IDEAS home Printed from https://ideas.repec.org/a/gam/jmathe/v11y2023i14p3115-d1194286.html
   My bibliography  Save this article

Advanced Persistent Threats and Their Defense Methods in Industrial Internet of Things: A Survey

Author

Listed:
  • Chenquan Gan

    (School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
    School of Cyber Security and Information Law, Chongqing University of Posts and Telecommunications, Chongqing 400065, China)

  • Jiabin Lin

    (School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing 400065, China)

  • Da-Wen Huang

    (College of Computer Science, Sichuan Normal University, Chengdu 610101, China)

  • Qingyi Zhu

    (School of Cyber Security and Information Law, Chongqing University of Posts and Telecommunications, Chongqing 400065, China)

  • Liang Tian

    (School of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China)

Abstract

The industrial internet of things (IIoT) is a key pillar of the intelligent society, integrating traditional industry with modern information technology to improve production efficiency and quality. However, the IIoT also faces serious challenges from advanced persistent threats (APTs), a stealthy and persistent method of attack that can cause enormous losses and damages. In this paper, we give the definition and development of APTs. Furthermore, we examine the types of APT attacks that each layer of the four-layer IIoT reference architecture may face and review existing defense techniques. Next, we use several models to model and analyze APT activities in IIoT to identify their inherent characteristics and patterns. Finally, based on a thorough discussion of IIoT security issues, we propose some open research topics and directions.

Suggested Citation

  • Chenquan Gan & Jiabin Lin & Da-Wen Huang & Qingyi Zhu & Liang Tian, 2023. "Advanced Persistent Threats and Their Defense Methods in Industrial Internet of Things: A Survey," Mathematics, MDPI, vol. 11(14), pages 1-23, July.
  • Handle: RePEc:gam:jmathe:v:11:y:2023:i:14:p:3115-:d:1194286
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2227-7390/11/14/3115/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2227-7390/11/14/3115/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Chien-Ta Bruce Ho & Desheng Dash Wu & David L. Olson, 2009. "A Risk Scoring Model And Application To Measuring Internet Stock Performance," International Journal of Information Technology & Decision Making (IJITDM), World Scientific Publishing Co. Pte. Ltd., vol. 8(01), pages 133-149.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Yongrok Choi & Xiaoxia Ye & Lu Zhao & Amanda Luo, 2016. "Optimizing enterprise risk management: a literature review and critical analysis of the work of Wu and Olson," Annals of Operations Research, Springer, vol. 237(1), pages 281-300, February.
    2. Yongrok Choi & Xiaoxia Ye & Lu Zhao & Amanda C. Luo, 2016. "Optimizing enterprise risk management: a literature review and critical analysis of the work of Wu and Olson," Annals of Operations Research, Springer, vol. 237(1), pages 281-300, February.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:11:y:2023:i:14:p:3115-:d:1194286. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.