학술논문

A classification of cybersecurity strategies in the context of discrete event systems.
Document Type
Journal
Author
Oliveira, Samuel (BR-UDESC-GEE) AMS Author Profile; Leal, André B. (BR-UDESC-GEE) AMS Author Profile; Teixeira, Marcelo (BR-UTFPR3-GPE) AMS Author Profile; Lopes, Yuri K. (BR-UDESC-GAC) AMS Author Profile
Source
Annual Reviews in Control (Annu. Rev. Control) (20230101), 56, Paper No 100907, 19~pp. ISSN: 1367-5788 (print).eISSN: 1872-9088.
Subject
68 Computer science -- 68Q Theory of computing
  68Q85 Models and methods for concurrent and distributed computing

93 Systems theory; control
  93-02 Research exposition

94 Information and communication, circuits -- 94A Communication, information
  94A60 Cryptography
Language
English
Abstract
Summary: ``In recent years, cybersecurity has received increasing attention due to the demand from a large class of networked systems for resilience against cyberattacks that may compromise privacy, integrity and availability. Many of these systems are abstracted as Discrete Event Systems (DES) as their evolution occurs through the occurrence of discrete events. Since they use communication networks and consequently may be vulnerable to attacks, cybersecurity must be considered in DES. Based on this challenging scenario, this work focuses on cybersecurity strategies in the context of DES. A systematic literature mapping (SLM) was carried out, which selected 208 papers on the aforementioned topic. These papers were analyzed and categorized regarding the characteristics of each cybersecurity strategy, the types of attacks considered and also the modeling formalism used. The primary objective of this work is to collect all relevant research in the literature to provide the state of the art on cybersecurity strategies for DES, as well as identify research trends and directions for future work on the topic. The results show that the majority of the selected papers present cybersecurity methods based on the strategy of protecting systems against passive attacks, using automata as the modeling formalism. In contrast, the topic of active attacks has gained attention in recent years, with an increasing number of papers published in several journals and conferences. Finally, research gaps and challenges are presented to provide future directions in the domain of the cybersecurity of DES.''