:v:15:y:2023:i:4:p:144-:d:1118514
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1999-5903/15/4/144/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1999-5903/15/4/144/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Nai Fovino, Igor & Carcano, Andrea & Masera, Marcelo & Trombetta, Alberto, 2009. "An experimental investigation of malware attacks on SCADA systems," International Journal of Critical Infrastructure Protection, Elsevier, vol. 2(4), pages 139-145.
    2. Yahye Abukar Ahmed & Shamsul Huda & Bander Ali Saleh Al-rimy & Nouf Alharbi & Faisal Saeed & Fuad A. Ghaleb & Ismail Mohamed Ali, 2022. "A Weighted Minimum Redundancy Maximum Relevance Technique for Ransomware Early Detection in Industrial IoT," Sustainability, MDPI, vol. 14(3), pages 1-15, January.
    3. Qasem Abu Al-Haija & Abdallah A. Smadi & Mohammed F. Allehyani, 2021. "Meticulously Intelligent Identification System for Smart Grid Network Stability to Optimize Risk Management," Energies, MDPI, vol. 14(21), pages 1-19, October.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Mazen Gazzan & Frederick T. Sheldon, 2023. "An Enhanced Minimax Loss Function Technique in Generative Adversarial Network for Ransomware Behavior Prediction," Future Internet, MDPI, vol. 15(10), pages 1-18, September.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Singh, Abhishek Narain & Gupta, M.P. & Ojha, Amitabh, 2014. "Identifying critical infrastructure sectors and their dependencies: An Indian scenario," International Journal of Critical Infrastructure Protection, Elsevier, vol. 7(2), pages 71-85.
    2. Asad Hussain & Sunila Fatima Ahmad & Mishal Tanveer & Ansa Sameen Iqbal, 2022. "Computer Malware Classification, Factors, and Detection Techniques: A Systematic Literature Review (SLR)," International Journal of Innovations in Science & Technology, 50sea, vol. 4(3), pages 899-918, August.
    3. Mazen Gazzan & Frederick T. Sheldon, 2023. "An Enhanced Minimax Loss Function Technique in Generative Adversarial Network for Ransomware Behavior Prediction," Future Internet, MDPI, vol. 15(10), pages 1-18, September.
    4. Ma, Shuyang & Li, Yan & Du, Liang & Wu, Jianzhong & Zhou, Yue & Zhang, Yichen & Xu, Tao, 2022. "Programmable intrusion detection for distributed energy resources in cyber–physical networked microgrids," Applied Energy, Elsevier, vol. 306(PB).
    5. Nan, Cen & Eusgeld, Irene & Kröger, Wolfgang, 2013. "Analyzing vulnerabilities between SCADA system and SUC due to interdependencies," Reliability Engineering and System Safety, Elsevier, vol. 113(C), pages 76-93.
    6. Knowles, William & Prince, Daniel & Hutchison, David & Disso, Jules Ferdinand Pagna & Jones, Kevin, 2015. "A survey of cyber security management in industrial control systems," International Journal of Critical Infrastructure Protection, Elsevier, vol. 9(C), pages 52-80.
    7. Mohandes, Baraa & Hammadi, Reem Al & Sanusi, Wasiu & Mezher, Toufic & Khatib, Sameh El, 2018. "Advancing cyber–physical sustainability through integrated analysis of smart power systems: A case study on electric vehicles," International Journal of Critical Infrastructure Protection, Elsevier, vol. 23(C), pages 33-48.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:15:y:2023:i:4:p:144-:d:1118514. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.