Safeguarding Skies: Airport Cybersecurity in the Digital Age

Main Article Content

Suphannee Sivakorn
Nuttaya Rujiratanapat
Yotsapat Ruangpaisarn
Chanond Duangpayap
Sakulchai Saramat

Abstract

The aviation industry faces significant vulnerabilities from both physical and cybersecurity threats, highlighting the urgent need for enhanced cybersecurity measures amid increasingly sophisticated attacks. This paper systematically reviews emerging threats at airports, analyzing real-world incidents and relevant literature while mapping risks to the MITRE ATT&CK Matrix, a widely recognized knowledge base for categorizing cyberattack tactics, techniques, and procedures. This is the first to apply the MITRE Matrix to airport security risks, offering a novel approach to understanding and mitigating these challenges. Building on this analysis, the paper advocates for modern cybersecurity defense models, emphasizing Cybersecurity Frameworks and Zero Trust Architecture, as well as critical measures for supply chain risk management and strategies to mitigate ransomware and DoS attacks. Our analysis provides insights into vulnerabilities and actionable recommendations, serving as a comprehensive guide for aviation stakeholders to strengthen defenses against evolving cybersecurity threats.

Article Details

Section
Research Paper

References

G. Lykou, A. Anagnostopoulou, and D. Gritzalis. “Smart Airport Cybersecurity: Threat Mitigation and Cyber Resilience Controls.” Sensors, Vol. 19, No. 1, 2019.

EUROCONTROL, Aviation under Attack from a Wave of Cybercrime. Available Online at https://www.eurocontrol.int /publication/eurocontrol-think-paper-12-aviation-under-attack-wave-cybercrime, accessed on 1 February 2024.

Business Insurance, US to add cybersecurityrequirements for critical aviation systems. Available Online at https://www.businessinsurance.com/article/20221012/NEWS06/912353045/US-to-add-cybersecurity-requirements-for-critical-aviation-systems, accessed on 1 February 2024.

IATA, Compilation of Cyber Security Regulations, Standards, and Guidance Applicable to Civil Aviation Edition 3.0. Available Online at https://www.iata.org/contentassets/4c51b00fb25e4b60b 38376a935e278b/compilation-of-cyber-regulations-standards-and-guidance3.0.pdf, accessed on 1 February 2024.

N. Koroniotis, N. Moustafa, F. Schiliro, P. Gauravaram, and H. Janicke. “A Holistic Review of Cybersecurity and Reliability Perspectives in Smart Airports.” IEEE Access, Vol. 8, pp. 209802-209834, 2020.

A. Fattah, H. Lock, W. Buller, and S. Kirby. Smart Airports: Transforming Passenger Experience to Thrive in the New Economy. Available Online at https://www.cisco.com/c/dam/ en_us/about/ac79/docs/pov/Passenger_Exp_POV_0720aFINAL.pdf, accessed on 1 February 2024.

TSA, 20 years after 9/11: The state of the transportation security administration. Available Online at https://shorturl.at/1lsGo, accessed on 1 February 2024.

G. Lykou, A. Anagnostopoulou, and D. Gritzalis. “Implementing Cyber Security Measures in Airports to Improve Cyber Resilience.” Proceedings of the 2018 Global Internet of Things Summit, pp. 1-6, 2018.

J. H. Tan and T. Masood. “Adoption of Industry 4.0 Technologies in Airports - A Systematic Literature Review.” ArXiv, pp. 1-25, 2021.

M. Javaid, A. Haleem, R. P. Singh, R. Suman, and E. S. Gonzalez. “Understanding the Adoption of Industry 4.0 Technologies in Improving Environmental Sustainability.” Sustainable Operations and Computers, Vol. 3, pp. 203–217, 2022.

K. Gopalakrishnan, M. Govindarasu, D. Jacobson, and B. M. Phares. “Cyber Security for Airports.” International Journal for Traffic and Transport Engineering (IJTTE), Vol. 3, No. 4, pp. 365-376, 2013.

Bloomberg, Colonial Pipeline Cyber Attack: Hackers Used Compromised Password. Available Online at https:// www.bloomberg.com/news/articles/2021-06-04/hackers-breached-colonial-pipeline-using-compromised-password, accessed on 1 February 2024.

CNN, Ransomware attack hits New Jersey county. Available Online at https://www.cnn.com/2022/05/26/politics/new-jersey-somerset-county-ransomware-attack, accessed on 1August 2023.

Threatpost. N.J.’s Largest Hospital System Pays Up in Ransomware Attack. Available Online at https://threatpost.com/ ransomware-attack-new-jersey, accessed on 1 February 2024.

Mandiant, Advanced Persistent Threats (APTs) -- Threat Actors & Groups. Available Online at https://www.mandiant. com/resources/insights/apt-groupsm, accessed on 1 June 2023.

ZDNET, Russian state hackers behind San Francisco Airport Hack. Available Online at https://www.zdnet.com /article/russian-state-hackers-behind-san-francisco-airport-hack/, accessed on 1 February 2024.

Security Affairs, A Cyber Attack Hit The Beirut International Airport. Available Online at https://securityaffairs.com/ 157079/hacking/cyber-attack-hit-beirut-international-airport.html, accessed on 1 February 2024.

Homeland Security Today, Long Beach Airport’s Website Taken Down By Cyber Attack. Available Online at https://www.hstoday. us/subject-matter-areas/transportation/long-beach-airports-website-taken-down-by-cyber-attack/, accessed on 1 June 2023.

The Record, Major Mexican airport confirms experts are working to address cyberattack. Available Online at https://therecord.media/queretaro-international-airport-mexico-cyberattack, accessed on 1 February 2024.

NTV, KAA confirms data breach, says no sensitive data leaked. Available Online at https://ntvkenya.co.ke/news/ kaa-confirms-data-breach-says-no-sensitive-data-leaked/, accessed on 1 May 2023.

Airport Technology, Ransomware attack on Swissport causes delay at Zurich Airport. Available Online at https:// www.airport-technology.com/news/ransomware-attack-swissport-zurich-airport/, accessed on 1 February 2024.

Security Affairs, A Cyber Attack Hit The Beirut International Airport. Available Online at https://securityaffairs.com/ 157079/hacking/cyber-attack-hit-beirut-international-airport.html, accessed on 1 February 2024.

The Cyber Express, DDoS Cyberattack Hits Cairo International Airport: Anonymous Collective Claims Responsibility. Available Online at https://thecyberexpress.com/cairo-international-airport-cyberattack, accessed on 1 February 2024.

Czech Police, Interior Ministry, Airport Websites Come Under Cyber Attack. Available Online at https://brnodaily.com/2023/10/ 24/news/czech-police-interior-ministry-airport-websites-come-under-cyber-attack/, accessed on 1 February 2024.

The Record, Canada blames border checkpoint outages on cyberattack. Available Online at https://therecord.media/ canada-border-checkpoint-outages-ddos-attack-russia, accessed on 1 May 2023.

Tech Monitor, Charles de Gaulle Airport website offline after suspected ‘#OpFrance’ DDoS cyberattack. Available Online at https://techmonitor.ai/technology/cybersecurity/opfrance-cyberattack-charles-de-gaulle-airport, accessed on June 1 2023.

Mirror, UK airports targeted by coordinated Russia cyberattack groups. Available Online at https://www.mirror .co.uk/travel/ news/uk-airports-targeted-coordinated-russia-30504938, accessed on 1 February 2024.

Information Week, The DDoS Attack on German Airport Websites and What IT Leaders Can Learn. Available Online at https://shorturl.at/7ACXL, accessed on 1 February 2024.

The Associated Press, Denial-of-service attacks knock US airport websites offline. Available Online at https://apnews. com/article/technology-business-atlanta-680cf93f7eb03001 27448c35299ad66e, accessed on 1 February 2024.

Euractiv, Italy target of major Russia-linked cyberattack, again. Available Online at https://shorturl.at/Kvn9C, accessed on 1 February 2024.

CyberMaterial, Cyberattack Hit Copenhagen Airport. Available Online at https://cybermaterial.com/cyberattack-hit-copenhagen-airport/, accessed 1 February 2024.

The Wall Street Journal, Why Hackers Use Bitcoin and Why It Is So Difficult to Trace. Available Online at https://www. wsj.com/articles/why-hackers-use-bitcoin-and-why-it-is-so-difficult-to-trace-11594931595, accessed on 1 February 2024.

SecurityWeek, Data Stolen in Ransomware Attack That Hit Seattle Airport. Available Online at https://www.security week.com/data-stolen-in-ransomware-attack-that-hit-seattle-airport, accessed on 1 February 2024.

Halcyon Tech, Monti Ransomware Attack on Ae ́roport de Pau. Available Online at https://ransomwareattacks. halcyon.ai/attacks/monti-ransomware-attack-on-aeroport-de-pau, accessed on 1 February 2024.

BARRON’S, Cyberattack Hits Croatia’s Split Airport. Available Online at https://www.barrons.com/news/cyberattack-hits-croatia -s-split-airport-dac3d776, accessed on 1 February 2024.

HACKREAD, Hackers Leak 2.5M Private Plane Owners’ Data Linked to LA Intl. Airport Breach. Available Online at https://hackread.com/hackers-leak-private-plane-owners-data-la-airport-breach/, accessed on 1 August 2024.

AP, Hacked Brazil Airport Screens Show Porn to Travelers. Available Online at https://apnews.com/article/ entertainment-caribbean-brazil-c0842e915c403c41830 6433cdfc406a6, accessed on 1 February 2024.

KTSM.com, FBI warns cyber criminals are spoofing airport websites and Wi-Fi. Available Online at https://shorturl.at/vJRE7, accessed on 1 February 2024.

The New York Times, Stranded in the CrowdStrike Meltdown: ‘No Hotel, No Food, No Assistance’. Available Online at https://www.nytimes.com/2024/09/13/travel/crowdstrike-outage-delta-airlines.html, accessed on 1 February 2024.

BCC, Scam warning as fake emails and websites target users after outage. BBC. Available Online at https://www.bbc.com/news/ articles/cq5xy12pynyo, accessed on 1 February 2024.

G. Dave, G. Choudhary, V. Sihag, I. You, and K.-K. R. Choo. “Cyber Security Challenges in Aviation Communication, Navigation, and Surveillance.” Computers & Security, Vol. 112, 2022.

E. Andreev and D. Dimitrov. “Analysis of Cyber Vulnerabilities in Civil Aviation and Recommendations for Their Mitigation.” Aeronautical Research and Development, Vol. 1, pp. 90-99, 2022.

A. Elmarady and K. Rahouma. “Studying Cybersecurity in Civil Aviation, including Developing and Applying Aviation Cybersecurity Risk Assessment.” IEEE Access, Vol. 4, 2016.

M. L. Salgado and M. S. de Sousa. “Cybersecurity in Aviation: The STPASEC Method Applied to the TCAS Security.” 2021 10th Latin-American Symposium on Dependable Computing (LADC), Florianópolis, Brazil, pp. 1-10, 2021.

S. Khandker, H. Turtiainen, A. Costin, and T. Hämäläinen, “Cybersecurity Attacks on Software Logic and Error Handling within ADS-B Implementations: Systematic Testing of Resilience and Countermeasures.” IEEE Transactions on Aerospace and Electronic Systems, Vol. 58, No. 4, pp. 2702–2719, 2022.

A. A. Alsulami and S. Zein-Sabatto. “Resilient Cyber- security Approach for Aviation Cyber-physical Systems Protection against Sensor Spoofing Attacks.” 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC), NV, USA, pp. 565-571, 2021.

J. Haan. “Specific Air Traffic Management Cybersecurity Challenges: Architecture and Supply Chain.” ICSEW'20: Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops, New York, NY, USA, pp. 245-249, 2020.

C. Aranzazu-Suescun, L. F. Zapata-Rivera, O. G.-M. Saenz, and J. M. Christensen. “Securing IoT Surveillance Airport Infrastructure.” Proceedings of the 2024 International Conference on Smart Applications, Communications and Networking, Harrisonburg, VA, USA, pp. 1-7, 2024.

E. Pik. “Airport Security: The Impact of AI on Safety, Efficiency, and the Passenger Experience.” Journal of Transportation Security, Vol. 17, No. 1, December, 2024.

D. Shevchuk and I. Steniakin. “A Holistic Approach to Ensuring Safety and Cybersecurity in the Use of Intelligent Technologies in Air Transport.” Electronics and Control Systems, Vol. 1, No. 75, pp. 97-101, 2023.

The Wall Street Journal, Pager Attacks in Lebanon ‘Weaponize’ Supply Chains. Available Online at https://www.wsj.com/articles/ pager-attacks-in-lebanon-weaponize-supply-chains-60722390, accessed on 1 February 2024.

R. Sabillon and J.R.B. Higuera. “The Importance of Cybersecurity Awareness Training in the Aviation Industry for Early Detection of Cyberthreats and Vulnerabilities.” International Conference on Human-Computer Interaction, pp. 461-479, 2023.

S. Chockalingam, E. Nystad, and C. Esnoul. “Capability Maturity Models for Targeted Cyber Security Training.” Proceedings of the International Conference on Human-Computer Interaction, pp. 576-590, 2023.

The Hacker News, Why Human Error is #1 Cyber Security Threat to Businesses in 2021. Available Online at https://thehackernews. com/2021/02/why-human-error-is-1-cyber-security.html, accessed on 1 February 2024.

P. Stastny and A. M. Stoica. “Protecting Aviation Safety Against Cybersecurity Threats.” IOP Conference Series: Materials Science and Engineering, Vol. 1226, No. 1, pp. 12-25, 2022.

H. Saada, R. Orizio, and S. Sebastio. “Modeling and Conducting Security Risk Assessment of Smart Airport Infrastructures with SECRAM.” Proceedings of the 7th International Conference on Networking, Intelligent Systems and Security,No. 59, pp. 1-7, 2024.

T. Jeeradist. “Flight Delays and Cancellations Due to Airport Technology Network Disruptions Worldwide.” KBU Journal of Aviation Management: KBUJAM, Vol. 2, No. 1, pp. 51-60, 2024.

L. Florido-Benítez. “The Types of Hackers and Cyberattacks in the Aviation Industry.” Journal of Transportation Security, Vol. 17, No. 13, 2024.

H. Su and W. Pan. “Using Digital Twins to Integrate Cyber Security with Physical Security at Smart Airports”. Interdisciplinary Journal of Engineering and Environmental Sciences, Vol. 10, No. 1, pp. 38-45, January-March, 2023.

S. Samuri, M.F.A. Khir, Z.M. Amin, and M. F. N. Mohammad. “Cybersecurity Maturity Framework for International Airports in Malaysia: A Systematic Literature Review (SLR).” Journal of Information and Knowledge Management (JIKM), Vol. 2, pp. 156-167, 2023.

E. Ukwandu, M. Ben-Farah, H. Hindy, M. Bures, R. Atkinson, C. Tachtatzis, I. Andonovid, and X. Bellekens. “Cybersecurity Challenges in Aviation Industry: A Review of Current and Future Trends.” Information, Vol. 13, No. 3, 2022.

L.F. Benítez. “Identifying Cyber Security Risks in Spanish Airports.” Cyber Security: A Peer-Reviewed Journal, Vol. 4, No. 3, pp. 267-291, 2021.

M. Karpiuk and M. Kelemen. “Cybersecurity in Civil Aviation in Poland and Slovakia.” Cybersecurity and Law, Vol. 8, No. 2, pp. 70-83, 2022.

C. Nobles, D. Burrell, and T. Waller. “The Need for a Global Aviation Cybersecurity Defense Policy” Land Forces Academy Review, Vol. 27, No. 1, pp. 19-26, March 2022.

V. Filinovych and Z. Hu. “Aviation and the Cybersecurity Threats.” Proceedings of the International Conference on Business, Accounting, Management, Banking, Economic Security and Legal Regulation Research (BAMBEL 2021), pp. 120-126, 2021

M. Klenka. “Aviation Cyber Security: Legal Aspects of Cyber Threats.” Journal of Transportation Security, Vol. 14, No. 3, pp. 177-195, December, 2021.

S. Adhikari and S. Mirchandani. “Integrating Risk Assessment Modeling with Aviation Cybersecurity Framework.” AIAA AVIATION 2020 FORUM, pp. 29-32, 2020.

S. Adhikari. “An Analysis of AIAA Aviation Cybersecurity Framework in Relation to NIST, COBIT and DHS Frameworks.” AIAA AVIATION 2020 FORUM, pp. 2930, 2020.

B. Kotkova. “Information Systems and Technologies for the Safe Operation of Airports.” Proceedings of the 26th International Conference on Circuits, Systems, Communications and Computers, IEEE, pp. 161-166, 2022.

R. A. Ramadan, B. W. Aboshosha, J. S. Alshudukhi, A. J. Alzahrani, A. El-Sayed, and M. M. Dessouky. “Cybersecurity and Countermeasures at the Time of Pandemic.” Journal of Advanced Transportation, Vol. 2021, No. 1, 2021.

Trend Micro, The case for making BYOD safe-security news. Available Online at https://www.trendmicro.com/ vinfo/us/security/news/internet-of-things/the-case-for-making-byod-safe, accessed on 1 February 2024.

C. Brook, The Ultimate Guide to BYOD Security: Definition & More. Available Online at https://digitalguardian.com/blog/ ultimate-guide-byod-security-overcoming-challenges-creating-effective-policies-and-mitigating, accessed on 1 June 2023

A. Bridgwater, How mobile device management is taking on the BYOD challenge. Available Online at https://www.theregister. com/2014/11/08/mobileworking/, accessed on 1 June 2023.

Y. Joshi, D. Das, and S. Saha. “Mitigating Man in the Middle Attack Over Secure Sockets Layer.” Proceedings of the 2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA), pp. 1-5, 2009.

M. Marlinspike, New Tricks for Defeating SSL in Practice. Black Hat USA, Available Online at https://www.blackhat.com /presentations/bh-dc-09/Marlinspike/BlackHat-DC-09-Marlinspike-Defeating-SSL.pdf, accessed on 1 June 2023.

Norton, Public Wi-Fi: An Ultimate Guide on the Risks + How to Stay Safe. Available Online at https://us.norton.com/ blog/privacy/public-wifi, accessed on 1 February 2024.

S. Englehardt, D. Reisman, C. Eubank, et al. “Cookies that Give You Away: The Surveillance Implications of Web Tracking.” Proceedings of the 24th International Conference on World Wide Web, Florence, Italy, pp. 289-299, 2015.

X. Zheng, J. Jiang, J. Liang, et al. “Cookies Lack Integrity: Real-World Implications.” Proceedings of the 24th USENIX Security Symposium, Washington, D.C, pp. 707-721, 2015.

S. Sivakorn, I. Polakis, and A. D. Keromytis. “The Cracked Cookie Jar: HTTPS Cookie Hijacking and the Exposure of Private Information.” Proceedings of the 2016 IEEE Symposium on Security and Privacy, pp. 724-742, 2016.

S. Sivakorn, A. D. Keromytis, and J. Polakis. “That’s the Way the Cookie Crumbles: Evaluating HTTPS Enforcing Mechanisms.” Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016.

S. Sivakorn, P. Sirawongphatsara, and N. Rujiratanapat. “Web Encryption Analysis of Internet Banking Websites in Thailand”. Proceedings of the 17th International Joint Conference on Computer Science and Software Engineering, pp. 139-144, 2020.

M. Kacic, P. Hanacek, M. Henzl, and P. Jurnecka, “Malware Injection in Wireless Networks.” Proceedings of the 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems, Vol. 01, pp. 483-487. 2013.

A. Zimba, Z. Wang, and M. Mulenga. “Cryptojacking Injection: A Paradigm Shift to Cryptocurrency-based Web-centric Internet Attacks.” Journal of Organizational Computing and Electronic Commerce, Vol. 29, pp. 40-59, 2019.

J. Spaulding, A. Krauss, and A. Srinivasan. “Exploring an Open WiFi Detection Vulnerability as a Malware Attack Vector on iOS Devices.” Proceedings of the 7th International Conference on Malicious and Unwanted Software, pp. 87-93, 2012.

Krebson Security, Why is ‘Juice Jacking’ Suddenly Back in the News?. Available Online at https://krebsonsecurity.com/2023/ 04/why-is-juice-jacking-suddenly-back-in-the-news/, accessed on 1 February 2024.

Kaspersky, What is an Evil Twin Attack? Evil Twin Wi-Fi Explained. Available Online at https://www.kaspersky. com/resource-center/preemptive-safety/evil-twin-attacks, accessed on 1 February 2024.

V. Roth, W. Polak, E. G. Rieffel, and T. Turner. “Simple and Effective Defense Against Evil Twin Access Points”. Wireless Network Security, pp. 220-235, 2008.

H. Gonzales, K. Bauer, J. Lindqvist, D. McCoy, and D. Sicker. “Practical Defenses for Evil Twin Attacks in 802.11.” Proceedings of the 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, pp. 1-6, 2010.

Palo Alto Networks, What Is Network Segmentation?. Available Online at https://shorturl.at/rCIDK, accessed on 1 June 2023.

The Local Austria, Turkish suspect identified in Vienna airport cyberattack. Available Online at https://www.thelocal.at/2017 0228/suspect-identified-in-vienna, accessed on 1 June 2023

H. Abbas, N. Emmanuel, M. F. Amjad, et al. “Security Assessment and Evaluation of VPNs: A Comprehensive Survey,” ACM Comput. Surv., Vol. 55, No. 13s, pp.1-47, 2023.

CISA, 2021 Top Routinely Exploited Vulnerabilities. Available Online at https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-117a, accessed on 1 June 2023.

TechTarget, The Mirai IoT Botnet holds strong in 2020. Available Online at https://shorturl.at/GMUA8, accessed on 1 June 2023.

Keyfactor, Top 10 IoT Vulnerabilities in Your Devices. Available Online at https://www.keyfactor.com/blog/top-10-iot-vulnerabilities, accessed on 1 June 2023.

Bloomberg, China Used a Tiny Chip in a Hack That Infiltrated U.S. Companies. Available Online at https://shorturl.at/tMHdW, accessed on 1 February 2024.

WIRED, Hacker Lexicon: What Is a Supply Chain Attack?. Available Online at https://www.wired. com/story/hacker-lexicon-what-is-a-supply-chain-attack/, accessed on 1 June 2023.

M. Theoharidou, S. Kokolakis, M. Karyda, and E. A. Kiountouzis. “The insider threat to information systems and the effectiveness of ISO17799.” Computers & Security, Vol. 24, pp. 472-484, 2005.

MITRE. MITRE ATT&ACK Matrix for Enterprise. Available Online at https://attack.mitre.org/, accessed on 1 September 2024.

SecureList, DarkVishnya: Banks attacked through direct connection to local network. Available Online at https://securelist. com/darkvishnya/89169/, accessed on 1 February 2024.

SecureWorks, Gold Sahara. Available Online at https://www.secureworks.com/research/threat-profiles/gold-sahara, accessed on 1 February 2024.

Google, Turla: A Galaxy of Opportunity. Available Online at https://cloud.google.com/blog/topics/threat-intelligence/ turla-galaxy-opportunity, accessed on 1 February 2024.

CANSO, CANSO Standard of Excellence in Cybersecurity. Available Online at https://canso.org/publication/canso-standard-of-excellence-in-cybersecurity/, accessed on 1 February 2024.

Airports of Thailand (AOT), AOT ICT Security Policy, AOT Cyber Security Policy and AOT Personal Data Protection Policy. Available Online at https://corporate.airportthai. co.th/th/cybersecurity-th/, accessed on 1 February 2024.

TSA, TSA issues new cybersecurity requirements for airport and aircraft operators. Available Online at https://shorturl.at/eXlvZ, accessed on 1 June 2023.

T. Szuba. Safeguarding Your Technology: Practical Guidelines for Electronic Education Information Security. National Center for Education Statistics, 1998.

ICAO, Annex 17 - Aviation Security, ICAO - International Standards and Recommended Practices. Available Online at https://shorturl.at/JQHkr, accessed on 1 February 2024.

ICAO, AVIATION CYBERSECURITY. (2022), Available Online at https://www.icao.int/aviationcybersecurity/Pages/default.aspx, accessed on 1 February 2024.

S.-J. Lee, H.Y. Shim, Y.R. Lee, T.R. Park, S.H. Park, and I.G. Lee. “Study on Systematic Ransomware Detection Techniques.” Proceedings of the 24th International Conference on Advanced Communication Technology (ICACT), pp. 297-301. 2022

MITRE, MITRE ATT&CK Matrix - Data Encrypted for Impact. Available Online at https://attack.mitre.org/techniques/T1486/, accessed on 1 February 2024.

J. Katz. “Universally Composable Multi-party Computation using Tamper-proof Hardware.” Advances in Cryptology – EUROCRYPT 2007, pp. 115-128, 2007.

R. Gennaro, A. Lysyanskaya, T. Malkin, S. Micali, and T. Rabin. “Algorithmic Tamper-proof (ATP) Security: Theoretical Foundations for Security Against Hardware Tampering.” Theory of Cryptography Conference TCC 2004, 2004.

MITRE, MITRE ATT&CK Matrix - Network Denial of Service. Available Online at https://attack.mitre.org/techniques/T1498/, accessed on 1 February 2024.

WIRED, GitHub Survived the Biggest DDoS Attack Ever Recorded. Available Online at https://www.wired.com/story/ github-ddos-memcached/, accessed on 1 February 2024.

I. A. Shah, N. Jhanjhi, and S. Brohi. “Cybersecurity Issues and Challenges in Civil Aviation Security.” Cybersecurity in the Transportation Industry, pp. 1-23, 2024.

D. S. Turetsky, B. H. Nussbaum, and U. Tatar. Success Stories in Cybersecurity Information Sharing. The College of Emergency Preparedness, Homeland Security and Cybersecurity University at Albany, 2020.