Title: Review of cyber attacks classifications and threats analysis in cyber-physical systems

Authors: Mohammed Nasser Al-Mhiqani; Rabiah Ahmad; Zaheera Zainal Abidin; Nabeel Salih Ali; Karrar Hameed Abdulkareem

Addresses: Information Security and Networking Research Group (InFORSNET), Center for Advanced Computing Technology, Faculty of Information Communication Technology, Universiti Teknikal Malaysia Melaka, Melaka, Malaysia ' Information Security and Networking Research Group (InFORSNET), Center for Advanced Computing Technology, Faculty of Information Communication Technology, Universiti Teknikal Malaysia Melaka, Melaka, Malaysia ' Information Security and Networking Research Group (InFORSNET), Center for Advanced Computing Technology, Faculty of Information Communication Technology, Universiti Teknikal Malaysia Melaka, Melaka, Malaysia ' Information Technology Research and Development Centre, University of Kufa, AL-Najaf, Al-Kufa St, Iraq ' Agriculture College, University of Al-Muthana, Iraq

Abstract: Cyber-physical systems (CPSs) have been widely used in many different critical areas like smart grid, healthcare, aircraft and etc. and they played a significant role in our daily lives. However, the CPS systems currently are one of the critical hackers' targets that have a lot of incidents due of the high impacts of these systems. Several works have been conducted in CPS, but still, there is a lack of theories and tools that organisations and researchers can use to understand the nature of the new threats and the impacts of each danger. This article provides description of CPSs usage areas and security challenges in some of the critical CPS fields. Likewise, discusses frameworks and taxonomies that have been used for classifying cyber-attacks or incidents. As well, study and analyse threats that have been stated in the previous studies and research to understand the current status of the risks on CPS.

Keywords: cyber-physical systems; CPSs; cyber-attacks; CPS security challenges; incidents; threats analysis.

DOI: 10.1504/IJITST.2019.101827

International Journal of Internet Technology and Secured Transactions, 2019 Vol.9 No.3, pp.282 - 298

Received: 29 Sep 2017
Accepted: 18 Mar 2018

Published online: 28 Aug 2019 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article