The Impact of Data Injection on Predictive Algorithm Developed within Electrical Manufacturing Engineering in the Context of Aerospace Cybersecurity
Abstract
:1. Introduction
- Can data injection stop the manufacturing of electrical harness?
- Can this event be avoided by the application of proper cyber defense techniques?
- Does the quantity of compromised data affect the efficiency of the algorithm?
2. Materials and Methods
2.1. Predictive Algorithm
- The automation script: The generation of the automatic processes will avoid human errors which are the main trigger of error creation [22].
- The dendrogram: The hierarchical representation of the dataset can help to establish relationships between different levels of risk by clustering the dataset in groups with similarities [23].
- The logistic regression: The statistical method can be used to model the probability of occurrence using the variables from the risk matrix and to predict the risk of error creation in new harnesses assessment [24].
- The confusion matrix: It is used to evaluate the performance of the classification model used for predictions through the logistic regression method. The true positives, true negatives, false positives, and false negatives provide insights into the performance of the logistic regression model in predicting risk events. Thus, it helps to not only define the performance of the algorithm, but also to detect inconsistences within the dataset. A large amount of true or false negatives can indicate the low performance of the algorithm [25].
2.2. Risk Matrix
2.3. Cybersecurity Context
- Data modification: Malicious data can search for specific data within the dataset and modify them to achieve their goals.
- Changing random values: To change data values randomly to cause confusion and make the data less reliable.
- Data deletion: To delete certain information in order to cause significant problems, especially if the deletion of the data is critical to the business or customers.
- Data reformatting: To change the data format in order to make it more difficult to use.
- Insertion of false data: To falsify data into the dataset to deceive users who query it.
3. Results
4. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
CIA | Confidentiality, Availability, and Integrity |
ENISA | European Union Agency for Cybersecurity |
APT | Advanced Persistent Threats |
TP | True positives |
TN | True negatives |
FP | False positives |
FN | False negatives |
NIST | National Institute of Standards and Technology |
References
- Catteddu, D.; Hogben, G. About ENISA. In Cloud Computing: Benefits, Risks and Recommendations for Information Security; ENISA: Attiki, Greece, 2009. [Google Scholar]
- Herwan, J.; Misaka, T.; Furukawa, Y.; Ogura, I.; Komoto, H. A proposal for improving production efficiency of existing machining line through a hybrid monitoring and optimisation process. Int. J. Prod. Res. 2023, 61, 5392–5410. [Google Scholar] [CrossRef]
- Atak, A.; Kingma, S. Safety culture in an aircraft maintenance organisation: A view from the inside. Saf. Sci. 2011, 49, 268–278. [Google Scholar] [CrossRef]
- ICAO. Safety Management Manual, doc 9859; International Civil Aviation Organization (ICAO): Montreal, QC, Canada, 2013. [Google Scholar]
- Barr, L.C.; Newman, R.; Ancel, E.; Belcastro, C.M.; Foster, J.V.; Evans, J.; Klyde, D.H. Preliminary risk assessment for small unmanned aircraft systems. In Proceedings of the 17th AIAA Aviation Technology, Integration, and Operations Conference, Denver, CO, USA, 5–9 June 2017; p. 3272. [Google Scholar]
- Jordan, M.I.; Mitchell, T.M. Machine learning: Trends, perspectives, and prospects. Science 2015, 349, 255–260. [Google Scholar] [CrossRef] [PubMed]
- Bozhko, S.; Hill, C.I.; Yang, T. More-Electric Aircraft: Systems and Modeling. In Wiley Encyclopedia of Electrical and Electronics Engineering; Wiley: Hoboken, NJ, USA, 1999; pp. 1–31. [Google Scholar]
- Casado, R.S.G.R.; Alencar, M.H.; de Almeida, A.T. Combining a multidimensional risk evaluation with an implicit enumeration algorithm to tackle the portfolio selection problem of a natural gas pipeline. Reliab. Eng. Syst. Saf. 2022, 221, 108332. [Google Scholar] [CrossRef]
- Haseeb, M.; Hussain, H.I.; Ślusarczyk, B.; Jermsittiparsert, K. Industry 4.0: A solution towards technology challenges of sustainable business performance. Soc. Sci. 2019, 8, 154. [Google Scholar] [CrossRef]
- Makins, N.; Kirwan, B. Keeping the Aviation Industry Safe; EU: Brussels, Belgium, 2020. [Google Scholar]
- Jung, B.; Han, I.; Lee, S. Security threats to Internet: A Korean multi-industry investigation. Inf. Manag. 2001, 38, 487–498. [Google Scholar] [CrossRef]
- Su, Q.; Wang, H.; Sun, C.; Li, B.; Li, J. Cyber-attacks against cyber-physical power systems security: State estimation, attacks reconstruction and defense strategy. Appl. Math. Comput. 2022, 413, 126639. [Google Scholar] [CrossRef]
- UK Civil Aviation Authority. CAP 716: Aviation Maintenance Human Factors (EASA/JAR145 Approved Organisations): Guidance Material on the UK CAA Interpretation of Part 145 Human Factors and Error Management Requirements; UK Civil Aviation Authority: London, UK, 2006. [Google Scholar]
- Bautista-Hernández, J.; Martín-Prats, M.Á. A novel methodology to prevent failures in the manufacturing process using predictive algorithms through machine learning innovations for aerospace. University of Seville: Seville, Spain, 2023; Manuscript in preparation. [Google Scholar]
- Chen, P.; Desmet, L.; Huygens, C. A study on advanced persistent threats. In Proceedings of the Proceedings 15, Communications and Multimedia Security: 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, 25–26 September 2014; pp. 63–72. [Google Scholar]
- Mattei, T.A. Privacy, confidentiality, and security of health care information: Lessons from the recent Wannacry cyberattack. World Neurosurg. 2017, 104, 972–974. [Google Scholar] [CrossRef]
- Bailey, B. Establishing Space Cybersecurity Policy, Standards, and Risk Management Practices; Aerospace Corporation: El Segundo, CA, USA, 2020. [Google Scholar]
- Kornecki, A.J. Airborne software: Communication and certification. Scalable Comput. Pract. Exp. 2008, 9, 77–82. [Google Scholar]
- Zalewski, J.; Kornecki, A. Trends nad challenges in the aviation systems safety and cybersecurity. Task Q. Sci. Bull. Acad. Comput. Cent. Gdan. 2019, 23, 159–175. [Google Scholar]
- Gallina, B. A model-driven safety certification method for process compliance. In Proceedings of the 2014 IEEE International Symposium on Software Reliability Engineering Workshops, Naples, Italy, 3–6 November 2014; pp. 204–209. [Google Scholar]
- Lin, W.; Low, Y.; Chong, Y.; Teo, C. Integrated cyber physical simulation modelling environment for manufacturing 4.0. In Proceedings of the 2018 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), Bangkok, Thailand, 16–19 December 2018; pp. 1861–1865. [Google Scholar]
- Van der Velden, C.; Bil, C.; Yu, X.; Smith, A. An intelligent system for automatic layout routing in aerospace design. Innov. Syst. Softw. Eng. 2007, 3, 117–128. [Google Scholar] [CrossRef]
- Gan, G.; Ma, C.; Wu, J. Data Clustering: Theory, Algorithms, and Applications; SIAM: Philadelphia, PA, USA, 2020. [Google Scholar]
- Kim, Y.-B.; Jeong, H.-J.; Park, S.-M.; Lim, J.H.; Lee, H.-H. Prediction and Validation of Landing Stability of a Lunar Lander by a Classification Map Based on Touchdown Landing Dynamics’ Simulation Considering Soft Ground. Aerospace 2021, 8, 380. [Google Scholar] [CrossRef]
- De Giorgi, M.G.; Strafella, L.; Menga, N.; Ficarella, A. Intelligent Combined Neural Network and Kernel Principal Component Analysis Tool for Engine Health Monitoring Purposes. Aerospace 2022, 9, 118. [Google Scholar] [CrossRef]
- Creado, Y.; Ramteke, V. Active cyber defence strategies and techniques for banks and financial institutions. J. Financ. Crime 2020, 27, 771–780. [Google Scholar] [CrossRef]
- Kovačević, I.; Groš, S.; Slovenec, K. Systematic review and quantitative comparison of cyberattack scenario detection and projection. Electronics 2020, 9, 1722. [Google Scholar] [CrossRef]
- Manadhata, P.K.; Wing, J.M. An attack surface metric. IEEE Trans. Softw. Eng. 2010, 37, 371–386. [Google Scholar] [CrossRef]
- Bordel, B.; Alcarria, R.; Robles, T.; Sánchez-Picot, Á. Stochastic and information theory techniques to reduce large datasets and detect cyberattacks in Ambient Intelligence Environments. IEEE Access 2018, 6, 34896–34910. [Google Scholar] [CrossRef]
- Garcia-Teodoro, P.; Diaz-Verdejo, J.; Maciá-Fernández, G.; Vázquez, E. Anomaly-based network intrusion detection: Techniques, systems and challenges. Comput. Secur. 2009, 28, 18–28. [Google Scholar] [CrossRef]
- Li, X.; Liang, X.; Lu, R.; Shen, X.; Lin, X.; Zhu, H. Securing smart grid: Cyber attacks, countermeasures, and challenges. IEEE Commun. Mag. 2012, 50, 38–45. [Google Scholar] [CrossRef]
- Bautista-Hernández, J.; Martín-Prats, M.Á. Monte Carlo Simulation Applicable for Predictive Algorithm Analysis in Aerospace. In Proceedings of the Doctoral Conference on Computing, Electrical and Industrial Systems, Caparica, Portugal, 5–7 July 2023; pp. 243–256. [Google Scholar]
- Rao, K.D.; Gopika, V.; Rao, V.S.; Kushwaha, H.; Verma, A.K.; Srividya, A. Dynamic fault tree analysis using Monte Carlo simulation in probabilistic safety assessment. Reliab. Eng. Syst. Saf. 2009, 94, 872–883. [Google Scholar]
- Marseguerra, M.; Zio, E. Monte Carlo estimation of the differential importance measure: Application to the protection system of a nuclear reactor. Reliab. Eng. Syst. Saf. 2004, 86, 11–24. [Google Scholar] [CrossRef]
Risk Matrix | Before Data Injection | After Data Injection |
---|---|---|
Low | 123 | 147 |
Moderate | 29 | 10 |
High | 5 | - |
Risk Matrix | Real Data | Injected Data |
---|---|---|
High | 3.18 | 0 |
Medium | 18.47 | 6.36 |
Low | 78.34 | 93.63 |
Metrics Comparison | Data Real | Data Injection |
---|---|---|
1.0 | 0.1 | |
1.0 | 1.0 | |
1.0 | 0.19 | |
1.0 | 0.13 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Bautista-Hernández, J.; Martín-Prats, M.Á. The Impact of Data Injection on Predictive Algorithm Developed within Electrical Manufacturing Engineering in the Context of Aerospace Cybersecurity. Aerospace 2023, 10, 984. https://doi.org/10.3390/aerospace10120984
Bautista-Hernández J, Martín-Prats MÁ. The Impact of Data Injection on Predictive Algorithm Developed within Electrical Manufacturing Engineering in the Context of Aerospace Cybersecurity. Aerospace. 2023; 10(12):984. https://doi.org/10.3390/aerospace10120984
Chicago/Turabian StyleBautista-Hernández, Jorge, and María Ángeles Martín-Prats. 2023. "The Impact of Data Injection on Predictive Algorithm Developed within Electrical Manufacturing Engineering in the Context of Aerospace Cybersecurity" Aerospace 10, no. 12: 984. https://doi.org/10.3390/aerospace10120984
APA StyleBautista-Hernández, J., & Martín-Prats, M. Á. (2023). The Impact of Data Injection on Predictive Algorithm Developed within Electrical Manufacturing Engineering in the Context of Aerospace Cybersecurity. Aerospace, 10(12), 984. https://doi.org/10.3390/aerospace10120984