Models in this category utilise AI and ML techniques as their primary analysis method. The vast majority of the studies (47%) and their proposed models belong to the AI/ML category. Due to the number of papers and the variety of techniques applied to this category, we further classified them based on the specific AI or ML method they utilised. This resulted in the adoption of the following subcategories: Bayesian networks, attack trees, neural networks, artificial immunity, and association analysis. For those models that utilise multiple techniques, such as incremental learning algorithms in cases of incomplete or missing data, we classified them based on their primary analysis method.
Table 3 presents the number of papers that belong to each subcategory and the respective percentage.
4.1.1. Bayesian Networks
Cam et al. [
16] proposed a mission assurance policy, that adapts to the dynamic security status of all assets using a Petri net model along with binary or multilevel logic decision, to determine the security status of cyber assets. The main goal of the proposed model was to determine if a mission could be completed. Mission assurance policy is the continuous assessment of cyber assets which are necessary for an organisation to fulfil specific tasks. Assets fulfil certain tasks, which accomplish specific missions accordingly. This quantitative model is based on a risk management policy which consists of five steps:
Assets’ vulnerability assessment, based on a vulnerabilities database such as the NVD.
Identification of likelihood and threats, based on data from the intrusion detection system (IDS).
Determination of impact and counter-measures (cost-benefit analysis).
Quantitative risk assessment using Bayesian networks.
Risk assessment evaluation (risk mitigation options and prioritisation).
According to the authors, their proposed model can give a clearer picture to decision-makers about their system in real time. Its application was demonstrated through a simple example.
Another model was presented by Cam et al. [
17] to dynamically and quantitatively assess risks on networks. This model requires the use of a vulnerability scanner in order to detect vulnerabilities of the examined system. A Bayesian network is then used to capture relationships between detected vulnerabilities. The authors then use the common vulnerability scoring system (CVSS) model and expand it by taking into consideration the criticality of an asset’s mission, the current damage of an asset (the impact of an attack on a specific asset), and how this vulnerability is going to affect other assets’ vulnerabilities. They also use a hidden Markov model (HMM) and Bayesian networks to dynamically model cyber operations, events, and observations (originating from IDS, firewall, etc.) in order to use them to assess dynamically the exploit likelihood in the network. Risk is estimated by pinpointing the most likely path of exploited vulnerabilities, their likelihood of exploitation, and their associated impacts. The authors perform a simulation utilising synthetic data to demonstrate that, given the vulnerabilities of a network, their model is able to quantify and assess risk.
Henshel et al. [
18] introduced a dynamic quantitative RA approach which models both the system (software, hardware, network) and the human factor. The authors used Bayesian networks in order to analyse and assess the cyber risks (low–medium–high) along with direct acyclic graphs (DAGs) to represent the connections between nodes. This model, which is built using experts’ opinions to define the risk variables of the system (in this case a structured query language (SQL) server), takes into consideration the dependencies between cyber assets and their interactions with the respective events in order to quantify assets’ vulnerabilities, the impact of attacks, and the risks. The authors demonstrated its application in a scenario that included an SQL injection attack.
Zhang et al. [
19] recommend a multilevel Bayesian network to describe the propagation of the risk caused by cyber attacks. It consists of an incident model, a function model, and an attack model. In addition, a novel multimodel-based approach to assess the cybersecurity risk for ICSs is developed. This approach can determine the current cybersecurity risk value by estimating probabilities and quantifying the consequences of numerous potentially hazardous scenarios arising from malicious attacks. The model uses both offline and online/real-time data. The offline data originate from vulnerability scanners, statistical analysis, experts’ opinions, and they are used to determine the probabilities of an attack, the dependencies between functions, the relations between incidents, and the risk propagation. The online data, which comprise the input of the system, originate from attack evidence (IDS) and anomaly evidence (anomaly detection system—ADS). ADS data are compared with normal values to produce information related to the system’s malfunction. All these data are processed using Bayesian networks. The authors performed a simulation on a chemical reactor control system to demonstrate that their approach was able to calculate the cybersecurity risk of an ICS in real time.
A dynamic, quantitative model based on Bayesian networks was presented by Huang et al. [
20] in order to address cyber risk for SCADA environments. The model combines the posterior probability along with the value of an asset in the SCADA environment to calculate the risk. The first step is to differentiate the nodes into two categories: the vulnerability nodes (nodes that have vulnerabilities which can be discovered by a vulnerability scanner software or by querying the common vulnerabilities and exposures database—CVE) and the privilege escalation nodes (nodes that can be used to damage the system). Bayes’ theorem is used to predict the posterior probability based on real-time data/evidence collected from the IDS. The authors used multiple techniques in order to make more accurate risk predictions, such as:
A leaky noisy-OR gate to predict unknown attacks.
Offline batching (although complete datasets existed offline, they utilised the expectation maximisation principle to fill the missing values because it is quite common for the attack sample to be incomplete for SCADA systems).
Online incremental learning in order for the model to be able to update and adapt to real-time observations.
The model combines historical data and real-time observations, using machine learning techniques to make accurate predictions. A chemical process network was simulated by the authors to demonstrate that the proposed model is able to provide real-time risk calculations for known and unknown attacks.
Peng et al. [
21] proposed a method to quantitatively calculate cyber risk in ICS environments. Real-time data (evidence from attack) are fed to the Bayesian network along with the ICS security knowledge, which contains information about vulnerabilities, functions, accidents, and assets. The output of the Bayesian network is the probability of occurrence of an event which is combined with the impact, to calculate the real-time risk. The value of the impact depends on the severity of the affected asset. An expectation maximisation algorithm is chosen in case the data are incomplete. The authors conducted a case study on a simulated chemical control process to show that their model can achieve a high level of risk accuracy in real time.
Zhu et al. [
22] introduced a model to quantitatively assess the risk in IPSs by calculating the probabilities and consequences of an abnormal event (tampering with control strategies). The model consists of two parts, probability inference and loss calculation, which were combined to produce real-time risk. An extended multilevel flow model (EMFM) is used to describe the production process (structures and functions of the system) quantitatively, and based on this, the model is able to forecast the consequences of an abnormal event (loss calculation). Regarding the probability inference, a Bayesian network based on the EMFM is used to infer the probabilities of an abnormal event. The system uses as input established control strategies and attack evidence from the IDS. The authors carried out simulations on a chemical process system to present the ability of the proposed model to quantify the risk.
Zhang et al. [
23] presented a novel dynamic quantitative model to address the cybersecurity risk assessment in ICS. The model feeds a fuzzy probability Bayesian network with cyber attack knowledge, system function knowledge, hazardous incident knowledge, and the system’s asset knowledge. The authors used fuzzy probability in order to replace the crisp probabilities required in Bayesian networks. In addition, the model receives as input anomaly evidence detected by anomaly detectors, as well as attack evidence detected by the IDS. Based on this information the fuzzy probability Bayesian network interference engine calculates the posterior probability. Finally, the risk is calculated based on the posterior probability and asset losses. Simulations on a simplified chemical reactor were conducted by the authors to present the ability of their model to evaluate risk in a timely manner.
A DRA approach that aims to reduce the cyber risk of CI was presented by Zhu et al. [
24], taking into consideration the cyber-physical interaction. A typical CI consists of a several stations and a control centre. The model consists of two components: DRA and decision making. With respect to the DRA component, every station employs a Bayesian network that utilises real-time attack data from the IDS as input, and generates probabilities for station capacities as output. The station capacity is the capability of a station to work as planned. Then, the probabilities of all station capacities are obtained the same way. The final output of the risk assessment process is the real-time system risk caused by an attack strategy. The decision-making approach for cyber-risk reduction is based on the attack strategy detected by the IDS and the counter-measures that can be applied in order to reduce the risk. Finally, the net benefit of each counter-measure is calculated. A simulation was carried out on a simplified water supply system in order for the authors to prove that their model is able to evaluate cyber risk in real time and to provide the optimal decision-making approach.
Debneath et al. [
25] recommended HPCvul, a novel approach for vulnerability and risk assessment in high-performance computing (HPC) networks utilising the NVD repository, CVSS scoring, and a network monitoring tool such as IDS. HPCvul agencies are deployed in HPC subnetworks to collect information such as hosts’ configurations and services, deployed software, topology, etc. HPCvul uses a Bayesian attack graph to conduct real-time RA by examining vulnerabilities and their dependencies within the network. This allows the model to detect potential attack paths and evaluate the likelihood of an HPC target being compromised by an attacker. Furthermore, quantitative RA metrics are defined to aid in security decision making. Relative case studies were conducted to showcase that this approach is able to assess the probability of compromising a target in dynamic environments.
A dynamic model to quantitatively address cybersecurity risk in distributed CPSs was proposed by Zhou et al. [
26]. Based on a distribution network topology and the CVSS scoring mechanism, a Bayesian network model is built. The attacker’s selectivity in attacking targets during cyber attacks is taken into consideration using a combination of the fuzzy analytic hierarchy process (FAHP) and entropy weight method, incorporating both subjective expert opinions and objective indicators. In addition, the model considers the available defence resources. The authors used GeNle to create three different attack scenarios simulations in order to evaluate their model.
4.1.2. Attack Trees
Kotenko et al. [
27] presented a security metrics model, which is used for the assessment of risk in distributed information systems. The model takes into consideration the topological dependencies, the severity of attack actions, the skills of adversaries, and the current security state of the system (events, security level, attack surface). The system is able to calculate both static and dynamic risk. The dynamic (performance-based) risk is based on real-time data. This technique uses an external vulnerability database along with the target environment’s network topology to generate attack graphs, and combines the latter with information from the IDS in order to dynamically calculate the attacker’s position and their possible network path.
A quantitative risk assessment methodology based on attack–defence trees (ADTs) was recommended by Ji et al. [
28], taking into consideration both the attack cost and the defence cost. The overall idea is to build the ADT based on the description of the system’s vulnerabilities. The model is capable of calculating many variables such as cost of attack/defence, probability of success, impact cost, revised attack cost, revised impact, etc. (revised means that counter-measures are applied). The authors implemented a case study for a SCADA system to demonstrate that the revised attack cost, i.e., what the attacker needs to spend, increases when the counter-measures are applied. Accordingly, the revised impact is reduced.
A model aiming to evaluate the current and the future security posture of an enterprise’s computer network was introduced by Abraham et al. [
29]. In order to forecast how the security posture of the network will vary over time, the authors construct an attack graph that captures the interdependencies of all vulnerabilities discovered in the enterprise software. The model determines the initial value of a vulnerability and how this value will develop over time by taking into account the characteristics of the CVSS metric framework. Incorporating the prior analysis (relationships between various network vulnerabilities), they use a Markov model to explain the attacks. The probability that the attacker would succeed in their objective is expressed using a probabilistic path. Although the proposed model is used as a predictive model, it can be used to assess the current risk of an enterprise in a quantitative manner. A case study showed that the proposed model was able to visualise and objectively evaluate network security.
Kanoun et al. [
30] presented a model in order to bridge the gap between technical and organisational risk in ICT systems. In their work, they introduced two primary concepts: elementary risk (ER), which pertains to a single detrimental incident affecting a strategic asset, resulting from a possible technical attack scenario which involves a singular supporting asset, e.g., a server; and composite risk (CR), which aggregates the ER based on a specific criteria (technical or organisational, based on specific detrimental events). Their proposed model consists of:
An attack graph generator, which takes into consideration the system topology along with a vulnerability database, such as NVD.
“Elementary risk instantiation” (based on attack graphs and the organisation’s database, which includes information about assets, supporting assets, detrimental events, and mapping between them).
ER calculation (likelihood, impact). Likelihood of occurrence depends on the attack scenario and the affected vulnerabilities and it is calculated with the use of Markov modelling. Impact depends on the consequences of the attack scenario.
CR calculation (aggregation of ERs).
Analysis of results.
By conducting a case study of a medium-sized ICT system, the authors were able to show how the proposed model can dynamically quantify an organisation’s risk, and that the concept of ER and CR improves the organisation security posture.
Gonzalez et al. [
31] proposed a dynamic risk management response system (DBRMS) which aims to quantify the risk of the monitored system and to produce response plans consecutively, in order to address cyber threats. The authors utilised an attack graph generator which uses as input information about connections among devices, a vulnerability inventory, and a business model of the organisation (e.g., crucial assets), and produces as output all possible attack scenarios. A Markov chain is used to determine the probability that an attack will succeed, based on the attack path, along with properties associated with the difficulty of exploiting a vulnerability. The impact is calculated based on the consequences of the exploited vulnerability that resides in the business device. The threat quantification module, through the use of elementary risk, calculates the risk value of an event based on the probability and the impact. Using data collected from scans in a SCADA system, the authors conducted experiments to demonstrate that the proposed model is dynamic, since it can adapt to different input data and produces suitable response plans in an automated way.
Wu et al. [
32] recommended a security assessment approach based on an ontology and an attack graph for ICS. The system’s assets, vulnerabilities, attacks, counter-measures, and relationships between them are represented by an ontology using OWL. The created security ontology represents attacks that pose a threat to assets (based on identified vulnerabilities) using SWRL rules. The attack graph is subsequently created through the utilisation of an efficient algorithm, harnessing the inference capabilities of the security ontology. The evaluation of the algorithm in different topologies and network sizes showed that the proposed approach is suitable for enterprise networks.
Ivanon et al. [
33] presented a method to assess risk based on an attack graph and two security indicators for smart city infrastructures. The first indicator shows the importance (type of node, running services) of the node which is being attacked, and the second one (topological) presents the number of connected nodes that are going to be affected, also taking into consideration their importance. The attack graph can be constructed as an output of penetration testing. In the next step, the total value of the system at risk is calculated based on the aforementioned indicators. Afterwards, the protective measures are applied in order to eliminate the most critical vulnerabilities. Then, the total risk value of the system is recalculated (the value is reduced).
4.1.3. Neural Networks
Fu et al. [
34] proposed a method for integrating quantitative and qualitative analyses to provide an information security risk assessment for CPS. They used a Petri net for the description of the system and its relationship with big data analysis (performed by experts) in order to provide the right indexes for the neural network, so that the latter could provide risk evaluation.
Ashiku et al. [
35] presented a model according to which risk value in an organisation’s network depends on the following variables: the quantity of workstations, typical user roles, super user roles (users with increased awareness), daily work hours, open ports, third-party users, data volume, and frequency of daily briefings to strengthen security. The model receives additional enhancement through the utilisation of a balanced dataset (network traffic) which is used as input for an external neural network. These are combined to calculate the risk value. In addition, the model takes into account the applied defence mechanism. Simulations showed that the risk value is linked to the annual incident cost and it depends on the aforementioned variables and the defence mechanism in place.
Krundyshev et al. [
36] analysed all possible risk assessment methods and suggested that the most efficient methods to conduct risk assessments in smart city environments are those which are based on AI, such as ANN, because they can deal with big data, and they are quick and accurate. The authors used synthetic datasets and NS-3 to construct a potential dynamic network of a smart city. They specified five potential attack types (grey hole, black hole, DoS, DDoS, and wormhole) along with the probability of occurrence. In the next step, device types were identified, based on the supposition that they performed the same function in the system and interacted with the same number of devices of another type. Device types could be traffic lights, medical sensors, vehicles, etc. In addition, they took into consideration the interaction between devices. The authors established a threshold for unacceptable risk, guided by the principle that assets impacting people’s lives and health should have the lowest acceptable failure probability. In their simulated environment, they created one training dataset and one test. Their neural network model was built with the help of CORAS and TensorFlow, and it included:
They achieved 97% maximum classification accuracy.
4.1.4. Artificial Immunity—Rule-Based Machine Learning
A quantitative, immune-based dynamic risk control model for network security, consisting of three different levels (user, processing, hardware), was introduced by Lin et al. [
37]. The risk assessment module, the intrusion detection module, and the dynamic risk control module were located at the processing layer. The first module was responsible for estimating damage in a computer network or a system according to the threat level and the vulnerabilities of the system. It was based on artificial immune theory, according to which each attack category is simulated as an immune memory cell, and the antibody concentration value of the immune memory cells is calculated according to the intrusion detection results. The risk assessment relies on the antibody concentration of immunological memory cells, which, in turn, is influenced by detected data packages. When the system is under attack, the concentration value is increasing and when the detection results are normal, the concentration value is decreasing in real time. Experiments validated that the antibody concentration and risk values increased while the attack was continuing.
Another immune-based DRA method for digital virtual assets was proposed by He et al. [
38]. It comprises four stages: data collection and pre-processing, immune detector training, antibody cell concentration, attack hazard value evaluation and threat risk assessment. Based on the hierarchical division negative selection algorithm (HD-NSA), the immune detector component identifies attacks or illegal behaviours on digital virtual assets. The detected attacks are then categorised according to the taxonomy of digital virtual asset attacks. By simulating the mechanism of antibody concentration alteration, the threat to digital virtual assets is assessed upon the discovery of an attack. Immune memory cell formation increases during active attacks and decreases as the attack intensity diminishes. The final risk value is determined based on both antibody cell concentration and the evaluation of the attack. The authors used data from a Bitcoin dusting attack in order to show that the proposed method had the capability to rapidly and precisely detect attacks, while concurrently evaluating the real-time risk of various users being attacked.