Multi-Purpose Cyber Environment for Maritime Sector

Authors

  • Gabor Visky NATO Cooperative Cyber Defence Centre of Excellence, Tallinn, Estonia
  • Arturs Lavrenovs NATO Cooperative Cyber Defence Centre of Excellence, Tallinn, Estonia
  • Erwin Orye NATO Cooperative Cyber Defence Centre of Excellence, Tallinn, Estonia
  • Dan Heering Tallinn University of Technology, Estonia
  • Kimberly Tam University of Plymouth, UK

DOI:

https://doi.org/10.34190/iccws.17.1.26

Keywords:

maritime, cybersecurity, testbed

Abstract

The cyber attack surface in a maritime environment is constantly growing. More current information and computer technologies are being used on cargo and passenger ships to save on operational costs and increase navigational safety. Along with the growing reliance on automation, the risk of a disruption to a vessel's critical systems by drawing on the wrong inputs from sensors to change the behaviour of the actuators has significantly increased. Traditional operational technological systems are much more complicated to update than the automatic software updates we see in information technology systems. To better understand existing cyber threats in the maritime sector and increase cybersecurity resilience, this paper aims to replicate the digital components of a ship's bridge to examine scenarios when the bridge system loses connectivity, receives the wrong inputs from sensors, or the internal system becomes compromised. The simulator differentiates fundamentally from traditional simulators or digital twins in the maritime sector that focus on training seafarers. This environment generates data streams that are similar to those on board a ship. Those data streams can be analysed, modified and spoofed to observe the effects. The effects can be technical but it is equally necessary to analyse how human beings would react in specific circumstances. Our work provides the opportunity to isolate the ship network traffic, conduct penetration testing, find cybersecurity vulnerabilities on devices, and execute cyber attacks without the dangers associated with running such scenarios on a vessel in the open sea.

Downloads

Published

2022-03-02