Forfatter(e)
Semester
4. semester
Uddannelse
Udgivelsesår
2025
Afleveret
2025-06-03
Antal sider
66 pages
Abstract
Cyberattacks targeting Industrial Control Systems pose significant risks to critical infrastructure, yet they remain underexplored within criminological research, which traditionally focuses on individual motivations and online crime. This study investigates how such cyberattacks differ in terms of technical depth and interprets them through criminological perspectives. Using cluster analysis based on data from the Mitre Attack framework, the project analyzes 460 documented cyberattacks. The results identify six distinct clusters, some of which share common techniques and targets, while each also displays unique characteristics. Cluster 1 are defined by the use of remote access and lateral movement between IT and industrial environments. Cluster 2 is dominated by Denial of Service attacks aimed at disrupting data flows and operational processes. Cluster 3 rely heavily on valid credentials to maintain persistent control. Cluster 4 targets low-level system components like Data Gateways. Cluster 5 focuses on human-machine interfaces (HMIs), combining physical and logical exploitation, while cluster 6 is characterized by deep technical manipulation and a wide range of targets. The study highlights the importance of integrating technical insight with criminological interpretation to better understand and respond to specific cyber threats against Industrial Control Systems.
Emneord
Kolofon: Denne side er en del af AAU Studenterprojekter — Aalborg Universitets studenterprojektportal. Her kan du finde og downloade offentligt tilgængelige kandidatspecialer og masterprojekter fra hele universitetet fra 2008 og frem. Studenterprojekter fra før 2008 kan findes i trykt form på Aalborg Universitetsbibliotek.
Har du spørgsmål til AAU Studenterprojekter eller Aalborg Universitets forskningsregistrering, formidling og analyse, er du altid velkommen til at kontakte VBN-teamet. Du kan også læse mere i AAU Studenterprojekter FAQ.