Next Article in Journal
Has the COVID-19 Pandemic Led to a Switch in the Volatility of Biopharmaceutical Companies?
Previous Article in Journal
Optimization of the Approximate Integration Formula Using the Discrete Analogue of a High-Order Differential Operator
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Advanced Persistent Threats and Their Defense Methods in Industrial Internet of Things: A Survey

1
School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
2
School of Cyber Security and Information Law, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
3
College of Computer Science, Sichuan Normal University, Chengdu 610101, China
4
School of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
*
Author to whom correspondence should be addressed.
Mathematics 2023, 11(14), 3115; https://doi.org/10.3390/math11143115
Submission received: 12 June 2023 / Revised: 4 July 2023 / Accepted: 12 July 2023 / Published: 14 July 2023
(This article belongs to the Special Issue Dynamic Games for Adaptive Cyber Defense)

Abstract

The industrial internet of things (IIoT) is a key pillar of the intelligent society, integrating traditional industry with modern information technology to improve production efficiency and quality. However, the IIoT also faces serious challenges from advanced persistent threats (APTs), a stealthy and persistent method of attack that can cause enormous losses and damages. In this paper, we give the definition and development of APTs. Furthermore, we examine the types of APT attacks that each layer of the four-layer IIoT reference architecture may face and review existing defense techniques. Next, we use several models to model and analyze APT activities in IIoT to identify their inherent characteristics and patterns. Finally, based on a thorough discussion of IIoT security issues, we propose some open research topics and directions.
Keywords: industrial internet of things; advanced persistent threat; security analysis; modeling analysis industrial internet of things; advanced persistent threat; security analysis; modeling analysis

Share and Cite

MDPI and ACS Style

Gan, C.; Lin, J.; Huang, D.-W.; Zhu, Q.; Tian, L. Advanced Persistent Threats and Their Defense Methods in Industrial Internet of Things: A Survey. Mathematics 2023, 11, 3115. https://doi.org/10.3390/math11143115

AMA Style

Gan C, Lin J, Huang D-W, Zhu Q, Tian L. Advanced Persistent Threats and Their Defense Methods in Industrial Internet of Things: A Survey. Mathematics. 2023; 11(14):3115. https://doi.org/10.3390/math11143115

Chicago/Turabian Style

Gan, Chenquan, Jiabin Lin, Da-Wen Huang, Qingyi Zhu, and Liang Tian. 2023. "Advanced Persistent Threats and Their Defense Methods in Industrial Internet of Things: A Survey" Mathematics 11, no. 14: 3115. https://doi.org/10.3390/math11143115

APA Style

Gan, C., Lin, J., Huang, D.-W., Zhu, Q., & Tian, L. (2023). Advanced Persistent Threats and Their Defense Methods in Industrial Internet of Things: A Survey. Mathematics, 11(14), 3115. https://doi.org/10.3390/math11143115

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop