Predicting Cyber-Attack using Cyber Situational Awareness: The Case of Independent Power Producers (IPPs)

被引:0
|
作者
Matey, Akwetey Henry [1 ]
Danquah, Paul [2 ]
Koi-Akrofi, Godfred Yaw [1 ]
机构
[1] Univ Profess Studies, Dept IT Studies, Accra UPSA, Madina, Ghana
[2] Heritage Christian Coll, Dept IT, Accra, Ghana
关键词
Internet of things; cyber situational awareness; critical infrastructures; power generation; cyber-attack; cyber security; human behavioural and independent power producers; PLS-SEM; VALIDITY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The increasing critical dependencies on Internetof-Things (IoT) have raised security concerns; its application on the critical infrastructures (CIs) for power generation has come under massive cyber-attack over the years. Prior research efforts to understand cybersecurity from Cyber Situational Awareness (CSA) perspective fail to critically consider the various Cyber Situational Awareness (CSA) security vulnerabilities from a human behavioural perspective in line with the CI. This study evaluates CSA elements to predict cyber-attacks in the power generation sector. Data for this research article was collected from IPPs using the survey method. The analysis method was employed through Partial Least Squares Structural Equation Modeling (PLS-SEM) to assess the proposed model. The results revealed negative effects on people and cyber-attack, but significant in predicting cyber-attacks. The study also indicated that information handling is significant and positively influences cyber-attack. The study also reveals no mediation effect between the association of People and Attack and Information and Attack. It could result from an effective cyber security control implemented by the IPPs. Finally, the study also shows no sign of network infrastructure cyber-attack predictions. The reasons could be because managers of IPPs had adequate access policies and security measures in place.
引用
收藏
页码:700 / 709
页数:10
相关论文
共 50 条
  • [21] Impact Analysis of a Bias Injection Cyber-Attack on a Power Plant
    Kontouras, Efstathios
    Tzes, Anthony
    Dritsas, Leonidas
    [J]. IFAC PAPERSONLINE, 2017, 50 (01): : 11094 - 11099
  • [22] Algorithmic Approaches to Characterizing Power Flow Cyber-Attack Vulnerabilities
    Tuttle, Michael
    Wicker, Braden
    Poshtan, Majid
    Callenes, Joseph
    [J]. 2019 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2019,
  • [23] Attack Graph Embedded Machine Learning Platform For Cyber Situational Awareness
    Haque, Ariful
    Shetty, Sachin
    Kamhoua, Charles A.
    Gold, Kimberly
    [J]. 2022 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2022,
  • [24] Cyber Situation Awareness: Modeling the Security Analyst in a Cyber-Attack Scenario through Instance-Based Learning
    Dutt, Varun
    Ahn, Young-Suk
    Gonzalez, Cleotilde
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXV, 2011, 6818 : 280 - 292
  • [25] Cyber-attack detection in healthcare using cyber-physical system and machine learning techniques
    AlZubi, Ahmad Ali
    Al-Maitah, Mohammed
    Alarifi, Abdulaziz
    [J]. SOFT COMPUTING, 2021, 25 (18) : 12319 - 12332
  • [26] Optimization of Cyber-Attack Detection Using the Deep Learning Network
    Van Duong, Lai
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (07): : 159 - 163
  • [27] A Cyber-Attack Detection System Using Late Fusion Aggregation Enabled Cyber-Net
    Prabha, P. Shanmuga
    Kumar, S. Magesh
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 36 (03): : 3100 - 3119
  • [28] Optimized cyber-attack detection method of power systems using sliding mode observer
    Adeli, Mahdieh
    Hajatipour, Majid
    Yazdanpanah, Mohammad Javad
    Hashemi-Dezaki, Hamed
    Shafieirad, Mohsen
    [J]. ELECTRIC POWER SYSTEMS RESEARCH, 2022, 205
  • [29] Modeling Cyber-Attack for SCADA Systems Using CoPNet Approach
    El Bouchti, Abdelali
    Haqiq, Abdelkrim
    [J]. PROCEEDINGS OF 2012 INTERNATIONAL CONFERENCE ON COMPLEX SYSTEMS (ICCS12), 2012, : 481 - 486
  • [30] Cyber-attack detection in healthcare using cyber-physical system and machine learning techniques
    Ahmad Ali AlZubi
    Mohammed Al-Maitah
    Abdulaziz Alarifi
    [J]. Soft Computing, 2021, 25 : 12319 - 12332