2020
DOI: 10.13052/jcsm2245-1439.912
|View full text |Cite
|
Sign up to set email alerts
|

Railway Defender Kill Chain to Predict and Detect Cyber-Attacks

Abstract: Most organizations focus on intrusion prevention technologies, with less emphasis on prediction and detection. This research looks at prediction and detection in the railway industry. It uses an extended cyber kill chain (CKC) model and an industrial control system (ICS) cyber kill chain for detection and proposes predictive technologies that will help railway organizations predict and recover from cyber-attacks. The extended CKC model consists of both internal and external cyber kill chain; breaking the chain… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
2

Relationship

2
7

Authors

Journals

citations
Cited by 14 publications
(11 citation statements)
references
References 35 publications
0
8
0
Order By: Relevance
“…135 Other. Other papers are qualitative (3 conceptual, 1 comparative study, and 1 case study) and consist of generalised security technologies, 136,137 cybersecurity issues and challenges, 15 cybersecurity maturity levels 138 and other security guidance within railways. 139 From the critical review process, it has been noticed that some of the authors have used CKC models to predict and detect cyberattacks which is an interesting model to explore more into.…”
Section: Case Study Signalling Interlocking Human Factormentioning
confidence: 99%
“…135 Other. Other papers are qualitative (3 conceptual, 1 comparative study, and 1 case study) and consist of generalised security technologies, 136,137 cybersecurity issues and challenges, 15 cybersecurity maturity levels 138 and other security guidance within railways. 139 From the critical review process, it has been noticed that some of the authors have used CKC models to predict and detect cyberattacks which is an interesting model to explore more into.…”
Section: Case Study Signalling Interlocking Human Factormentioning
confidence: 99%
“…The malware detection approaches have evolved over the years. While most research studies discuss the detection mechanisms, in [27], the use of prediction technologies using the cyber kill chain and industrial control system to reduce cyber-based attacks has been explained. This article discusses the detection approaches for Android malware analysis.…”
Section: Detection Approachesmentioning
confidence: 99%
“…Alternatively, the Kill-Chain modeling concept provides an approach for structuring multistage attacks aimed at disrupting or destroying vital processes or devices. Steps within the structure include gaining access to and information about the target system, developing and testing new capabilities on the compromised targets, exploiting vulnerabilities and moving laterally in the network, building Command and Control (C2) infrastructure, and acting on the objection (e.g., disrupting grid operations) [23].…”
Section: B Contextual Detection Of Cyber Incidentsmentioning
confidence: 99%