Preprint Article Version 1 This version is not peer-reviewed

An Open-Source Database of Cyberattacks on the Maritime Transportation System

Version 1 : Received: 24 October 2024 / Approved: 24 October 2024 / Online: 25 October 2024 (08:01:43 CEST)

How to cite: Pijpker, J.; McCombie, S.; Johnson, S.; Loves, R.; Makrakis, G. M. An Open-Source Database of Cyberattacks on the Maritime Transportation System. Preprints 2024, 2024101996. https://doi.org/10.20944/preprints202410.1996.v1 Pijpker, J.; McCombie, S.; Johnson, S.; Loves, R.; Makrakis, G. M. An Open-Source Database of Cyberattacks on the Maritime Transportation System. Preprints 2024, 2024101996. https://doi.org/10.20944/preprints202410.1996.v1

Abstract

The Global Maritime Transportation System (GMTS) is a complex system of systems, encompassing port operations, shipping lines for both cargo and passengers, manufacturing, vessel traffic control, and the vessels themselves. In recent decades, cybersecurity incidents targeting the GMTS have grown significantly in both frequency and economic impact. In response to this escalating threat, we initiated a comprehensive effort in 2021 to systematically collect and catalog all publicly known cybersecurity incidents affecting the GMTS. Drawing from peer-reviewed research, news articles, and government reports, we compiled this data into the Maritime Cyber Attack Database (MCAD). Our dataset, spanning 2001 to 2023, includes over 290 cybersecurity incidents–representing a several-fold increase from the 46 incidents reported in previous research conducted in 2020. These incidents involve 54 countries and over 50 vessels, in addition to various GMTS-associated entities such as ports. The attribution of these incidents points to a range of known nation-state and criminal threat actors. This paper presents MCAD as a novel cyber threat intelligence tool and provides a high-level analysis of the collected data, offering insights into the evolving cyber threat landscape within the GMTS.

Keywords

maritime; cybersecurity; cyber threat intelligence (CTI); maritime industry

Subject

Computer Science and Mathematics, Security Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.