Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Cyberattack Models for Ship Equipment Based on the MITRE ATT&CK Framework

Full metadata record
DC Field Value Language
dc.contributor.authorJo, Yonghyun-
dc.contributor.authorChoi, Oongjae-
dc.contributor.authorYou, Jiwoon-
dc.contributor.authorCha, Youngkyun-
dc.contributor.authorLee, Dong Hoon-
dc.date.accessioned2022-08-14T08:40:17Z-
dc.date.available2022-08-14T08:40:17Z-
dc.date.created2022-08-12-
dc.date.issued2022-03-
dc.identifier.issn1424-8220-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/143129-
dc.description.abstractCybersecurity is important on ships that use information and communication technology. On such ships, the work, control, and sensor systems are connected for steering, navigation, and cargo management inside the hull, and a cyberattack can have physical consequences such as sinking and crashing. Research on ship cybersecurity is a new challenge, and related studies are lacking. Cyberattack models can provide better insight. With this study, we aim to introduce a cyberattack analysis method based on the MITRE ATT&CK framework so that a cyberattack model for ships can be established. In addition, we identify the characteristics of the attack phase by analyzing cases of hacking and vulnerability research for ship systems using tactics, techniques, and procedures, and suggest the minimum measures essential for defense. Using the ship cyberattack model, we aim to identify the characteristics of the systems used for ship navigation, communication, and control; provide an understanding of the threats and vulnerabilities; and suggest mitigation measures through the proposed model. We believe the results of this study could guide future research.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherMDPI-
dc.subjectSECURITY APPROACH-
dc.subjectCYBER SECURITY-
dc.subjectCYBERSECURITY-
dc.titleCyberattack Models for Ship Equipment Based on the MITRE ATT&CK Framework-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, Dong Hoon-
dc.identifier.doi10.3390/s22051860-
dc.identifier.scopusid2-s2.0-85125189640-
dc.identifier.wosid000768535300001-
dc.identifier.bibliographicCitationSENSORS, v.22, no.5-
dc.relation.isPartOfSENSORS-
dc.citation.titleSENSORS-
dc.citation.volume22-
dc.citation.number5-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.isOpenAccessY-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaChemistry-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaInstruments & Instrumentation-
dc.relation.journalWebOfScienceCategoryChemistry, Analytical-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryInstruments & Instrumentation-
dc.subject.keywordPlusSECURITY APPROACH-
dc.subject.keywordPlusCYBER SECURITY-
dc.subject.keywordPlusCYBERSECURITY-
dc.subject.keywordAuthormaritime cybersecurity-
dc.subject.keywordAuthorcyber threat-
dc.subject.keywordAuthorMITRE ATT &amp-
dc.subject.keywordAuthorCK-
dc.subject.keywordAuthorinformation sharing-
dc.subject.keywordAuthorsecurity risk analysis-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Dong Hoon photo

Lee, Dong Hoon
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE