About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
sesa 18(16): e1

Research Article

Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures

Download6141 downloads
Cite
BibTeX Plain Text
  • @ARTICLE{10.4108/eai.15-10-2018.155856,
        author={Leandros Maglaras and Mohamed Amine Ferrag and Abdelouahid Derhab and Mithun Mukherjee and Helge Janicke and Stylianos Rallis},
        title={Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures},
        journal={EAI Endorsed Transactions on Security and Safety},
        volume={5},
        number={16},
        publisher={EAI},
        journal_a={SESA},
        year={2018},
        month={10},
        keywords={Critical Infrastructures, Regulations, Cyber Security},
        doi={10.4108/eai.15-10-2018.155856}
    }
    
  • Leandros Maglaras
    Mohamed Amine Ferrag
    Abdelouahid Derhab
    Mithun Mukherjee
    Helge Janicke
    Stylianos Rallis
    Year: 2018
    Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures
    SESA
    EAI
    DOI: 10.4108/eai.15-10-2018.155856
Leandros Maglaras1,2,*, Mohamed Amine Ferrag3,4, Abdelouahid Derhab5, Mithun Mukherjee6, Helge Janicke1, Stylianos Rallis2
  • 1: Cyber Security Center, De Montfort University, Leicester, LE1 9BH, UK
  • 2: General Secretariat of Digital Policy, Ministry of Digital Policy Telecommunications and Media, Athens, Greece
  • 3: LabSTIC Laboratory, Guelma University, 24000 Guelma, Algeria
  • 4: LRS Laboratory, Badji Mokhtar-Annaba University, 23000 Annaba, Algeria
  • 5: Center of Excellence in Information Assurance (CoEIA), King Saud University, Saudi Arabia
  • 6: Guangdong University of Petrochemical Technology, Maoming 525000, China
*Contact email: leandros.maglaras@dmu.ac.uk

Abstract

As Critical National Infrastructures are becoming more vulnerable to cyber attacks, their protection becomes a significant issue for any organization as well as a nation. Moreover, the ability to attribute is a vital element of avoiding impunity in cyberspace. In this article, we present main threats to critical infrastructures along with protective measures that one nation can take, and which are classified according to legal, technical, organizational, capacity building, and cooperation aspects. Finally we provide an overview of current methods and practices regarding cyber attribution and cyber peace keeping.

Keywords
Critical Infrastructures, Regulations, Cyber Security
Received
2018-09-19
Accepted
2018-10-03
Published
2018-10-17
Publisher
EAI
http://dx.doi.org/10.4108/eai.15-10-2018.155856

Copyright © 2018 Leandros Maglaras et al., licensed to EAI. This is an open access article distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.

EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL