Abstract
With the development and widespread application of information technology, cybersecurity has become a focal point in all industry sectors. The maritime sector is no exception, with both physical and cyber threats. This survey first highlights, from a system engineering and information technology perspective, the specific architectures of on-vessel and in-port systems, as well as the communication equipment connecting them. Subsequently, cyber attacks in maritime and port domains and their potential consequences are described from various angles. Examples of real cases of cyber attacks are also reported. An overview of current key techniques used in vulnerability analysis, attack detection, and security protection is proposed before discussing cybersecurity issues in the maritime and port sectors from the particular perspective of discrete event systems. Various systems used in maritime and port domains are modeled as automata or Petri nets. Some analysis, detection, and protection approaches are then proposed to illustrate the potential of discrete event systems in this domain.
MSC:
93-10; 93C65
1. Introduction
According to the data from the Review of Maritime Transport 2024 by the United Nations Conference on Trade and Development, released in 2024, maritime transport handles over 80% of the world’s trade volume [], which demonstrates that the maritime industry is a critical factor in the world economy []. Maritime transport relies on an extensive global network of ports and shipping lanes. As the maritime industry undergoes a digital transformation, innovations such as smart shipping [], automated ports [], and blockchain technology offer significant opportunities to improve efficiency and reduce costs []. The increasing connectivity of equipment, systems, and devices within the maritime environment facilitates accessibility and enhances functionality, leading to more efficient operations. These connected systems include navigational, communication, cargo management, dynamic positioning, terminal management, tracking, logistics, and many others. However, this growing digitalization and connectivity also introduce substantial cybersecurity challenges [,,,,,,,,,,,,,].
To effectively address these growing threats, the industry must focus on vulnerability analysis in the maritime and port sectors, improve cyber attack detection capabilities, and establish resilient defense strategies to ensure the safe and secure operation of maritime activities [,,,,,]. System security typically prioritizes three core principles: confidentiality, integrity, and availability (CIA) [,]. Confidentiality ensures that the system’s information is accessible only to those with proper authorization. Integrity protects the system from unauthorized alterations or damage while maintaining the accuracy and trustworthiness of the data. Finally, availability guarantees that authorized users can access the system whenever needed, minimizing service interruptions and unnecessary downtime. System vulnerabilities refer to weaknesses or flaws within the design, implementation, or configuration of a system that can be exploited by attackers to gain unauthorized access, disrupt operations, or cause harm [,,,,]. These vulnerabilities can exist in software, hardware, or processes, and they pose significant risks to the system’s CIA. Identifying and addressing these vulnerabilities is critical to maintaining robust system security. Vulnerability analysis in the maritime and port sectors involves systematically identifying, assessing, and addressing potential weaknesses within critical infrastructures, systems, and processes that could be exploited by cyber threats or other security risks [,,,]. This analysis focuses on the various connected devices, communication networks, information systems, and operational technologies used in ports and maritime operations. Key aspects include the following:
- Identifying vulnerabilities: assessing all components, including hardware, software, and network configurations, to identify potential weaknesses that could be targeted by cyber attacks.
- Assessing risk impact: evaluating the potential impact of identified vulnerabilities on the CIA of critical maritime and port systems.
- Prioritizing vulnerabilities: ranking vulnerabilities based on their severity and the likelihood of exploitation, allowing for targeted mitigation efforts.
- Mitigation and protection: implementing security measures, such as patch management, intrusion detection systems, and network segmentation, to reduce the risk of vulnerabilities being exploited.
- Continuous monitoring: regularly updating vulnerability analysis to adapt to new threats and changes in the technology landscape to ensure that the maritime and port sectors remain resilient against evolving cyber risks.
In this survey, the literature was identified through targeted searches in major academic databases, including Scopus, Web of Science, IEEE Xplore, and SpringerLink, covering the period 2005–2025. The search combined keywords such as “discrete event system”, “cybersecurity”, “cyber attack”, “maritime”, and “port”. The initial set of publications was refined by focusing on works that provide conceptual insights, methodological innovations, or representative applications within the maritime and port cybersecurity domains.
This survey distinguishes itself from previous reviews/surveys [,,,] by focusing specifically on the maritime and port sectors from a system engineering and information technology perspective, in particular by using discrete event system (DES) models [,,,]. While other reviews may cover broader topics or related industries, this analysis is uniquely tailored to the challenges and developments within these specialized fields. It is aimed at professionals, researchers, and decision-makers who are directly involved in maritime operations, port management, and the use of DES methodologies to enhance efficiency and strategic planning.
The rest of this paper is organized as follows. Section 2 describes the main maritime and port equipment/sites where cyber attacks are likely to occur, from the existence of information transmission and exchange. Section 3 is about cyber attacks and cybersecurity in the maritime and port domains. A classification and several examples of attacks are provided, and the common vulnerabilities and consequences of cyber attacks are also discussed. In Section 4, cybersecurity in the maritime and port domains is studied from a DES perspective. Basic models of vessel traffic management, radar, and port automated guided vehicle systems are described with automata and Petri nets. Section 5 explores DES-based methods for analysis, detection, and protection in cybersecurity contexts. Section 6 outlines the main research challenges and promising directions for future work in the maritime and port domains. Finally, Section 7 concludes the paper.
2. Architectures of On-Vessel and In-Port Communication Systems
When researching cybersecurity issues in the maritime and port sectors, it is essential to thoroughly understand the communication structures between ships, ports, and the various interactions, such as ship-to-ship, ship-to-port, and port-to-port. This knowledge is crucial because the interconnected nature of these systems makes them vulnerable to potential cyber threats. By understanding how these communication systems and operational structures work, stakeholders can better identify security risks, develop effective defense mechanisms, and implement robust cybersecurity strategies to protect the integrity and safety of maritime operations [,,,].
The maritime infrastructure can be represented by two essential platforms: on-vessel and in-port. The description of each platform, the connections between components, and the relationship between services are presented in Figure 1.
Figure 1.
Vessel/port infrastructure.
On the one hand, the primary structures involved in the interaction and communication between ships and ports include the following on-vessel systems.
Navigation systems: These are critical for ensuring safe navigation of the ships. Key components include radar, Global Positioning System (GPS), Automatic Identification System (AIS), Electronic Chart Display and Information System (ECDIS), and an echo sounder.
Communication systems: These are used to communicate with the port, other vessels, and maritime authorities. This includes Very High Frequency (VHF) Radio, Satellite Communication, and Medium/High Frequency (MF/HF) Radio.
Control systems: Systems like Autopilot, Propulsion Control, and Ballast Water Systems are essential for precise maneuvering and maintaining vessel stability when entering or leaving a port.
Identification systems: AIS, ship lights, and horns are used for visual and electronic identification of the vessel.
On the other hand, interactions and communications between systems also include in-port systems.
Port control center: It is the control hub of the port, responsible for overseeing and managing the movement of ships in and out of the port, including berth assignments.
Vessel traffic service: This system monitors and guides vessel movements within the port and surrounding waters, offering navigation assistance and collision prevention.
Berthing facilities: They include mooring buoys and bollards used for the safe docking of ships.
Port communication systems: Ports use various communication methods, including VHF radio, telephone, and email, to coordinate with ships and other stakeholders.
Port security systems: Closed-circuit television surveillance, access control systems, and other security measures ensure the port’s safety.
Finally, the communication between ships and ports includes the following communications:
Berthing and departure notification: Ships notify the port of their estimated time of arrival and request berth assignments. The port confirms and provides specific instructions.
Berthing operations: Continuous communication between the ships and the port vessel traffic service during the approach to and departure from the port, covering docking instructions, tugboat assistance, and other operational details.
Emergency communication: In case of emergencies, ships use VHF, the Global Maritime Distress and Safety System, or other methods to contact the port for assistance or to provide information about incidents.
These structures and systems work together to ensure smooth and safe operations between ships and ports, from navigation to docking, communication, and security.
3. Cyber Attacks in the Maritime and Port Domains
In the maritime and port sectors, cyber attacks can take various forms, each targeting different aspects of operations, communications, and infrastructures. Over the years, various types of cyber attacks have been executed due to numerous security vulnerabilities. In order to discuss cyber attacks in a rigorous way, some key notions are first recalled.
- Cyber incident: A cyber incident is an occurrence that actually or potentially results in adverse consequences to an onboard system, network, and computer or the information that they process, store, or transmit, and which may require a response action to mitigate the consequences (https://www.bimco.org/about-us-and-our-members/publications/the-guidelines-on-cybersecurity-onboard-ships, accessed on 7 July 2025).
- Cyber attack: any type of offensive maneuver that targets Information Technology (IT) and Operational Technology (OT) systems, computer networks, and/or personal computer devices attempting to compromise, destroy, or access company and ship systems and data.
- Confidentiality: Confidentiality of the data represents the use of sensitive and confidential information by authorized personnel only and provides the security mechanisms to maintain the privacy of the data and system.
- Integrity: Integrity refers to the protection of valuable information and data from external and internal actors during daily system use.
- Availability: Availability permits immediate access of authorized personnel to information and data for normal operation or in dangerous situations, providing independence for the company in terms of using its resources.
3.1. Main Types of Cyber Attacks
Table 1 shows the main types of cyber attacks in the maritime and port sectors and also gives some corresponding past real cases. These events represent only the tip of the iceberg; there are multiple similar incidents that have not been mentioned.
Table 1.
Main types of cyber attacks and past real cases.
There are many infrastructure devices and services in the maritime and port sector that are threatened and which can be vulnerable to cyber attacks. Based on the analysis of past real-world attack cases, the following are identified as the most susceptible to such threats:
- AIS: Since 2002, AIS has been mandatory for all passenger and sea-going vessels with 300 gross tonnage or more. It is a tool for vessel safety, collision avoidance, and ship monitoring, providing vessel information and status. Course, speed, and position are some of the information displayed in the AIS for the safety and security of vessel operations. However, the exposure of the AIS, concerning connectivity and information providers, represents a high risk for vessel operations. If the AIS is attacked, the consequences in terms of communication interconnectivity with ship-to-ship, ship-to-shore, and shore-to-ship can be significant. Furthermore, it has been proven that the AIS does not have the necessary security measures integrated, exposing it to cyber attacks. For example, it is possible to deactivate and manipulate the AIS information to create a false collision or SAR alert.There exist several cases of AIS attacks [,,,,,,,,,,].In a series of events in 2017, numerous vessels in the Black Sea reported their GPS positions being spoofed, causing them to display incorrect locations. Some ships showed their locations as being on land, while others appeared to be far from their actual positions. This raised concerns about the vulnerability of both GPS and AIS systems to cyber attacks and manipulation (https://maritime-executive.com/editorials/mass-gps-spoofing-attack-in-black-sea (accessed on 23 July 2025)). In particular, in 2017, the British Royal Navy’s destroyer HMS Defender was reportedly involved in an AIS spoofing incident while navigating near Crimea, in the Black Sea (https://www.euronews.com/next/2021/06/28/hms-defender-ais-spoofing-is-opening-up-a-new-front-in-the-war-on-reality (accessed on 23 July 2025)). In 2019 and 2020, there were reports of “phantom fleets” in the South China Sea and off the coast of South America. AIS data indicated the presence of fleets of ships that did not actually exist, likely created through spoofing. These ghost ships were used to mask illegal fishing operations or the movement of sanctioned oil cargoes, highlighting how AIS manipulation could facilitate illicit activities.
- Navigation systems: by emitting false or misleading signals that overlap with the ship’s true position or indicating fake emergencies. This risk is increased by the growing reliance on technologies that control navigation, cargoes, etc., and by systems such as dynamic positioning, ship-to-shore interfaces, propulsion controls, cargo valve actuators, and passenger-boarding systems.There exist several cases of navigation system attacks []. In 2013, the University of Texas demonstrated the possibility of attacking the navigation systems by taking control of a yacht by spoofing its GPS (https://newatlas.com/gps-spoofing-yacht-control/28644/, accessed 25 July 2025). In 2014 and 2017, ships were fooled in a GPS spoofing attack, suggesting a Russian cyberweapon (https://maritime-executive.com/editorials/mass-gps-spoofing-attack-in-black-sea, accessed on 25 July 2025, https://www.newscientist.com/article/2143499-ships-fooled-in-gps-spoofing-attack-suggest-russian-cyberweapon/, accessed on 25 July 2025). In 2016, cyber threats prompted the return of radio for ship navigation (https://www.reuters.com/article/us-shipping-gpscyber-idUSKBN1AN0HT/, accessed on 25 July 2025). In February 2017, hackers reportedly took control of the navigation systems of a German-owned 8250 TEU container vessel en route from Cyprus to Djibouti for hours (https://rntfnd.org/2017/11/25/hackers-took-full-control-of-container-ships-navigation-systems-for-10-hours-ihs-fairplay/, accessed on 25 July 2025).
Attacks also affect vessel communication systems (https://www.spglobal.com/commodityinsights/en/market-insights/latest-news/shipping/101317-shipping-bw-groups-computer-systems-hacked-steps-up-cybersecurity, accessed on 25 July 2025, https://psabdp.com/, accessed on 25 July 2025), shipping company sytems, and systems for loading and unloading cargo. Such systems are one of the targets of attacks because they are the key to the good functioning and coordination of the loading and unloading operations of the ships and the compliance of their respective lines in time. Examples of such attacks are manipulation and sabotage; falsification; piracy and robbery; destruction; and alteration and deviation.
3.2. Literature Review on Cybersecurity in Maritime and Port Sectors
With the wide and rapid development of numerical solutions in communications, networked systems, and cyber–physical devices during the last three decades, cybersecurity has become a critical issue in many domains, including the maritime and port sectors. There also exists an exponential increase in the number of scientific papers including survey papers, about cybersecurity in maritime and port domains. Figure 2 illustrates these statistics based on ResearchGate, MDPI, Elsevier, and Cambridge databases. Table 2 and Table 3 sum up the survey papers that have been considered for this study.
Figure 2.
Literature about cybersecurity in maritime and port domains.
3.3. Consequences of Cyber Attacks and Cybersecurity Mitigation Guidelines
Cyber attacks in the maritime and port sectors can have extensive and severe impacts, particularly in terms of safety, environmental damage, and economic disruption []. Below is a detailed exploration of these potential consequences:
- Safety impact: Cyber attacks pose significant threats to safety in the maritime and port industries. Modern ships and ports rely heavily on automated and digital systems, such as navigation, communication, and cargo management systems. If these systems are compromised by hackers, it could result in vessels losing control, navigating incorrectly, or even colliding with other ships, endangering the lives of crew and passengers.For example, in 2017, the global shipping giant Maersk was hit by the NotPetya cyber attack. This attack crippled their IT systems, causing severe disruptions in their ability to operate and schedule vessels, thereby affecting the global shipping network’s safety. While no direct collisions were reported, the incident exposed vulnerabilities that could lead to serious safety risks.
- Environmental impact: Cyber attacks can lead to catastrophic environmental disasters, especially when hazardous materials are involved. If attackers gain control of a ship’s navigation or control systems, they could cause the vessel to run aground or collide in environmentally sensitive areas, leading to oil spills, chemical leaks, and other environmental catastrophes.For example, in 2010, the Stuxnet worm, although primarily targeting nuclear facilities, demonstrated the potential for widespread damage if similar attacks were directed at maritime operations. In particular, a cyber attack on a vessel carrying hazardous chemicals could result in the ship grounding in a fragile marine ecosystem, causing significant environmental harm.
- Economic impact: The economic impact of cyber attacks on maritime and port operations can be devastating. Ports and shipping companies are critical nodes in global trade, and a cyber attack could lead to cargo delays, supply chain disruptions, and substantial financial losses. Additionally, the cost of restoring compromised systems and addressing security vulnerabilities can be significant.For example, in 2020, CMA CGM Group suffered a ransomware attack that disrupted its online systems, preventing customers from booking cargo shipments and severely interrupting the logistics chain. This incident not only resulted in direct financial losses for CMA CGM but also affected the stability of global supply chains, highlighting the far-reaching economic impact of cyber attacks.
In summary, the potential impacts of cyber attacks in the maritime and port sectors are profound and far-reaching. Safety hazards, environmental risks, and economic losses are the primary dimensions of these impacts. To mitigate these threats, the maritime and port industries must strengthen their cybersecurity defenses, develop robust incident response plans, and continuously monitor and update their security systems to reduce the likelihood and severity of cyber attack-related consequences.
Table 2.
Survey papers on cybersecurity in maritime and port sectors-1.
Table 2.
Survey papers on cybersecurity in maritime and port sectors-1.
| Ref. | Year | Title | Comments |
|---|---|---|---|
| [] | 2025 | Port resilience: a systematic literature review | This paper systematically reviews research on port resilience, examining definitions, frameworks, and key influencing factors. It identifies gaps such as fragmented approaches and limited empirical studies and proposes directions for future research to enhance port resilience. |
| [] | 2024 | Maritime autonomous surface ships: a review of cybersecurity challenges, countermeasures, and future perspectives | This paper reviews cybersecurity threats and defenses for maritime autonomous surface ships, highlighting AIS/GPS vulnerabilities and proposing multi-layer protections integrating IMO frameworks. It explores AI, blockchain, and behavior analytics to enhance maritime autonomous surface ship resilience. |
| [] | 2024 | Blockchain implementation in the maritime industry: a literature review and synthesis analysis of benefits and challenges | This paper reviews blockchain applications in maritime logistics, highlighting its potential to improve transparency, traceability, and efficiency, while addressing challenges in standardization, scalability, and regulatory compliance, and exploring integration with IoT and AI. |
| [] | 2024 | Maritime cybersecurity: A comprehensive review | A comprehensive survey of maritime cybersecurity, analyzing threats, incidents, countermeasures, and challenges across vessels, ports, and the global maritime supply chain to guide resilience and future research. |
| [] | 2024 | Port cyber attacks from 2011 to 2023: a literature review and discussion of selected cases | This paper analyzes 15 cases showing that ransomware and disruption are the main motives. Weak procedures and low awareness increase risks, while timely detection, collaboration, and comprehensive disaster plans are crucial for resilience. |
| [] | 2023 | Cyber-seaworthiness: a critical review of the literature | It reviews maritime cyber risks and policy frameworks, introducing the concept of “cyber-seaworthiness” to address rising threats from digitization and autonomous ships and to guide future industry, legal, and policy developments. |
| [] | 2023 | Maritime cybersecurity threats: gaps and directions for future research | It examines maritime cybersecurity, identifying major research gaps, policy needs, and priorities, including the lack of real-time attack data, limited economic impact studies, inadequate professional training, and insufficient legal frameworks. |
| [] | 2023 | Literature review on maritime cybersecurity: state-of-the-art | It reviews maritime cybersecurity research, noting current work is mostly conceptual and qualitative. It calls for quantitative methods and interdisciplinary collaboration to address complex cyber attacks and strengthen industry resilience. |
| [] | 2023 | A survey on cybersecurity threats in the IoT-enabled maritime industry | This paper reviews the applications of IoT in the maritime industry and the major cybersecurity threats it faces, including attack types, vulnerabilities, and potential impacts. It also discusses the limitations of existing protection measures and suggests directions for future research and improvement. |
| [] | 2022 | Cybersecurity challenges in the maritime sector | The paper maps key cybersecurity challenges in the maritime sector, but its analysis is mostly descriptive, lacking quantitative depth and concrete mitigation strategies. It usefully outlines vulnerabilities and gaps, yet more empirical and actionable research is needed. |
| [] | 2022 | Developments and research directions in maritime cybersecurity: a systematic literature review and bibliometric analysis | The paper analyzes cybersecurity risks in the maritime industry’s digital transformation and highlights vulnerabilities in shipping and ports. It calls for stronger defenses through policies, technology, and training. |
| [] | 2022 | Digital transformation of the maritime industry: a cybersecurity systemic approach | The paper proposes a systemic approach to maritime cybersecurity, stressing coordination across technology, organization, and policy. It argues that only a holistic governance framework can handle the evolving threat landscape. |
| [] | 2022 | Review of ship information security risks and safety of maritime transportation issues | The paper reviews ship information security risks under digitalization, highlighting system vulnerabilities and cargo threats. It proposes risk assessment methods and stresses multilayered cyber resilience. |
| [] | 2022 | Cyber security in the maritime industry: a systematic survey of recent advances and future trends | The paper outlines key cybersecurity challenges in maritime, stressing vulnerabilities in critical systems. It calls for regulation, technology, and training to strengthen defense. |
| [] | 2021 | Maritime cybersecurity: a global challenge tackled through distinct regional approaches | This paper discusses maritime cybersecurity as a global challenge, analyzing IMO initiatives and regional responses in Europe and Asia. It highlights international cooperation and harmonized standards as key to strengthening overall industry cybersecurity. |
Table 3.
Survey papers on cybersecurity in maritime and port sectors-2.
Table 3.
Survey papers on cybersecurity in maritime and port sectors-2.
| Ref. | Year | Title | Comments |
|---|---|---|---|
| [] | 2020 | Internet of ships: a survey on architectures, emerging applications, and challenges | This paper surveys the architectures, key technologies, and emerging applications of the Internet of Ships, highlighting its roles in smart shipping, port management, and maritime safety. It also identifies major challenges such as standardization, security, data processing, and cross-domain integration. |
| [] | 2020 | Innovation and maritime transport: a systematic review | This paper reviews innovation research in maritime transport, summarizing types of innovation, driving factors, and their impact on the industry. It also points out that existing studies are fragmented and lack empirical evidence and proposes future research directions. |
| [] | 2019 | Cybersecurity in the maritime industry: a literature review | This paper reviews maritime cybersecurity, highlighting incidents and key threats such as poor training, outdated IT, hacker targeting, and phishing. It proposes countermeasures including cybersecurity processes, training, system upgrades, and a stronger security culture. |
| [] | 2019 | Evaluating cybersecurity risks in the maritime industry: a literature review | This paper surveys maritime cybersecurity, identifying key threats including lack of training and experts, outdated systems, and hacker targeting, and proposing mitigation strategies such as process development, training, regular system updates, and fostering a cybersecurity culture. |
| [] | 2018 | Cyber attacks on ships: a wicked problem approach | This paper analyzes cyber attacks on ships as a “wicked problem,” emphasizing their complexity, unpredictability, and severe consequences for safety and operations. It highlights the urgent need for holistic, adaptive approaches to improve maritime cybersecurity resilience. |
| [] | 2018 | Models and computational algorithms for maritime risk analysis: a review | This paper reviews models and computational algorithms for maritime risk analysis, covering probabilistic, simulation-based, and data-driven approaches. It identifies strengths and limitations of existing methods and suggests future research directions for improving maritime safety and decision-making. |
| [] | 2018 | The global maritime industry remains unprepared for future cybersecurity challenges | This paper finds the maritime industry highly vulnerable to cyber attacks due to digital reliance, outdated systems, and weak preparedness. It stresses fast-growing threats, slow regulations, and the urgent need for stronger defenses, especially for autonomous vessels. |
| [] | 2017 | Review on cybersecurity risk assessment and evaluation and their approaches to maritime transportation | This paper reviews cybersecurity risk assessment and evaluation approaches in maritime transportation, analyzing methods such as qualitative, quantitative, and hybrid models. It also highlights their limitations and emphasizes the need for more effective frameworks tailored to the maritime sector. |
| [] | 2016 | Safety-critical maritime infrastructure systems resilience: a critical review | This paper analyzes safety-critical maritime infrastructure systems, focusing on their operations, risks, resilience, regulations, and lessons from past incidents to enhance safety and operational resilience. |
| [] | 2016 | Threats and impacts in maritime cybersecurity | This paper analyzes cyber threats to maritime navigation, propulsion, and cargo systems, emphasizing vulnerabilities from outdated technologies. It illustrates attack scenarios and calls for stronger security design, crew training, and resilience. |
| [] | 2016 | Maritime security: an introduction (book) | This book introduces maritime security across ports, vessels, and cargo supply chains, addressing threats like piracy, terrorism, smuggling, and cyber attacks. It also outlines legal frameworks and response strategies for industry and government. |
| [] | 2015 | Challenges in maritime cyber-resilience | This paper discusses challenges in achieving maritime cyber-resilience, focusing on vulnerabilities in ships, ports, and supply chains. It emphasizes gaps in awareness, regulation, and preparedness, and calls for stronger collaboration, governance, and adaptive defense strategies. |
| [] | 2008 | Port and maritime security: a research perspective | This paper reviews port and maritime security from a research perspective, analyzing existing measures, vulnerabilities, and challenges. It highlights the need for integrated frameworks, better risk assessment methods, and closer cooperation among stakeholders to address evolving threats. |
| [] | 2008 | Security and risk-based models in shipping and ports: review and critical analysis | This paper reviews security and risk-based models in shipping and ports, examining their methodologies, applications, and limitations. |
In this section, some key cybersecurity mitigation guidelines and the authoritative organizations that provide them are given. These guidelines offer significant perspectives on cybersecurity, focusing not on technical and procedural details but rather on how they drive the maritime sector to take essential actions against cyber threats and enhance cyber awareness.
- International Maritime Organization (IMO): Guidelines on Maritime Cyber Risk Management (https://www.imo.org/) provide a comprehensive framework for mananaging cyber risks in the maritime sector. These guidelines are integrated into the International Safety Management (ISM) Code, which requires shipping companies to include cyber risk management in their safety management systems.
- International Maritime Bureau (IMB): Best management practices to deter piracy and enhance maritime cybersecurity (https://www.icc-ccs.org/ offer practical advice for improving cybersecurity and managing risks, particularly in relation to piracy and other maritime threats.
- Baltic and International Maritime Council (BIMCO): Guidelines on cybersecurity onboard ships (https://www.bimco.org/) provide detailed recommendations for ship owners and operators on how to implement effective cybersecurity measures onboard ships.
- International Maritime Satellite Organization (IMSO): focuses on ensuring the security of global maritime communication systems. Their guidelines (https://imso.org/) emphasize protecting maritime communication networks and systems from cyber threats.
- European Maritime Safety Agency (EMSA): offers guidelines (https://www.emsa.europa.eu/) specifically for enhancing cybersecurity in ports, focusing on protecting port facilities and operations.
- United States Coast Guard (USCG): provides a cybersecurity (https://www.uscg.mil/) framework profile for maritime (https://www.uscg.mil/) based on the NIST cybersecurity framework, offering a detailed approach to managing cyber risks in maritime operations.
3.4. Vulnerability and Analysis Tools
In the field of cybersecurity, and based on the context, the term “vulnerability” has two distinct meanings. On one hand, a system’s vulnerability can refer to a weakness or flaw within a system that an attacker may exploit to compromise the system. This can result from errors in the software, outdated software with known security issues, weak security protocols, etc. On the other hand, it can also refer to the overall susceptibility or fragility of a system to cyber attacks, representing a comprehensive evaluation of the system’s exposure to existing threats. In this perspective, a security vulnerability is any flaw that can be exploited by an intruder to breach a system’s integrity, availability, or confidentiality. In general, an attacker leverages one or multiple vulnerabilities to compromise the system.
In this paper, the term vulnerability refers mainly to the second meaning. Vulnerabilities are weaknesses that can be leveraged by an intruder to perform unauthorized actions. For example, gaining unauthorized access to data without proper credentials. In general, an attacker leverages one or multiple vulnerabilities to compromise the system. An attacker typically begins a system compromise by exploiting system flaws to get access to one element, later moving laterally through others to ultimately reach the target and obtain information []. The maritime industry suffers from vulnerabilities, in particular
- the exploitation of outdated IT and OT systems that are not supported and/or depend on obsolete operating platforms;
- reliance on OT systems, which cannot be patched or installed with antivirus software because of some type approval constraints;
- the participation of various stakeholders in ship operations and chartering can result in diffuse responsibility for the IT and OT infrastructure and the vessel’s systems;
- vessels that maintain online interfaces with onshore parties and various components of the global supply chain;
- ship equipment that is remotely monitored and accessed, for example, by manufacturers or service providers;
- sharing of business-critical and commercially sensitive data with shore-based entities, such as marine terminals, stevedores, and governmental authorities;
- reliance on computer-controlled critical systems that may be unpatched or inadequately secured, impacting both the vessel’s safety and environmental safeguards;
- cyber risk management culture with potential for enhancement, such as implementing structured training programs and exercises to better define roles and responsibilities;
- various subsystems assembled by shipyards with minimal attention to cyber risk considerations.
System fragility against cyber threats can be analyzed through several dimensions, each reflecting a distinct aspect of vulnerability analysis. One type of analysis is to measure how likely or easy it is for an attacker to compromise the system; this analysis may also include assessing the system’s susceptibility to specific types of attacks, which may involve calculating the likelihood of successfully targeting the system by one particular type of attack or evaluating the time an intruder may need to compromise the system using a specific attack, etc. Another type of analysis includes assessing the performance of the implemented attack detection strategy and measuring how effectively and quickly this strategy identifies the intrusions. An efficient detection strategy can significantly reduce the impact of an attack. Finally, fragility analysis can also be measured by assessing the impact of a successful attack on the system; this analysis provides a critical assessment of the system’s resilience and the potential consequences of each type of attack. Each sequence of vulnerabilities can be modeled as a series of state changes of the system, which finally transfers the system from a secure state to an attacked state. The network topology is a graph-based structure, which makes the graphical tools the best way for cyber attack modeling. In the literature, there exist numerous models that describe the interactions and lead to a good and effective evaluation. In order to detect and mitigate the consequences of cyber attacks, modeling and simulation need to be undertaken []. To model and analyze the attacks, several tools have been proposed and used, e.g., attack graphs, attack trees, and cyber kill chain [].
Cyber kill chains: describe a cyber attack with a number of steps that must be completed in the correct order, each of which has a certain duration. These actions are organized into logical groups and carried out sequentially to form a cyber attack process, which often has a limited lifespan. Cyber kill chains, or cyber attack life cycles, are terms used for such descriptions of a cyber attack [,]. A cyber kill chain is generally composed of seven phases of modeling, namely “reconnaissance”, “weaponization”, “delivery”, “exploitation”, “installation”, “command and control”, and “actions on objectives” [].
Attack paths and graphs: widely used to deal with the problem of security assessment due to their great ability to describe a detailed network attack process [,]. They were proposed for the first time by Swiler et al. [] in 1998 to visually display the possible attack sequences in a system []. The sequences or paths are obtained by a comprehensive and deep analysis of the information flow, topology, and vulnerabilities []. An attack graph is an acyclic graph, composed of two main components: nodes and edges. The nodes represent the system’s hosts, the vulnerabilities, or the devices. The edges represent the possible evolution within the graph nodes and indicate that the attacker can gain more privileges in the network. In the maritime and port sectors, attack graphs are valuable tools for analyzing and visualizing the potential cyber threats that could compromise critical infrastructure, systems, and operations. Given the complexity and various interconnections of maritime and port systems, which include everything from onboard ship systems and cargo management to port communication networks and logistics, attack graphs provide a structured way to understand how vulnerabilities might be exploited by cyber attackers.
Attack trees: first introduced by Shneir et al. in []. They are a graphical tool, similar to attack graphs, that represents security situations by methodically displaying the successive steps an intruder may take to achieve an attack objective [,]. In particular, attack trees describe situations where several attack paths exist. The choice of one path relies on the attacker’s experience and knowledge about the system. The root node of an attack tree represents the attacker’s goal, and the intermediate nodes represent the sub-goals of the attacker. Finally, the leaf nodes represent the ”atomic” actions realized by the attacker. An individual leaf or the combination of several leaves leads to one or more sub-goals until reaching the root node. There exist three possible combinations between nodes: conjunctive relation, i.e., all the actions should occur to satisfy the condition; disjunctive relation, i.e., one or more actions should be satisfied; and conjunctive sequential relation, i.e., all the actions should occur in a specific order to satisfy the condition.
4. DES Models for the Security of Maritime and Port Domains
4.1. Vessel Traffic Management System
A Vessel Traffic Service (VTS) is the authority responsible for controlling and regulating vessel traffic. The Vessel Traffic Management System (VTMS) is the computerized system that the VTS uses to support this task. A VTMS helps port authorities dock, undock, and operate the vessels (https://www.elmansrl.com/port-of-aden-vtmis/, accessed on 31 July 2025). In detail, the role of a VTMS is to assist the VTS in managing and organizing vessel movements to ensure safe, efficient, and orderly traffic flow. It aids port authorities by monitoring ship positions, coordinating arrivals and departures, etc. For simplicity, we consider the case where the VTMS handles one vessel at a time. The process starts in an idle state, waiting for a vessel to arrive. When a vessel reaches the port neighborhood, the system starts communication to monitor its location and confirm its identification, allowing admission or not. Once verified, the vessel is assigned a specific dock. The vessel may have to wait before entering the port if the assigned dock is still occupied and no other dock is available. When the dock becomes available, the vessel moves forward under the guidance of the VTMS. After docking, the cargo operations begin, where cargoes are either loaded or unloaded. Once cargo handling is completed, the VTMS assigns a departure time and provides the vessel with navigation instructions for exiting the port. The vessel leaves the dock, moving along its designated route until it exits the port neighborhood. After the vessel leaves the port vicinity, the system resets and returns to the idle state, ready to manage the next incoming vessel.
This VTMS can be subject to different types of attacks, such as fake vessel injection, where an attacker may introduce a fake vessel into the VTMS system, making it appear as a legitimate vessel that has entered the port neighborhood. The normal VTMS process and the attack scenario can be modeled using a Labeled Timed Probabilistic Automata. A Labeled Timed Probabilistic Automata (LTPA) [,,,] is a 6-tuple , where
- is a finite set of states, so that ;
- E is an event set, so that , where is the set of observable events and is the set of unobservables ones;
- is an alphabet of observable labels;
- is a labeling function that assigns a label to each event, and is the symbol used to notify that an event is silent;
- is a transition relation, where (, ,, ) means that there is a transition from the state to the state triggered by the event that occurs with a rate ;
- is the vector of initial state probabilities, where its entry represents the probability that the system is initially in the state .
As shown in Figure 3, , where
- is the set of states;
- is the set of observable events and is the set of unobservable ones;
- is the set of labels;
- is the labeling function, where , , , , ,, , , , ,;
- , , , , , , , , , , , is the transition relation;
- is the initial state probability distribution.
- is the set of states of the attack pattern;
- E is the set of events of the attack pattern, which is exactly the same as the set of events of the VTMS model;
- is the set of transitions of the attack pattern;
- N is the attack pattern initial state;
- is the attack pattern finale state.
Figure 3.
VTSM modeled with LTPA (each transition is associated to a label and to a firing rate.
Table 4.
States and labels designation of a VTMS.
Table 4.
States and labels designation of a VTMS.
| States | Labels |
|---|---|
| No vessel in VTMS range; | A vessel entered in port neighborhood; |
| Vessel approaching port; | Request to dock; |
| Vessel authentication and waiting for authorization to dock; | Request accepted but no dock is currently available; |
| Vessel waiting the dock to be available; | Request accepted and a dock is assigned; |
| Vessel approaching port; | Authentication failed and docking refused; |
| Docking in progress; | Dock assigned; |
| Cargos loading or unloading; | Docking start; |
| Vessel departure; | Docking finished and begin of cargos loading or unloading; |
| Vessel is leaving VTMS range; | Cargos operations completed; |
| Idle state (Attack); | Vessel starts leaving VTMS range; |
| Fake vessel approaching port; | Vessel quits VTMS range; |
| Fake vessel authentication and waiting authorization to dock; | Begin of an attack. |
| Fake vessel is leaving VTMS range. |
This attack pattern corresponds to the single event attack . Observe that stochastic Petri nets [,] can be used instead of probabilistic automata for the purpose of modeling and analyzing various systems subject to attacks, failures, or other unpredictable events [,,,].
Figure 4.
The attack pattern of the attack fake vessel injection.
4.2. Radar System
In the complex maritime domain, the operation of commercial vessels increasingly relies on efficient information transmission and precise navigation systems to ensure the safe and timely delivery of cargo. Different types of vessels, such as container ships, bulk carriers, and tankers, depend on radar systems to detect surrounding targets, effectively avoid collision incidents, and optimize navigation paths. During the execution of tasks such as cargo transport, route monitoring, and port operations, vessels must have real-time awareness of the environmental conditions in their vicinity and the precise positions and headings of other vessels. This requires not only a keen insight into marine environments but also emphasizes the necessity of close collaboration among vessels to minimize collision risks and effectively respond to potential hazards. In this context, radar systems serve as the core sensing technology for vessels, and their role becomes increasingly significant. Through the mechanism of transmitting and receiving radar signals, vessels can instantly capture the position, speed, and heading information of other vessels, allowing for rapid decision-making. Given the simplicity and intuitiveness of automata modeling in describing system behavior, we can employ automata to optimize the radar information exchange processes among fleets, thereby enhancing overall operational effectiveness and safety assurance.
Let us consider the example of a cargo tracking system, illustrating a discrete event system under attack in the maritime domain. This model is inspired by [], but it is configured in the entire cargo system. For instance, to illustrate the collaborative dynamics within a fleet, consider a specific operation involving four cargo vessels: Vessel A (VA), Vessel B (VB), Vessel C (VC), and Vessel D (VD), as depicted in Figure 5a. This scenario is designed to demonstrate how vessels with distinct roles and responsibilities can work together to achieve efficient navigation and hazard avoidance.
Figure 5.
(a) A squadron, and (b) an automaton G for the behaviors of the squadron.
In detail, VA is positioned to the north and serves as the node for detection and information gathering. It initiates communication and provides data to the fleet. VB is located to the east and focuses on route monitoring and surveillance, ensuring the fleet follows the planned path and identifies obstacles. VC, situated to the south, acts as the support and coordination hub, facilitating communication between vessels and managing logistics. VD is positioned to the west and is tasked with hazard detection and emergency response, identifying and mitigating risks to ensure fleet safety. The main objective of these four vessels is to use radar to detect their surroundings, process reflected signals, and update navigation decisions accordingly. Specifically, a vessel emits radar signals that bounce back when encountering other ships, the coastline, or obstacles such as rocks. By measuring the travel time of the reflected signals, the vessel estimates the distance to the detected objects, while the Doppler effect allows it to calculate their relative speed. Initially, VA is responsible for emitting radar signals to detect the positions and movement directions of other vessels, while VB, VC, and VD receive the signals from VA and relay their positional information and headings back. Subsequently, VA adjusts its course based on the feedback received and sequentially passes the adjustment priority (i.e., the token) to the other vessels. After adjusting their headings, each vessel emits new signals to reflect its adjusted state, ensuring that other vessels can obtain the latest navigation information. Ultimately, all vessels adjust according to the feedback received to avoid collisions.
The automaton models this system, as detailed in Figure 5b and Table 5. In this model, the set of the states is , the set of the events is , and the initial state is . The transitions are visualized near the edges. For example, the transition means that a transition starting from state 1 is fired with the event and will reach state 2. In this scenario, the problems within the maritime system can be modeled, analyzed, and processed as automaton problems [].
Table 5.
Meanings of the states and events in Figure 5a.
Typically, attackers can compromise the system by manipulating, deleting, or substituting signals within the system, i.e., manipulating, deleting, or substituting the events of the system. A possible attack plan is proposed in Table 6, where each row represents the events generated by the system (including the empty event ), and each column illustrates the corruption resulting from the attack. For instance, “” in Row 2 Column 3 denotes that the generated event can be replaced by , “delete ” in Row 4 Column 6 implies that the event can be deleted (i.e., replaced by ), and “insert ” in Row 6 Column 5 indicates the insertion of the event . In this case, the attack detection problem in maritime systems is formulated as an attack problem within the DES framework. According to [], a modified automaton can be constructed based on the underlying attack events. Then, the modified automaton can be utilized to determine whether the system is under attack.
Table 6.
Example of attack plan.
4.3. Port Automated Guided Vehicles System
Consider a port system shown in Figure 6a, which comprises five loading areas, –, representing different sections of the port, such as warehouses, storage yards, and docks. These areas serve as the central hub for cargo loading, unloading, transshipment, and storage, ensuring efficient logistics operations and seamless integration across multiple transportation modes. Initially, several automated guided vehicles (AGVs) are waiting to enter the system and move between loading areas to perform various tasks, such as transporting cargo from one loading area to another or delivering goods to external transport vehicles (e.g., trucks or vessels). For each loading area, vehicles can enter, pick up and drop off goods, and exit designated quay interfaces. When moving from one loading area to another, vehicles should navigate through these entry points.
Figure 6.
(a) AGV navigation routes in a port system, and (b) A labeled Petri net model.
A labeled Petri net models the movements of vehicles in this port system and is depicted in Figure 6b. Specifically, places – correspond to loading areas –, while the firing of each transition represents the transit of one vehicle through the respective quay interface, detected by sensors installed at these locations. Letters – indicate the labels sent by the sensors.
These examples have illustrated how automata and Petri nets can be used to model communication systems and sensor networks used in maritime and port domains.
5. Cybersecurity Analysis and Enforcement with DES
5.1. Security Metrics
Metrics play a crucial role in security analysis. They help in measuring the effectiveness of security policies, mechanisms, or implementations []. They can also help in the identification of system vulnerabilities, guide in the prioritization of corrective measures, and enhance security awareness. This section presents several graph-based security metrics that are widely used in the literature [,].
- Shortest path: This metric is used to assess the security of a system by identifying the shortest path from the initial security state to the targeted one. Roughly speaking, it represents the least effort required by an attacker to compromise the target.
- Number of paths: This metric quantifies the number of routes an attacker can take to compromise the system. The higher the number of routes, the lower the security level, because the attacker has more opportunities to succeed.
- Mean path length metric: This metric assesses the average number of exploits an attacker needs to exploit to reach the target.
- Mean time to security failure: This metric measures the expected time an attacker needs to successfully compromise a system. Generally, it is expressed as the mean time to the first security failure.
- Steady-state security: This metric evaluates the level of security in a system in the long run i.e., as time approaches infinity.
- The type of security failure: This metric classifies the security issues. As in practice, different attack paths exist that the attacker may follow to compromise the system, i.e., an intruder can breach the security of the system with different privilege levels, and this metric is the probability of each attack path being selected.
In the context of vulnerability analysis, and as far as DES is concerned, three primary tools are generally used to model interactions between the system and potential attacks: attack and defense graphs, attack and defense trees, and cyber kill chains, alongside other models that incorporate both the system’s baseline behavior and attack scenarios. Based on these models, various analytical methods are employed to evaluate system security against cyber threats. Logic-based methods, such as graph algorithms [,], kill chain [,], and cost algorithms []. Additionally, some methods are extended to the probabilistic setting, like Bayesian networks [,,,,,] and Markov models [,,,,,,], which provide quantitative metrics for assessment. These approaches hold significant potential for the maritime sector, as they can assist in identifying weaknesses in vessels or ports, thereby contributing to the development of more resilient and secure systems.
Remark 1.
It is important to note that the assessment of these metrics depends on the proposed approach and the underlying model. For the reader’s convenience, detailed approaches and practical examples are provided in [,,,].
5.2. Cybersecurity in Discrete Event Systems
Recent advances in cyber attacks on networked DES focus on understanding how cyber vulnerabilities in networked control frameworks can be exploited and protected. Key research topics include vulnerability analysis, attack detection, and attack mitigation and defense, as detailed in Table 7. All referred papers include modeling aspects and can be separated into three main groups depending on the main objective, which is either analysis, detection, or mitigation. Less than 25 percent of these papers directly concern the maritime and port domains, but most of the contributions are ready to be extended to those sectors. Most of the contributions are based on automata or Petri nets (PNs) tools. As far as vulnerability is concerned, some papers also use Bayesian models, Markov models, or other probabilistic models (see Figure 7).
Figure 7.
Use of DESs for cybersecurity problems.
These efforts are essential for enhancing the security of systems across sectors like maritime logistics, smart grids, and autonomous transportation, ensuring they are better protected against evolving cyber threats.
Vulnerability modeling and analysis: identifying the weak points in the communication networks and control logics of DES, which can be leveraged for attacks like data manipulation, denial of service (DoS), and false data injection.
Attack detection: Advancements in machine learning, anomaly detection algorithms, and real-time monitoring tools have improved the ability to identify malicious activities in DES. Researchers are exploring detection mechanisms that can swiftly respond to abnormal patterns within event-driven frameworks.
Attack mitigation and defense: Recent studies have focused on designing more resilient networked DES architectures by implementing robust fault-tolerant control systems, encryption, and secure communication protocols that can withstand cyber attacks and reduce their impact on system operations.
5.3. Performance Evaluation with Markov Models and Probabilistic Automata
A security threat is a stochastic process that can be modeled as a Markov chain. The probability of transition from one state to another is based on the vulnerability present in the next state. A Markov chain is composed of several paths, and each path represents an attack path, which the attacks can follow to reach a cybersecurity breach, and each attack path can be composed of a sequence of states.
In [], the authors propose an approach that evaluates the performance of fault detection functions (FDD). The FDD function is defined as a complete deterministic finite automata , , where is the set of FDD states, is the set of observable labels, is the transition function of the FDD, is the FDD initial state, such that , where stands for the states set that trigger no alarm and A is the unique stable state, which indicates that an alarm has been triggered in a timed and probabilistic setting. The objective of a fault detection function is to determine, based on observations, whether the system is in a faulty mode or not. In this contribution the authors study the performance of such FDD in terms of non-detection (the case where the system is in a faulty mode and the non-alarm is triggered), false alarm (the alarm is triggered while the system is working in normal mode), and detection delay (the delay refers to the time lag between the system’s transition into a faulty mode and the activation of the alarm). In [], three quantitative metrics are proposed: the non-detection rate, the false alarm rate, and the detection delay. The approach is based on the Markovian approximation of the system behavior in the long run. This work has been initially developed in the context of fault diagnosis but can be extended to the evaluation of the Attack Detection Function (ADF). A fault pattern automaton is a complete deterministic finite automaton , where is a finite set of states, E is the set of events, is a transition function, is an initial state, such that so that stands for the normal states set and is a unique stable state, which represents the pattern occurrences.
A possible ADF designed to identify fake vessel injection, for the VTMS modeled in Figure 3 with the attack pattern in Figure 4, is illustrated in Figure 8, where , , and
- is the set of states;
- is a set of events, which corresponds to the system set of labels;
- is the set of transitions;
- is the initial state;
- is the final state.
This ADF activates an alarm upon observing the sequence of observations . By leveraging the approach developed in [], the effectiveness of this ADF in detecting fake vessel injection can be thoroughly evaluated. The approach is based on the Markovian approximation of the system behavior in the long run, and the proposed schema is developed according to two successive compositions: first between the model of the system and the fault pattern, and second between the obtained structure and the ADF.
Table 7.
Papers on cybersecurity with DES.
Table 7.
Papers on cybersecurity with DES.
| Ref. | Year | Analysis | Detection | Mitigation | Method | Maritime |
|---|---|---|---|---|---|---|
| [] | 2017 | ✓ | PN | ✓ | ||
| [] | 2017 | ✓ | PN | ✓ | ||
| [] | 2024 | Blockchain | ✓ | |||
| [] | 2014 | ✓ | Markov | |||
| [] | 2023 | ✓ | ✓ | ✓ | DES | |
| [] | 2021 | ✓ | DES | |||
| [] | 2021 | ✓ | DES | |||
| [] | 2022 | ✓ | ✓ | ✓ | CPS | |
| [] | 2015 | ✓ | PN | ✓ | ||
| [] | 2023 | ✓ | PN | ✓ | ||
| [] | 2025 | ✓ | PN | |||
| [] | 2013 | ✓ | Markov | |||
| [] | 2019 | ✓ | PN | ✓ | ||
| [] | 2021 | ✓ | Automata | |||
| [] | 2018 | ✓ | Automata | |||
| [] | 2017 | ✓ | DES | |||
| [] | 2022 | ✓ | DES | |||
| [] | 2009 | ✓ | PN | |||
| [] | 2019 | ✓ | DES | |||
| [] | 2025 | ✓ | PN | |||
| [] | 2025 | ✓ | PN | |||
| [] | 2017 | ✓ | ✓ | DES | ||
| [] | 2023 | ✓ | ✓ | Automata | ||
| [] | 2005 | ✓ | Bayesian | |||
| [] | 2008 | ✓ | Bayesian | |||
| [] | 2016 | ✓ | Attack graph | |||
| [] | 2023 | ✓ | Markov |
Applying the approach presented in [], the evaluation of the performance metrics of this ADF in detecting fake vessel injection leads to a false alarm rate of 99 %, a non-detection rate of 0 %, and an average detection delay of three time units.
5.4. Security Enforcement with Petri Nets
For this port system, an excessive concentration of vehicles in any loading area can lead to significant congestion, causing delays in cargo handling and disrupting the overall task scheduling. This situation can ultimately diminish system efficiency, leading to economic losses and increasing the risk of vehicle collisions or accidents. To mitigate these challenges, each area is required to have a defined capacity. It is essential to highlight that, in this context, the capacity of each area is determined by specific control constraints that account for berth scheduling, vessel turnaround times, and other logistics dynamics, rather than being solely dictated by the physical spatial limits of the area.
For example, consider the AGV modeled with the Petri net in Figure 6 and the scenario such that loading area —a container terminal berth—has a capacity of three vehicles, which can be formalized as the control specification, called generalized mutual exclusion constraint (GMEC) []. This constraint ensures that, at any reachable state, the number of AGVs at does not exceed three. The constraint can be defined as GMEC , which restricts the token count (or vehicle count) in to three.
Now, assume that the port system is vulnerable to a type of sensor deception attack, where an attacker manipulates the sensor data to misreport vehicle movements between loading areas by altering the observations of a vehicle entering area to appear as if it is entering . In other words, if an attack occurs after the system generates label (i.e., transition or fires), the observation will be altered as . This attack can be represented as .
Next, we demonstrate how such an attack can lead to exceeding the capacity of loading area . By firing a transition sequence at the initial marking , the port system reaches marking , indicating two vehicles in loading area and two in . If transition fires at M (a vehicle moves from to ), the system reaches , with the corresponding sensor generating label . In this case, if an attack occurs, the new observation will be , instead of , leading the port authorities to believe that loading area only has two vehicles. Based on this faulty information, the operators may allow another AGV to enter , resulting in the number of vehicles in the area exceeding the defined capacity of three if transition or fires at .
The supervisory control theory [] for DESs offers an effective solution to this issue. This approach typically involves designing a supervisor to properly guide or restrict a system’s evolution such that its behavior under supervision meets predefined control specifications by typically disabling certain events depending on the observed system output. In a realistic scenario, a supervisor observes the occurrence of events by getting the readings from sensors and disables some of the events by issuing control commands to the related actuators.
According to the work in [], an online supervisory control policy for this example is stated as follows:
- Step 1: (Initialization) observation: , set of forbidden transitions at :
- Step 2: (Online) Wait until a label q is observed
- Step 2.1:
- Step 2.2:
- Compute , where with refers to the number of occurrences of in
- Step 2.3:
- Disable all transitions in
It is verified that although the port system under consideration is vulnerable to sensor deception attacks , the acquired supervisor by [] can still dynamically guide the behavior of AGVs according to the above predefined control rules to prevent the overconcentration of AGVs in area .
6. Open Problems and Future Directions
As the maritime and port sectors continue their digital transformation, the cyber–physical infrastructures supporting them are becoming increasingly complex, interconnected, and vulnerable to sophisticated cyber threats. While DES methodologies have demonstrated strong potential for modeling, detection, and control of cybersecurity incidents, several fundamental challenges remain unresolved. This section outlines the main open problems and promising research directions that emerge from current findings and trends.
Data availability and dataset generation: One recurrent problem in research applied to the maritime domain and more generally industrial cybersecurity is the lack of data []. The complexity and heterogeneity of vessels make it difficult to generate adapted datasets. In addition, data is often considered confidential, making it difficult to create public datasets. For maritime cybersecurity, researchers have found three solutions for this issue: using open datasets, creating laboratory datasets, and simulating data. There exist several open datasets, including maritime information. Admiral [] database lists cyber attacks targeting the maritime sector. However, most cyber attacks remain confidential or are not communicated. This database includes open references for listed cyber attacks, but technical details are often reduced. Also, AIS data are commonly used for research because they are very accessible. Some examples of datasets including these data are AIS-hub and MarineTraffic. Some datasets have been conceived with learning platforms in controlled operational environments. These works allow simulating a big set of anomalies and attacks targeting a particular system []. Other works looked to create adapted datasets based on simulation tools. As ships include general industrial systems, they can be modeled by general tools taking into account maritime constraints, as for water distribution systems [].
The lack of standardized, high-quality datasets continues to impede empirical validation and benchmarking across different modeling paradigms. Future work should focus on developing shared maritime cybersecurity datasets and testbeds to support reproducible and comparable experiments.
Modeling and system complexity: As the maritime domain continues to evolve, future research should address the increasing complexity of ship operations, multi-agent collaboration, and advanced threat management from the perspective of cyber–physical and networked systems. The integration of more sophisticated vessels equipped with advanced sensors and artificial intelligence (AI)-driven systems will necessitate enhanced formal and numerical models capable of handling dynamic, real-time decision-making under uncertainty at various scales. For example, future work could explore the incorporation of probabilistic and timed automata to better model environmental uncertainties, such as weather conditions and unpredictable hazards, as well as the temporal aspects of navigation and communication. Additionally, the rise of multi-agent systems will require scalable hybrid and discrete event-based frameworks to optimize collaborative behaviors among larger fleets, enabling seamless coordination and resource allocation. As cyber–physical threats grow more complex, DES models must also account for advanced attack strategies, including coordinated multi-vector attacks and AI-driven adversarial behaviors.
Comparative modeling approaches: A necessary direction for future work lies in conducting a comparative analysis between formal approaches, in particular, DES-based methods, and other traditional cybersecurity analysis techniques, such as Bayesian networks [,,,,,] and Markov models [,,,,,,]. Such comparisons could provide deeper insights into the relative advantages and limitations of DES for modeling cyber–physical security in maritime and port environments. To date, however, there is limited evidence of studies applying Bayesian or Markov formalisms to analyze cybersecurity issues specifically within the maritime and port sectors, as discussed in Section 4 and Section 5. Existing research employing these approaches in related maritime contexts illustrates the breadth of probabilistic and stochastic modeling but differs substantially in scope and objectives. For example, Mohsendokht et al. [] extract dependencies among maritime cybersecurity risk factors from historical incidents, and John et al. [] employ Bayesian networks to assess seaport resilience—both focusing on high-level risk reasoning rather than modeling attack–defense dynamics in port IT/OT systems. Aydin et al. [] propose a Z-number–based Bayesian network for maritime autonomous surface ships, while [] uses Bayesian models to distinguish intentional attacks from accidental failures in floodgate systems. With respect to Markovian approaches, the work [] presents an educational Markov-chain treatment of ship cybersecurity, [] leverages hidden Markov models for intent classification in maritime surveillance, and Wolsing et al. [] review AIS track anomaly detection methods. These studies primarily address navigation, surveillance, or pedagogical contexts rather than the operational cybersecurity of port infrastructures. Furthermore, the lack of shared datasets, standardized evaluation protocols, and consistent model setups currently prevents a rigorous, like-for-like comparison with DES-based analyses of attack detection and protection.
Therefore, while these studies provide valuable methodological perspectives, they do not yet supply the empirical basis required for systematic comparative evaluations. Establishing such benchmarks and developing hybrid approaches that integrate DES with probabilistic models represent important open challenges for future research.
Adaptive and distributed supervisory control: Future research will also focus on developing adaptive, distributed supervisory control mechanisms capable of dynamically reconfiguring in response to cyber attacks targeting key port operations, such as quay-side activities, berth management, and container terminal automation. These mechanisms will allow for rapid adjustments to vessel scheduling, cargo handling, and AGV management, ensuring efficient resource allocation across berth zones, quay interfaces, and storage areas, enabling maritime and port systems to effectively manage both routine challenges and emerging cybersecurity threats. In fact, supervisory control approaches provide an efficient framework to prevent decisions or operations that may drive the system into a security vulnerability. By limiting the capacities of the system, one also leverages its resilience. There is also a need to elaborate advanced supervisory schemes that integrate decisions and operations enforcement in order to fully support cybersecurity issues.
Software tools: There is currently no numerical or software tool exclusively based on DES for vulnerability analysis, attack detection, and security protection in computer systems and networks managing maritime and port infrastructures.
However, a number of widely used cybersecurity tools and frameworks exist for these purposes in general IT and OT environments. Examples include Tenable.ot (https://www.tenable.com/products/ot-security, (accessed on 1 August 2025)), Nessus (https://www.tenable.com/products/nessus, (accessed on 1 August 2025)), OpenVAS (https://openvas.org/, (accessed on 1 August 2025)) and Greenbone (https://www.greenbone.net/en/, (accessed on 1 August 2025)), for vulnerability assessment; Zeek (https://zeek.org/, (accessed on 1 August 2025)), Suricata (https://suricata.io/, (accessed on 1 August 2025)), Snort (https://www.snort.org/, (accessed on 1 August 2025)), Nozomi Networks Guardian (https://fr.nozominetworks.com/products/guardian, (accessed on 1 August 2025)), Claroty Platform (https://claroty.com/platform, (accessed on 1 August 2025)), and Dragos Platform (https://www.dragos.com/cybersecurity-platform/, (accessed on 1 August 2025)) for network monitoring and intrusion detection; and Elastic Security (https://www.elastic.co/docs/solutions/security, (accessed on 2 August 2025)), Splunk Enterprise Security (https://www.splunk.com/, (accessed on 2 August 2025)), IBM QRadar (https://www.ibm.com/products/qradar, (accessed on 2 August 2025)), and Wazuh (https://wazuh.com/), and OSSEC (https://www.ossec.net/, (accessed on 2 August 2025)) for integrated security management. In addition, the MITRE ATT&CK and MITRE D3FEND frameworks provide standardized taxonomies for adversary behavior and defensive countermeasure mapping. MITRE ATT&CK effectively covers the multidimensional nature of modern cyber attacks. In parallel, MITRE D3FEND offers a similar knowledge base focused on cyber defense strategies [].
In future work, these tools and frameworks may be considered in combination with the proposed DES-based models to support practical implementation and validation.
Integration of AI and blockchain technologies: Combining the application of AI and blockchain can provide new perspectives and research directions for maritime and port cybersecurity research, in particular for smart ports []. The decentralization, immutability, and transparency of blockchain technology provide new ideas for the network security of smart ports, especially in data sharing, identity authentication, transaction security, and supply chain traceability.
Specifically, decentralized security authentication and access control using blockchain technology can create a distributed identity authentication system so that different entities in the port can safely access and share data. Prevent unauthorized access and information leakage through smart contracts and encryption mechanisms. In addition, studying how to apply blockchain technology to the port supply chain management system enhances data transparency and traceability while preventing forgery and tampering in the supply chain. Blockchain can help achieve secure logistics tracking and improve the security of goods and data.
Meanwhile, AI techniques such as machine learning, deep learning, and anomaly detection can be employed to identify abnormal behaviors, predict cyber threats, and optimize incident response strategies in real time. When integrated with DES control theory, AI could assist in dynamic decision-making, system state estimation, and adaptive control under uncertain or adversarial conditions. Blockchain could serve as a trust layer that records DES-based events, control decisions, and system transitions in an immutable ledger, thereby improving traceability, accountability, and resilience of cybersecurity management frameworks. In summary, the joint use of AI, blockchain, and DES control theory represents a promising direction for developing autonomous, transparent, and verifiable cybersecurity architectures in maritime and port environments.
7. Conclusions
The increasing integration of connected and automated systems in the maritime and port sectors has greatly improved operational efficiency but also introduced significant cybersecurity challenges. As digitalization expands, vulnerabilities across OT and IT layers become more critical, requiring continuous assessment, rapid detection, and effective protection mechanisms. This survey emphasized the potential of DES modeling as a formal and systematic approach for analyzing, detecting, and mitigating cybersecurity issues in maritime and port domains. DES-based methods enable structured representation and proactive defense design for complex event-driven systems.
Future research should address current limitations such as data availability, standardization, and tool interoperability while exploring integration with emerging technologies like AI, digital twins, and blockchain. Advancing these directions will help build more adaptive and resilient frameworks to secure next-generation smart ports.
Author Contributions
Conceptualization, G.L. and D.L.; methodology, G.L., O.A. and D.L.; software, O.A., Y.L. and Z.Z.; validation, O.A., Y.L. and Z.Z.; formal analysis, G.L., D.L. and P.M.L.; writing—original draft preparation, G.L., D.L., O.A., Y.L., Z.Z. and P.M.L.; writing—review and editing, G.L., D.L., P.M.L., C.B. and A.B.; supervision, G.L., D.L., P.M.L., C.B. and A.B.; project administration, G.L., D.L., P.M.L., C.B. and A.B. All authors have read and agreed to the published version of the manuscript.
Funding
This work has been supported by Région Normandie with project RIN ASSAILLANT 2023 ref. 23E02599.
Data Availability Statement
The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.
Conflicts of Interest
The authors declare no conflicts of interest.
References
- Trade, U.N. Review of Maritime Transport 2024: Navigating Maritime Chokepoints; United Nations: New York, NY, USA, 2024. [Google Scholar]
- Koukaki, T.; Tei, A. Innovation and maritime transport: A systematic review. Case Stud. Transp. Policy 2020, 8, 700–710. [Google Scholar] [CrossRef]
- Aslam, S.; Michaelides, M.P.; Herodotou, H. Internet of ships: A survey on architectures, emerging applications, and challenges. IEEE Internet Things J. 2020, 7, 9714–9727. [Google Scholar] [CrossRef]
- Tsoulfas, G.T. Port resilience: A systematic literature review. In Maritime Economics & Logistics; Springer: Berlin/Heidelberg, Germany, 2025; pp. 1–21. [Google Scholar]
- Li, K.; Lee, J.Y.; Gharehgozli, A. Blockchain implementation in the maritime industry: A literature review and synthesis analysis of benefits and challenges. In Maritime Economics & Logistics; Springer: Berlin/Heidelberg, Germany, 2024; pp. 1–28. [Google Scholar]
- Haugli-Sandvik, M.; Lund, M.S.; Bjørneseth, F.B. Maritime decision-makers and cybersecurity: Deck officers’ perception of cyber risks towards IT and OT systems. Int. J. Inf. Secur. 2024, 23, 1721–1739. [Google Scholar] [CrossRef]
- Yousaf, A.; Zhou, J.Y. From sinking to saving: MITRE ATT&CK and D3FEND frameworks for maritime cybersecurity. Int. J. Inf. Secur. 2024, 23, 1603–1618. [Google Scholar]
- Poza, J.L.; Simarro, R.; de la Fuente, M.A.; Simó, J.; Crespo, A. Real-time control and monitoring in a container terminal. Ifac Proc. 2002, 35, 219–224. [Google Scholar] [CrossRef]
- Aboul-Dahab, K.M.A. Demonstrating the cyber vulnerabilities of significant maritime technologies to the port facilities and on board of vessels. Inf. Technol. 2020, 29, 31. [Google Scholar] [CrossRef]
- Kanwal, K.; Shi, W.; Kontovas, C.; Yang, Z.; Chang, C.H. Maritime cybersecurity: Are onboard systems ready? Marit. Policy Manag. 2024, 51, 484–502. [Google Scholar] [CrossRef]
- Alcaide, J.I.; Llave, R.G. Critical infrastructures cybersecurity and the maritime sector. Transp. Res. Procedia 2020, 45, 547–554. [Google Scholar] [CrossRef]
- Androjna, A.; Twrdy, E. Cyber threats to maritime critical infrastructure. In Cyber Terrorism and Extremism as Threat to Critical Infrastructure Protection; Ministry of Defense, Republic of Slovenia: Ljubljana, Slovenia, 2020; pp. 163–170. [Google Scholar]
- Mraković, I.; Vojinović, R. Maritime cybersecurity analysis—How to reduce threats? Trans. Marit. Sci. 2019, 8, 132–139. [Google Scholar] [CrossRef]
- Cook, P. Comment: The emerging spectrum of maritime security. Int. J. Marit. Crime Secur. 2020, 1, 30–55. [Google Scholar] [CrossRef]
- Yan, X.; Nie, X. Optimal placement of multiple types of detectors under a small vessel attack threat to port security. TRansportation Res. Part E Logist. Transp. Rev. 2016, 93, 71–94. [Google Scholar] [CrossRef]
- Ahokas, J.; Kiiski, T.; Malmsten, J.; Ojala, L.M. Cybersecurity in ports: A conceptual approach. In Proceedings of the Hamburg International Conference of Logistics; epubli GmbH: Berlin, Germany, 2017; Volume 23, pp. 343–359. [Google Scholar]
- Meyer-Larsen, N.; Müller, R. Enhancing the cybersecurity of port community systems. In Dynamics in Logistics: Proceedings of the 6th International Conference LDIC, Bremen, Germany, 20–22 February 2018; Springer International Publishing: Cham, Switzerland, 2018; pp. 318–323. [Google Scholar]
- König, S. Understanding complex attacks on a maritime port. ERCIM News 2020, 123, 22–23. [Google Scholar]
- Gunes, B.; Kayisoglu, G.; Bolat, P. Cyber security risk assessment for sea ports: A case study of a container port. Comput. Secur. 2021, 103, 102196. [Google Scholar] [CrossRef]
- Nganga, A.; Nganya, G.; Lützhöft, M.; Mallam, S.; Scanlan, J. Bridging the gap: Enhancing maritime vessel cyber resilience through security operation centers. Sensors 2023, 24, 146. [Google Scholar] [CrossRef]
- Oruc, A.; Chowdhury, N.; Gkioulos, V. A modular cybersecurity training programme for the maritime domain. Int. J. Inf. Secur. 2024, 23, 1477–1512. [Google Scholar] [CrossRef]
- Rajaram, P.; Goh, M.; Zhou, J. Guidelines for cyber risk management in shipboard operational technology systems. J. Phys. Conf. Ser. 2022, 2311, 012002. [Google Scholar] [CrossRef]
- Göge, D.; Enge, H.C. Look-Out 2016 Maritime Domain Cyber: Risks, Threats & Future Perspectives; Lampe & Schwartze KG: Bremen, Germany, 2015. [Google Scholar]
- Lagouvardou, S. Maritime Cyber Security: Concepts, Problems and Models; Kongens Lyngby: Copenhagen, Denmark, 2018. [Google Scholar]
- Jones, K.D.; Tam, K.; Papadaki, M. Threats and Impacts in Maritime Cybersecurity; Engineering & Technology Reference: Stevenage, UK, 2016. [Google Scholar]
- Oliveira, S.; Leal, A.B.; Teixeira, M.; Lopes, Y.K. A classification of cybersecurity strategies in the context of Discrete Event Systems. Annu. Rev. Control 2023, 56, 100907. [Google Scholar] [CrossRef]
- Li, M.; Zhou, J.; Chattopadhyay, S.; Goh, M. Maritime cybersecurity: A comprehensive review. arXiv 2024, arXiv:2409.11417. [Google Scholar]
- Swiler, L.P.; Phillips, C.; Gaylor, T. A Graph-Based Network-Vulnerability Analysis System; Sandia National Lab. (SNL-NM): Albuquerque, NM, USA, 1998. [Google Scholar]
- Liu, R.T.; Hu, Y.H.; Mangini, A.M.; Fanti, M.P. K-corruption intermittent attacks for violating the codiagnosability. IEEE/CAA J. Autom. Sin. 2025, 12, 159–172. [Google Scholar] [CrossRef]
- Lhomme, S. Vulnerability and resilience of ports and maritime networks to cascading failures and targeted attacks. In Maritime Networks; Routledge: Oxford, UK, 2015; pp. 229–241. [Google Scholar]
- Ding, S.C.; Liu, G.Y.; Yin, L.; Wang, J.Z.; Li, Z.W. Detection of cyber-attacks in a discrete event system based on deep learning. Mathematics 2024, 12, 2635. [Google Scholar] [CrossRef]
- Silgado, D.M. Cyber-attacks: A Digital Threat Reality Affecting the Maritime Industry. Master’s Thesis, World Maritime University, Malmö, Sweden, 2018. [Google Scholar]
- Chang, C.H.; Kontovas, C.; Yu, Q.; Yang, Z.L. Risk assessment of the operations of maritime autonomous surface ships. Reliab. Eng. Syst. Saf. 2021, 207, 107324. [Google Scholar] [CrossRef]
- Tabish, N.; Chaur-Luh, T. Maritime autonomous surface ships: A review of cybersecurity challenges, countermeasures, and future perspectives. IEEE Access 2024, 12, 17114–17136. [Google Scholar] [CrossRef]
- Bošnjak, R.; Kezic, D.; Belamaric, G.; Krile, S. Modelling of VTS supervisor by algorithm based on Petri net: Case study of Dover incident. Transport 2021, 36, 305–316. [Google Scholar] [CrossRef]
- Bou-Harb, E.; Kaisar, E.I.; Austin, M. On the impact of empirical attack models targeting marine transportation. In 2017 5th IEEE International Conference on Models and Technologies for Intelligent Transportation Systems; IEEE: New York, NY, USA, 2017; pp. 200–205. [Google Scholar]
- Qin, T.; Yin, L.; Liu, G.Y.; Wu, N.Q.; Li, Z.W. Strong current-state opacity verification of discrete-event systems modeled with time labeled Petri nets. IEEE/CAA J. Autom. Sin. 2025, 12, 54–58. [Google Scholar] [CrossRef]
- Caprolu, M.; Di Pietro, R.; Raponi, S.; Sciancalepore, S.; Tedeschi, P. Vessels cybersecurity: Issues, challenges, and the road ahead. IEEE Commun. Mag. 2020, 58, 90–96. [Google Scholar] [CrossRef]
- Ben Farah, M.A.; Ukwandu, E.; Hindy, H.; Brosset, D.; Bures, M.; Andonovic, I.; Bellekens, X. Cyber security in the maritime industry: A systematic survey of recent advances and future trends. Information 2022, 13, 22. [Google Scholar] [CrossRef]
- Hagaseth, M.; Rødseth, Ø.J.; Krogstad, T.; Bakke, M. A new architectural framework for digitalization of maritime Intelligent transport systems. Transnav. Int. J. Mar. Navig. Saf. Sea Transp. 2023, 17, 769–779. [Google Scholar] [CrossRef]
- Balduzzi, M.; Pasta, A.; Wilhoit, K. A security evaluation of AIS automated identification system. In Proceedings of the 30th Annual Computer Security Applications Conference, New Orleans, LA, USA, 8–12 December 2014; pp. 436–445. [Google Scholar]
- DiRenzo, J.; Goward, D.A.; Roberts, F.S. The little-known challenge of maritime cybersecurity. In 6th International Conference on Information, Intelligence, Systems and Applications (IISA); IEEE: New York, NY, USA, 2015. [Google Scholar]
- Tu, E.; Zhang, G.; Rachmawati, L.; Rajabally, E.; Huang, G.B. Exploiting AIS data for intelligent maritime navigation: A comprehensive survey from data to methodology. IEEE Trans. Intell. Transp. Syst. 2017, 19, 1559–1582. [Google Scholar] [CrossRef]
- Kessler, G.C.; Craiger, J.P. A taxonomy framework for maritime cybersecurity: A demonstration using the automatic identification system. Transnav Int. J. Mar. Navig. Saf. Sea Transp. 2018, 12, 429–437. [Google Scholar] [CrossRef]
- Goudossis1, A.; Katsikas, S.K. Towards a secure automatic identification system (AIS). J. Mar. Sci. Technol. 2019, 24, 410–423. [Google Scholar] [CrossRef]
- Aziz, A.; Tedeschi, P.; Sciancalepore, S.; Di Pietro, R. Secure AIS-securing pairwise vessels communications. In 2020 IEEE Conference on Communications and Network Security; IEEE: New York, NY, USA, 2020; pp. 1–9. [Google Scholar]
- Coleman, J.; Kandah, F.; Huber, B. Behavioral model anomaly detection in automatic identification systems. In 2020 10th Annual Computing and Communication Workshop and Conference (CCWC); IEEE: New York, NY, USA, 2020; pp. 0481–0487. [Google Scholar]
- Struck, M.C.; Stoppe, J. A backwards compatible approach to authenticate automatic identification system messages. In 2021 IEEE International Conference on Cyber Security and Resilience (CSR); IEEE: New York, NY, USA, 2021; pp. 524–529. [Google Scholar]
- Leite Junior, W.C.; de Moraes, C.C.; de Albuquerque, C.E.; Machado, R.C.S.; de Sá, A.O. A triggering mechanism for cyber attacks in naval sensors and systems. Sensors 2021, 21, 3195. [Google Scholar] [CrossRef]
- Ahmed, A.; Gkioulos, V. From click to sink: Utilizing AIS for command and control in maritime cyber attacks. Lect. Notes Comput. Sci. 2022, 13556, 535–553. [Google Scholar]
- Soner, O.; Kayisoglu, G.; Bolat, P.; Tam, K. Risk sensitivity analysis of AIS cybersecurity through maritime cyber regulatory frameworks. Appl. Ocean. Res. 2024, 142, 103855. [Google Scholar] [CrossRef]
- Boudehenn, C.; Cexus, J.C.; Abdelkader, R.; Lannuzel, M.; Jacq, O.; Brosset, D.; Boudraa, A. Holistic approach of integrated navigation equipment for cybersecurity at sea. In Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media: Cyber Science 2022; Springer Nature: Singapore, 2023; pp. 75–86. [Google Scholar]
- Tam, K.; Jones, K.D. Maritime cybersecurity policy: The scope and impact of evolving technology on international shipping. J. Cyber Policy 2018, 3, 147–164. [Google Scholar] [CrossRef]
- Senarak, C. Port cyberattacks from 2011 to 2023: A literature review and discussion of selected cases. Marit. Econ. Logist. 2024, 26, 105–130. [Google Scholar] [CrossRef]
- Schinas, O.; Metzger, D. Cyber-seaworthiness: A critical review of the literature. Mar. Policy 2023, 151, 105592. [Google Scholar] [CrossRef]
- Afenyo, M.; Caesar, L.D. Maritime cybersecurity threats: Gaps and directions for future research. Ocean. Coast. Manag. 2023, 236, 106493. [Google Scholar] [CrossRef]
- Yu, H.C.; Meng, Q.; Fang, Z.X.; Liu, J.X. Literature review on maritime cybersecurity: State-of-the-art. J. Navig. 2023, 76, 453–466. [Google Scholar] [CrossRef]
- Ashraf, I.; Park, Y.; Hur, S.; Kim, S.W.; Alroobaea, R.; Zikria, Y.B.; Nosheen, S. A survey on cybersecurity threats in IoT-enabled maritime industry. IEEE Trans. Intell. Transp. Syst. 2022, 24, 2677–2690. [Google Scholar] [CrossRef]
- Akpan, F.; Bendiab, G.; Shiaeles, S.; Karamperidis, S.; Michaloliakos, M. Cybersecurity challenges in the maritime sector. Network 2022, 2, 123–138. [Google Scholar] [CrossRef]
- Bolbot, V.; Kulkarni, K.; Brunou, P.; Banda, O.V.; Musharraf, M. Developments and research directions in maritime cybersecurity: A systematic literature review and bibliometric analysis. Int. J. Crit. Infrastruct. Prot. 2022, 39, 100571. [Google Scholar] [CrossRef]
- Kechagias, E.P.; Chatzistelios, G.; Papadopoulos, G.A.; Apostolou, P. Digital transformation of the maritime industry: A cybersecurity systemic approach. Int. J. Crit. Infrastruct. Prot. 2022, 37, 100526. [Google Scholar] [CrossRef]
- Melnyk, O.; Onyshchenko, S.; Onishchenko, O.; Shumylo, O.; Voloshyn, A.; Koskina, Y.; Volianska, Y. Review of ship information security risks and safety of maritime transportation issues. Transnav. Int. J. Mar. Navig. Saf. Sea Transp. 2022, 16, 717–722. [Google Scholar] [CrossRef]
- Karamperidis, S.; Kapalidis, C.; Watson, T. Maritime cyber security: A global challenge tackled through distinct regional approaches. J. Mar. Sci. Eng. 2021, 9, 1323. [Google Scholar] [CrossRef]
- Park, C.; Shi, W.M.; Zhang, W.; Kontovas, C.; Chang, C.H. Cybersecurity in the maritime industry: A literature review. In Proceedings of the 20th Commemorative Annual General Assembly, AGA 2019—Proceedings of the International Association of Maritime Universities Conference, Tokyo, Japan, 30 October–1 November 2019; pp. 79–86. [Google Scholar]
- Chang, C.H.; Wenming, S.; Wei, Z.; Changki, P.; Kontovas, C.A. Evaluating cybersecurity risks in the maritime industry: A literature review. In Proceedings of the International Association of Maritime Universities Conference, Tokyo, Japan, 30 October–1 November 2019. [Google Scholar]
- Mileski, J.; Clott, C.; Galvao, C.B. Cyber-attacks on ships: A wicked problem approach. Marit. Bus. Rev. 2018, 3, 414–430. [Google Scholar] [CrossRef]
- Lim, G.J.; Cho, J.; Bora, S.; Biobaku, T.; Parsaei, H. Models and computational algorithms for maritime risk analysis: A review. Ann. Oper. Res. 2018, 271, 765–786. [Google Scholar] [CrossRef]
- Forbes, V.L. The global maritime industry remains unprepared for future cybersecurity challenges. Shipbuild. Ind. 2018, 12, 42–44. [Google Scholar]
- You, B.; Zhang, Y.; Cheng, L.C. Review on cybersecurity risk assessment and evaluation and their approaches on maritime transportation. In Proceedings of the 30th Annual Conference of International Chinese Transportation Professionals Association, Houston, TX, USA, 19–21 May 2017; pp. 19–21. [Google Scholar]
- John, A.; Nwaoha, T.C. Safety critical maritime infrastructure systems resilience: A critical review. Int. J. Marit. Eng. 2016, 158. [Google Scholar] [CrossRef]
- McNicholas, M. Maritime Security: An Introduction; Butterworth-Heinemann: Oxford, UK, 2016. [Google Scholar]
- Jensen, L. Challenges in maritime cyber-resilience. Technol. Innov. Manag. Rev. 2015, 5, 35. [Google Scholar] [CrossRef]
- Helmick, J.S. Port and maritime security: A research perspective. J. Transp. Secur. 2008, 1, 15–28. [Google Scholar] [CrossRef]
- Bichou, K. Security and Risk-Based Models in Shipping and Ports: Review and Critical Analysis; OECD: Paris, France, 2008. [Google Scholar]
- Barik, M.S.; Sengupta, A.; Mazumdar, C. Attack graph generation and analysis techniques. Def. Sci. J. 2016, 66, 559. [Google Scholar] [CrossRef]
- Chukwuka, V.; Chen, Y.C.; Grijalva, S.; Mooney, V. Bad data injection attack propagation in cyber-physical power delivery systems. In 2018 Clemson University Power Systems Conference (PSC); IEEE: New York, NY, USA, 2018; pp. 1–8. [Google Scholar]
- Al-Mohannadi, H.; Mirza, Q.; Namanya, A.; Awan, I.; Cullen, A.; Disso, J. Cyber-attack modeling analysis techniques: An overview. In 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW); IEEE: New York, NY, USA, 2016; pp. 69–76. [Google Scholar]
- Hoffmann, R.; Napiórkowski, J.; Protasowicki, T.; Stanik, J. Risk based approach in scope of cybersecurity threats and requirements. Procedia Manuf. 2020, 44, 655–662. [Google Scholar] [CrossRef]
- Yadav, T.; Rao, A.M. Technical aspects of cyber kill chain. In International Symposium on Security in Computing and Communication; Springer International Publishing: Cham, Switzerland, 2015; pp. 438–452. [Google Scholar]
- Polatidis, N.; Pavlidis, M.; Mouratidis, H. Cyber-attack path discovery in a dynamic supply chain maritime risk management system. Comput. Stand. Interfaces 2018, 56, 74–82. [Google Scholar] [CrossRef]
- Shandilya, V.; Simmons, C.B.; Shiva, S. Use of attack graphs in security systems. J. Comput. Netw. Commun. 2014, 2014, 818957. [Google Scholar] [CrossRef]
- Amri, O.; Lefebvre, D. Mode Recognition in Attack Graphs Based on Conditional State Probability. In 2023 9th International Conference on Control, Decision and Information Technologies (CoDIT); IEEE: New York, NY, USA, 2023; pp. 999–1004. [Google Scholar]
- Liu, S.C.; Liu, Y. Network security risk assessment method based on HMM and attack graph model. In 2016 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD); IEEE: New York, NY, USA, 2016; pp. 517–522. [Google Scholar]
- Schneier, B. Attack trees. J. Softw. Tools Prof. Program. 1999, 24, 21–31. [Google Scholar]
- Jhawar, R.; Lounis, K.; Mauw, S. A stochastic framework for quantitative analysis of attack-defense trees. In International Workshop on Security and Trust Management; Springer International Publishing: Cham, Switzerland, 2016; pp. 138–153. [Google Scholar]
- Lounis, K.; Ouchani, S. Modeling attack-defense trees’ countermeasures using continuous time markov chains. In International Conference on Software Engineering and Formal Methods; Springer International Publishing: Cham, Switzerland, 2020; pp. 30–42. [Google Scholar]
- Lefebvre, D.; Seatzu, C.; Hadjicostis, C.; Giua, A. Probabilistic state estimation for labeled continuous time Markov models with applications to attack detection. J. Discret. Event Syst. 2022, 32, 65–88. [Google Scholar] [CrossRef]
- Lefebvre, D.; Seatzu, C.; Hadjicostis, C.; Giua, A. Detectability notions for a class of finite labeled Markovian systems. Nonlinear Anal. Hybrid Syst. 2025, 57, 101586. [Google Scholar] [CrossRef]
- Amri, O.; Lefebvre, D. Performance evaluation of SCADA systems by means of discrete event systems. In Proceedings of the 2023 International Conference on Networking, Sensing and Control (ICNSC), Marseille, France, 25–27 October 2023; pp. 1–6. [Google Scholar]
- Amri, O.; Seatzu, C.; Giua, A.; Lefebvre, D. State estimation of timed probabilistic discrete event systems via artificial neural networks. Discret. Event. Dyn. Syst. 2025, 35, 107–135. [Google Scholar] [CrossRef]
- Wang, J.C.; Wang, J.; Zeng, Q.T.; Liu, G.Y. Formal analysis of emergency department staffing based on stochastic timed Petri net models. IFAC PapersOnLine 2020, 53, 405–410. [Google Scholar] [CrossRef]
- Meriah, R.; Barkaoui, K.; Liu, G.Y.; Driss, O.B. On modelling and evaluation of corrective and preventive maintenance policies of unreliable manufacturing systems. In Proceedings of the 2019 6th International Conference on Control, Decision and Information Technologies (CoDIT), Paris, France, 23–26 April 2019; pp. 1752–1757. [Google Scholar]
- Lefebvre, D.; Leclercq, E.; Khalij, L.; Souza de Cursi, E.; El Akchioui, N. Approximation of MTS stochastic Petri nets steady state by means of continuous Petri nets: A numerical approach. Ifac Proc. Vol. 2009, 42, 62–67. [Google Scholar] [CrossRef]
- Lefebvre, D.; Leclercq, E.; El Akchioui, N.; Souza de Cursis, E.; Khalij, L. A geometric approach for the homothetic approximation of stochastic Petri nets. Ifac Proc. Vol. 2010, 43, 235–240. [Google Scholar] [CrossRef]
- Lefebvre, D. About the stochastic and continuous Petri nets equivalence in the long run. Nonlinear Anal. Hybrid Syst. 2011, 5, 394–406. [Google Scholar] [CrossRef]
- Ould El Mehdi, S.; Bekrar, R.; Messai, N.; Leclercq, E.; Lefebvre, D.; Riera, B. Design and identification of stochastic and deterministic stochastic Petri nets. IEEE Trans. Syst. Man. Cybern. Part A Syst. Humans 2012, 42, 931–946. [Google Scholar] [CrossRef]
- Miler, R.; Bujak, A. Electronic cargo tracking systems as a part of the intelligent freight technologies. Their impact on the global integrated supply chain security and effectiveness based on the Avante system. Arch. Transp. Syst. Telemat. 2014, 7, 31–36. [Google Scholar]
- Liang, Y.; Lefebvre, D.; Li, Z.W. Polynomial-time verification of pattern diagnosability for timed discrete event systems. Inf. Sci. 2025, 706, 121997. [Google Scholar] [CrossRef]
- Li, Y.T.; Hadjicostis, C.N.; Wu, N.Q. Tamper-tolerant diagnosability under bounded or unbounded attacks. IFAC PapersOnLine 2022, 55, 52–57. [Google Scholar] [CrossRef]
- Wang, A.J.A. Information security models and metrics. In Proceedings of the 43rd annual ACM Southeast Conference, Kennesaw, GA, USA, 18–20 March 2005; Volume 2, pp. 178–184. [Google Scholar]
- Almasizadeh, J.; Azgomi, M.A. A stochastic model of attack process for the evaluation of security metrics. Comput. Netw. 2013, 57, 2159–2180. [Google Scholar] [CrossRef]
- Abraham, S.; Nair, S. Cyber security analytics: A stochastic model for security quantification using absorbing markov chains. J. Commun. 2014, 9, 899–907. [Google Scholar] [CrossRef]
- Idika, N.; Bhargava, B. Extending attack graph-based security metrics and aggregating their application. IEEE Trans. On Dependable Secur. Comput. 2012, 9, 75–85. [Google Scholar] [CrossRef]
- Zenitani, K. Attack graph analysis: An explanatory guide. Comput. Secur. 2023, 126, 103081. [Google Scholar] [CrossRef]
- Hutchins, E.M.; Cloppert, M.J.; Amin, R.M. Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Lead. Issues Inf. Warf. Secur. Res. 2011, 1, 80. [Google Scholar]
- Hareide, O.S.; Jøsok, Ø.; Lund, M.S.; Ostnes, R.; Helkala, K. Enhancing navigator competence by demonstrating maritime cybersecurity. J. Navig. 2018, 71, 1025–1039. [Google Scholar] [CrossRef]
- Ammour, R.; Amari, S.; Brenner, L.; Demongodin, I.; Lefebvre, D. Robust stealthy attacks based on uncertain costs and labeled finite automata with inputs. IEEE Robot. Autom. Lett. 2023, 8, 2732–2739. [Google Scholar] [CrossRef]
- Liu, Y.; Man, H. Network vulnerability assessment using Bayesian networks. In Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security; Dasarathy, B.V., Ed.; Society of Photo-Optical Instrumentation Engineers Conference Series; SPIE: Bellingham, WA, USA, 2005; Volume 5812, pp. 61–71. [Google Scholar]
- Frigault, M.; Wang, L.; Singhal, A.; Jajodia, S. Measuring network security using dynamic Bayesian network. In Proceedings of the 4th ACM Workshop on Quality of Protection, Association for Computing Machinery, New York, NY, USA, 27 October 2008; pp. 23–30. [Google Scholar]
- Mohsendokht, M.; Li, H.; Kontovas, C.; Chang, C.H.; Qu, Z.; Yang, Z. Decoding dependencies among the risk factors influencing maritime cybersecurity: Lessons learned from historical incidents in the past two decades. Ocean. Eng. 2024, 312, 119078. [Google Scholar] [CrossRef]
- Aydin, M.; Sezer, S.I.; Akyuz, E.; Gardoni, P. Improved Z-number based Bayesian Network modelling to predict cyber-attack risk for maritime autonomous surface ship (MASS). Appl. Soft Comput. 2025, 180, 113416. [Google Scholar] [CrossRef]
- Chockalingam, S.; Pieters, W.; Teixeira, A.; van Gelder, P. Bayesian network model to distinguish between intentional attacks and accidental technical failures: A case study of floodgates. Cybersecurity 2021, 4, 29. [Google Scholar] [CrossRef]
- John, A.; Yang, Z.; Riahi, R.; Wang, J. A risk assessment approach to improve the resilience of a seaport system using Bayesian networks. Ocean. Eng. 2016, 111, 136–147. [Google Scholar] [CrossRef]
- Almasizadeh, J.; Azgomi, M.A. A new method for modeling and evaluation of the probability of attacker success. In 2008 International Conference on Security Technology; IEEE: New York, NY, USA, 2008; pp. 49–53. [Google Scholar]
- Almasizadeh, J.; Azgomi, M.A. Intrusion Process Modeling for Security Quantification. In Proceedings of the 2009 International Conference on Availability, Reliability and Security, Fukuoka, Japan, 16–19 March 2009; pp. 114–121. [Google Scholar]
- Kaminska, N.; Kravtsova, L.V.; Kravtsov, H.; Zaytseva, T. Modeling ship cybersecurity using Markov chains: An educational approach. In Proceedings of the 11th Workshop on Cloud Technologies in Education, Kryvyi Rih, Ukraine, 22 December 2023; pp. 22–35. [Google Scholar]
- Carlson, L.; Navalta, D.; Nicolescu, M.; Nicolescu, M.; Woodward, G. Early classification of intent for maritime domains using multinomial hidden Markov models. Front. Artif. Intell. 2021, 4, 702153. [Google Scholar] [CrossRef] [PubMed]
- Wolsing, K.; Roepert, L.; Bauer, J.; Wehrle, K. Anomaly detection in maritime AIS tracks: A review of recent approaches. J. Mar. Sci. Eng. 2022, 10, 112. [Google Scholar] [CrossRef]
- Bošnjak, R.; Kezić, D.; Vidan, P. Methodology of synthesis of the supervisors by using Petri net. Brodogr. Teor. Praksa Brodogr. Pomor. Teh. 2017, 68, 57–66. [Google Scholar] [CrossRef]
- Bošnjak, R.; Kezić, D.; Vidan, P.; Kavran, Z. Collision prevention in Singapore Strait by using timed Petri net. Transport 2020, 35, 273–282. [Google Scholar] [CrossRef]
- Basilio, J.C.; Hadjicostis, C.N.; Su, R. Analysis and control for resilience of discrete event systems: Fault diagnosis, opacity, and cyber security. Found. Trends Syst. Control 2021, 8, 285–443. [Google Scholar] [CrossRef]
- Ding, D.R.; Han, Q.L.; Ge, X.H.; Wang, J. Secure state estimation and control of cyber-physical systems: A survey. IEEE Trans. Syst. Man, Cybern. Syst. 2021, 51, 176–190. [Google Scholar] [CrossRef]
- Duo, W.L.; Zhou, M.C.; Abusorrah, A. A survey of cyber attacks on cyber physical systems: Recent advances and challenges. IEEE/CAA J. Autom. Sin. 2022, 9, 783–800. [Google Scholar] [CrossRef]
- Sahnoun, A.; Maamri, R. Petri net modeling dynamic context of container for risk management. In Proceedings of the 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA), Marrakech, Morocco, 17–20 November 2015; IEEE: New York, NY, USA, 2015; pp. 1–8. [Google Scholar]
- Jalal, M.R.; Kader, A.S.A.; Hamid, M.F.A.; Kang, H.S. A stochastic Petri net-based approach for operational performance estimation of quay cranes. Qual. Reliab. Eng. Int. 2023, 39, 1660–1680. [Google Scholar] [CrossRef]
- Liu, R.T.; Mangini, A.M.; Fanti, M.P. Synthesis of optimal stealthy attacks against diagnosability in labeled Petri nets. IEEE/CAA J. Autom. Sin. 2025, 12, 1661–1672. [Google Scholar] [CrossRef]
- Maione, G.; Mangini, A.M.; Ottomanelli, M. A generalized stochastic Petri net approach for modeling activities of human operators in intermodal container terminals. IEEE Trans. Autom. Sci. Eng. 2016, 13, 1504–1516. [Google Scholar] [CrossRef]
- Lin, L.; Su, R. Synthesis of covert actuator and sensor attackers. Automatica 2021, 130, 109714. [Google Scholar] [CrossRef]
- Carvalho, L.K.; Wu, Y.C.; Kwong, R.; Lafortune, S. Detection and mitigation of classes of attacks insupervisory control systems. Automatica 2018, 97, 121–133. [Google Scholar] [CrossRef]
- Lima, P.M.; Alves, M.V.; Carvalho, L.K.; Moreira, M.V. Security against network attacks in supervisory control systems. IFAC PapersOnLine 2017, 50, 12333–12338. [Google Scholar] [CrossRef]
- Basile, F.; Chiacchio, P.; Giua, A. Suboptimal supervisory control of Petri nets in presence of uncontrollable transitions via monitor places. Automatica 2006, 42, 995–1004. [Google Scholar] [CrossRef]
- Wonham, W.M.; Cai, K. Supervisory Control of Discrete-EVENT Systems; Springer: Cham, Switzerland, 2019. [Google Scholar]
- Zhang, Z.L.; Liu, G.Y.; Lefebvre, D.; Li, Z.W. Monitor-based supervisory control of labeled Petri nets under sensor attacks. IEEE Trans. Autom. Sci. Eng. 2025, 22, 9388–9403. [Google Scholar] [CrossRef]
- Jia, J.T.; Liu, G.Y.; Li, Z.W. Supervisory Control of Cyber-Physical Systems Using Labeled Petri Nets Under Sensor and Actuator Attacks; Lecture Notes in Computer Science; Springer Nature: Berlin/Heidelberg, Germany, 2025; Volume 15466, pp. 159–173. [Google Scholar]
- Laso, P.M.; Brosset, D.; Puentes, J. Dataset of anomalies and malicious acts in a cyber-physical subsystem. Data Brief 2017, 14, 186–191. [Google Scholar] [CrossRef] [PubMed]
- Cremer, F.; Sheehan, B.; Fortmann, M.; Kia, A.N.; Mullins, M.; Murphy, F.; Materne, S. Cyber risk and cybersecurity: A systematic review of data availability. Geneva Pap. Risk Insur. Issues Pract. 2022, 47, 698. [Google Scholar] [CrossRef] [PubMed]
- Jacq, O. Détection, Analyse Contextuelle et Visualisation de Cyber-Attaques en Temps Réel: éLaboration de la Cyber Situational Awareness du Monde Maritime. Ph.D. Thesis, Ecole Nationale Supérieure Mines-Télécom Atlantique, Nantes, France, 2021. [Google Scholar]
- Pelissero, N.; Laso, P.M.; Puentes, J. Impact assessment of anomaly propagation in a naval water distribution cyber-physical system. In Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), Rhodes, Greece, 26–28 July 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 518–523. [Google Scholar]
- Bertelle, C.; Gouin, N.; Frémont, A. Maritime Ports, Supply Chains and Logistics Corridors; Taylor & Francis: Abingdon, UK, 2023. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).