RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
An overview of cyber attacks on critical cyber-physical systems and government infrastructures
Kharkiv National University of Radio Electronics, Ukraine.
Kharkiv National University of Radio Electronics, Ukraine.
Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för programvaruteknik.ORCID-id: 0000-0002-0120-5388
2026 (Engelska)Ingår i: Security and Safety, ISSN 2097-2121, Vol. 5, artikel-id 2026002Artikel i tidskrift (Refereegranskat) Published
Abstract [en]

This study aimed to analyze the nature, scale, and consequences of cyberattacks on critical cyber-physical systems in Ukraine over the past decade, using a methodology based on classifying attacks by type, threat actor (including Russian hacking groups Sandworm, Fancy Bear, and Ember Bear responsible for half of the 22 analyzed incidents), target sector, and temporal patterns. It also included comparative analysis of cyber defense strategies. The Chinese group Volt Typhoon also demonstrated high risk through living-off-the-land techniques. While phishing remained the primary attack vector (7 cases), sophisticated supply chain attacks like NotPetya caused significant damage, with the energy sector being most targeted (7 incidents) due to its strategic importance. Six attacks involved manipulation of Industrial Control Systems/Operational Technology protocols, while four employed destructive wiper malwares. The Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege (STRIDE) analysis of digital platforms concluded that modern challenges require innovative solutions like Cybersecurity Mesh Architecture, digital immunity systems, and artificial intelligence, along with international coordination, while addressing barriers such as legacy systems, workforce shortages, and regulatory fragmentation, ultimately providing an evidence base for improving cybersecurity strategies at national and international levels. 

Ort, förlag, år, upplaga, sidor
EDP Sciences, 2026. Vol. 5, artikel-id 2026002
Nyckelord [en]
Access controls, Cryptographic controls, Fault tolerance, Invasive software, Protection security and privacy protection
Nationell ämneskategori
Säkerhet, integritet och kryptologi Datorsystem
Forskningsämne
Programvaruteknik; Datavetenskap
Identifikatorer
URN: urn:nbn:se:bth-29229DOI: 10.1051/sands/2026002Scopus ID: 2-s2.0-105030940455OAI: oai:DiVA.org:bth-29229DiVA, id: diva2:2044275
Tillgänglig från: 2026-03-09 Skapad: 2026-03-09 Senast uppdaterad: 2026-03-10Bibliografiskt granskad

Open Access i DiVA

fulltext(1182 kB)44 nedladdningar
Filinformation
Filnamn FULLTEXT01.pdfFilstorlek 1182 kBChecksumma SHA-512
4cd08891ee7bb6cf687a73861505e271e6513a7f0203630e9cfc37dd57ca9fce043e1fed47768e74d527bb3a679e0434ea7cf6c52d929c96795691f4e051ce5f
Typ fulltextMimetyp application/pdf

Övriga länkar

Förlagets fulltextScopus

Person

Adamov, Oleksandr

Sök vidare i DiVA

Av författaren/redaktören
Adamov, Oleksandr
Av organisationen
Institutionen för programvaruteknik
Säkerhet, integritet och kryptologiDatorsystem

Sök vidare utanför DiVA

GoogleGoogle Scholar
Antalet nedladdningar är summan av nedladdningar för alla fulltexter. Det kan inkludera t.ex tidigare versioner som nu inte längre är tillgängliga.

doi
urn-nbn

Altmetricpoäng

doi
urn-nbn
Totalt: 4001 träffar
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf