EconPapers    
Economics at your fingertips  
 

Review of Cyberattack Implementation, Detection, and Mitigation Methods in Cyber-Physical Systems

Namhla Mtukushe, Adeniyi K. Onaolapo, Anuoluwapo Aluko and David G. Dorrell ()
Additional contact information
Namhla Mtukushe: School of Electrical and Information Engineering, University of the Witwatersrand, Johannesburg 2000, South Africa
Adeniyi K. Onaolapo: Department of Electrical and Electronics Engineering Technology, University of Johannesburg, Johannesburg 2092, South Africa
Anuoluwapo Aluko: Power Research Laboratory, Department of Electrical and Software Engineering, University of Calgary, Calgary, AB T2N 1N4, Canada
David G. Dorrell: School of Electrical and Information Engineering, University of the Witwatersrand, Johannesburg 2000, South Africa

Energies, 2023, vol. 16, issue 13, 1-25

Abstract: With the rapid proliferation of cyber-physical systems (CPSs) in various sectors, including critical infrastructure, transportation, healthcare, and the energy industry, there is a pressing need for robust cybersecurity mechanisms to protect these systems from cyberattacks. A cyber-physical system is a combination of physical and cyber components, and a security breach in either component can lead to catastrophic consequences. Cyberattack detection and mitigation methods in CPSs involve the use of various techniques such as intrusion detection systems (IDSs), firewalls, access control mechanisms, and encryption. Overall, effective cyberattack detection and mitigation methods in CPSs require a comprehensive security strategy that considers the unique characteristics of a CPS, such as the interconnectedness of physical and cyber components, the need for real-time response, and the potential consequences of a security breach. By implementing these methods, CPSs can be better protected against cyberattacks, thus ensuring the safety and reliability of critical infrastructure and other vital systems. This paper reviews the various kinds of cyber-attacks that have been launched or implemented in CPSs. It reports on the state-of-the-art detection and mitigation methods that have been used or proposed to secure the safe operation of various CPSs. A summary of the requirements that CPSs need to satisfy their operation is highlighted, and an analysis of the benefits and drawbacks of model-based and data-driven techniques is carried out. The roles of machine learning in cyber assault are reviewed. In order to direct future study and motivate additional investigation of this increasingly important subject, some challenges that have been unaddressed, such as the prerequisites for CPSs, an in-depth analysis of CPS characteristics and requirements, and the creation of a holistic review of the different kinds of attacks on different CPSs, together with detection and mitigation algorithms, are discussed in this review.

Keywords: cyber-attack; cybersecurity; cyber-physical systems; detection (search for similar items in EconPapers)
JEL-codes: Q Q0 Q4 Q40 Q41 Q42 Q43 Q47 Q48 Q49 (search for similar items in EconPapers)
Date: 2023
References: View references in EconPapers View complete reference list from CitEc
Citations: View citations in EconPapers (1)

Downloads: (external link)
https://www.mdpi.com/1996-1073/16/13/5206/pdf (application/pdf)
https://www.mdpi.com/1996-1073/16/13/5206/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jeners:v:16:y:2023:i:13:p:5206-:d:1188340

Access Statistics for this article

Energies is currently edited by Ms. Agatha Cao

More articles in Energies from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jeners:v:16:y:2023:i:13:p:5206-:d:1188340