An Overview of Cyber Security Considerations and Vulnerabilities in Critical Infrastructure Systems and Potential Automated Mitigation - A Review
by Roberto Mazzolin 1,* and Asad Madni 2
1 RHEA Group, Ottawa, Canada
2 Samueli School of Engineering, UCLA, Los Angeles, California, USA
* Author to whom correspondence should be addressed.
Journal of Engineering Research and Sciences, Volume 1, Issue 4, Page # 09-21, 2022; DOI: 10.55708/js0104002
Keywords: Critical Infrastructure, Mitigation, Leadership
Received: 12 January 2022, Revised: 13 March 2022, Accepted: 31 March 2022, Published Online: 12 April 2022
APA Style
Mazzolin, R., & Madni, A. (2022, April). An Overview of Cyber Security Considerations and Vulnerabilities in Critical Infrastructure Systems and Potential Automated Mitigation – A Review. Journal of Engineering Research and Sciences, 1(4), 9–21. https://doi.org/10.55708/js0104002
Chicago/Turabian Style
Mazzolin, Roberto, and Asad Madni. “An Overview of Cyber Security Considerations and Vulnerabilities in Critical Infrastructure Systems and Potential Automated Mitigation – A Review.” Journal of Engineering Research and Sciences 1, no. 4 (April 2022): 9–21. https://doi.org/10.55708/js0104002.
IEEE Style
R. Mazzolin and A. Madni, “An Overview of Cyber Security Considerations and Vulnerabilities in Critical Infrastructure Systems and Potential Automated Mitigation – A Review,” Journal of Engineering Research and Sciences, vol. 1, no. 4, pp. 9–21, Apr. 2022, doi: 10.55708/js0104002.
Executive leadership in government, military and industry are faced with many difficult challenges when trying to understand the complex interaction of public and government security policies, the vulnerabilities in the wide array of key technologies supporting critical infrastructure upon which society is vitally dependent, and the identification of key cyber security trends that will need to be considered in the future. This invited paper discusses public policy issues related to the threat environment and provides a comprehensive description of the various cyber vulnerabilities and risks arising from a broad range of technologies supporting critical infrastructure and highlights key requirements and design principles desired from next generation automated defence capabilities. This document provides a unique review of key aspects related to these separate but interrelated subject areas that will hopefully provide greater context, background and clarity for senior decision makers responsible for shaping development agendas for their organizations.
- R. Mazzolin, A. Madni, “A Survey of Contemporary Cyber Security Vulnerabilities and Potential Approaches to Automated Defence”, IEEE SYSCON 2020 Conference, 2020, Montreal, Quebec, Canada
- Salvador Llopis Sanchez, Robert Mazzolin, Ioannis Kechaoglou, Douglas Wiemer, Wim Mees, Jean Muylaert. “Chapter 108-1 Cybersecurity Space Operation Center: Countering Cyber Threats in the Space Domain”, Springer Science and Business Media LLC, 2019.
- J. Kallberg, B. Thuraisingham, E. Lakomaa, “Societal CyberwarTheory Applied: The Disruptive Power of State Actor Aggression for Public Sector Information Security”, 2013 European Intelligence and Security Informatics Conference, 2013.
- Seth D. Baum, Ben Goertzel, and Ted G. Goertzel, 2011. “How long until human-level AI? Results from an expert assessment.” Technological Forecasting & Social Change, vol. 78, no.1 (January), pages 185-195, 2011.
- B. Benyo, D. Musliner, “Automated Self-Adaptation for Cyber Defense Pushing Adaptive Perimeter Protection Inward”, 2013 IEEE 7th International Conference on Self-Adaptation and Self-Organizing Systems Workshops, 9-13 Sept. 2013.
- M. Alsaleh, E. Al-Shaer, “Towards Automated Verification of Active Cyber Defense Strategies on Software Defined Networks”, SafeConfig’16, Oct 24, 2016.
- Christopher S. Oehmen, Thomas E. Carroll, Patrick C. Paulson, Daniel M. Best et al. “Behavior-dependent Routing”, Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, SafeConfig ’15, 2015.
- G.. Baldini, et al. “Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and a Way Ahead”, IEEE Communications Surveys and Tutorials, Vol 14, no 2, pp 355-379, 2012.
- T.Booth, K. Andersson, “Critical Infratructure Network DDOS Defense via Cognitive Learning”, 14th IEEE Annual Consumer Communications and Networking Conference (CCNC), Las Vegas, Nevada, USA, 2017.
- M. Atigehetchi, J. Griffith, I. Emmons, D. Mankins, R. Guidorizzi, “Federated Access to Cyber Observables for Detection of Targetted Attacks”, MILCOM 2014, October 2014.