Papers
Topics
Authors
Recent
Search
2000 character limit reached

A Review of Cybersecurity Incidents in the Food and Agriculture Sector

Published 12 Mar 2024 in cs.CR, cs.AI, and cs.CY | (2403.08036v1)

Abstract: The increasing utilization of emerging technologies in the Food & Agriculture (FA) sector has heightened the need for security to minimize cyber risks. Considering this aspect, this manuscript reviews disclosed and documented cybersecurity incidents in the FA sector. For this purpose, thirty cybersecurity incidents were identified, which took place between July 2011 and April 2023. The details of these incidents are reported from multiple sources such as: the private industry and flash notifications generated by the Federal Bureau of Investigation (FBI), internal reports from the affected organizations, and available media sources. Considering the available information, a brief description of the security threat, ransom amount, and impact on the organization are discussed for each incident. This review reports an increased frequency of cybersecurity threats to the FA sector. To minimize these cyber risks, popular cybersecurity frameworks and recent agriculture-specific cybersecurity solutions are also discussed. Further, the need for AI assurance in the FA sector is explained, and the Farmer-Centered AI (FCAI) framework is proposed. The main aim of the FCAI framework is to support farmers in decision-making for agricultural production, by incorporating AI assurance. Lastly, the effects of the reported cyber incidents on other critical infrastructures, food security, and the economy are noted, along with specifying the open issues for future development.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (220)
  1. Cybersecurity and Infrastructure Security Agency. A guide to critical infrastructure security and resilience, 2019.
  2. Analysis of critical infrastructure dependencies and interdependencies. Technical report, 2015. URL http://www.osti.gov/servlets/purl/1184636/.
  3. U.S. Department of Agriculture. Ag and food sectors and the economy — ers.usda.gov. https://www.ers.usda.gov/data-products/ag-and-food-statistics-charting-the-essentials/ag-and-food-sectors-and-the-economy/, 2023. [Accessed 05-10-2023].
  4. Agriculture in 2050: recalibrating targets for sustainable intensification. Bioscience, 67(4):386–391, 2017.
  5. From industry 4.0 to agriculture 4.0: Current status, enabling technologies, and research challenges. IEEE Transactions on Industrial Informatics, 17(6):4322–4334, 2020.
  6. Big data in smart farming–a review. Agricultural systems, 153:69–80, 2017.
  7. Precision agriculture—a worldwide overview. Computers and electronics in agriculture, 36(2-3):113–132, 2002.
  8. Industry 4.0 implications in logistics: an overview. Procedia manufacturing, 13:1245–1252, 2017.
  9. A systematic review of iot solutions for smart farming. Sensors, 20(15):4231, 2020.
  10. Cyber attacks on smart farming infrastructure. In 2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC), pages 135–143. IEEE, 2020.
  11. Security challenges to smart agriculture: Current state, key issues, and future directions. Array, 8:100048, 2020.
  12. U.S. FDA. HACCP Principles & Application Guidelines — cacmap.fda.gov. https://cacmap.fda.gov/food/hazard-analysis-critical-control-point-haccp/haccp-principles-application-guidelines, 2022. [Accessed 30-10-2023].
  13. Peter Chalk. Terrorism, infrastructure protection, and the US Food and Agricultural Sector, volume 184. RAND, 2001.
  14. Smart farming: Cyber security challenges. In 2018 International Conference on Intelligent Systems (IS), pages 870–876. IEEE, 2018.
  15. USA Council of Economic Advisers. The Cost of Malicious Cyber Activity to the U.S. Economy — trumpwhitehouse.archives.gov. https://trumpwhitehouse.archives.gov/articles/cea-report-cost-malicious-cyber-activity-u-s-economy/, 2018. [Accessed 05-10-2023].
  16. A review on security of smart farming and precision agriculture: Security aspects, attacks, threats and countermeasures. Applied Sciences, 11(16):7518, 2021.
  17. Federal Bureau of Investigation. Private Industry Notification: Cyber Criminal Actors Targeting the Food and Agriculture Sector with Ransomware Attacks. https://www.cisa.gov/sites/default/files/publications/PIN_20210901.pdf, 2021a. [Accessed 04-10-2023].
  18. Federal Bureau of Investigation. FBI Flash: Indicators of Compromise Associated with OnePercent Group Ransomware. https://www.ic3.gov/Media/News/2021/210823.pdf, 2021b. [Accessed 04-10-2023].
  19. Federal Bureau of Investigation. FBI Flash: Tactics, Techniques, and Indicators of Compromise Associated with Hello Kitty/FiveHands Ransomware. https://www.cisa.gov/sites/default/files/publications/FLASH_CU_000154_MW_508c.pdf, 2021c. [Accessed 04-10-2023].
  20. Federal Bureau of Investigation. Private Industry Notification: Ransomware Attacks Straining Local US Governments and Public Services. https://www.ic3.gov/Media/News/2022/220330.pdf, 2022a. [Accessed 04-10-2023].
  21. Federal Bureau of Investigation. FBI Flash: Indicators of Compromise Associated with Lockbit 2.0 Ransomware. https://www.ic3.gov/Media/News/2022/220204.pdf, 2022b. [Accessed 04-10-2023].
  22. Threats to precision agriculture (2018 public-private analytic exchange program report). US Dept. Homeland Secur., Office Intell. Anal., Public-Private Analytic Exchange Program, Tech. Rep, 2018.
  23. Verizon. Data Breach Investigations Report — verizon.com. https://www.verizon.com/business/resources/reports/dbir/, 2023. [Accessed 12-10-2023].
  24. 2022 FY Food and Agriculture Sector Annual Report — fda.gov. https://www.fda.gov/media/171959, 2022. [Accessed 06-10-2023].
  25. Software Must Be Secure by Design, and Artificial Intelligence Is No Exception — cisa.gov. https://www.cisa.gov/news-events/news/software-must-be-secure-design-and-artificial-intelligence-no-exception, 2023. [Accessed 06-10-2023].
  26. Machine learning applications for precision agriculture: A comprehensive review. IEEE Access, 9:4843–4873, 2020.
  27. Wireless sensor networks applied to precision agriculture: A worldwide literature review with emphasis on latin america. IEEE Geoscience and Remote Sensing Magazine, 9(4):209–222, 2021.
  28. Zeynep Ünal. Smart farming becomes even smarter with deep learning—a bibliographical analysis. IEEE access, 8:105587–105609, 2020.
  29. Cybersecurity of industrial cyber-physical systems: a review. ACM Computing Surveys (CSUR), 54(11s):1–35, 2022.
  30. Iot based agriculture (ag-iot): A detailed study on architecture, security and forensics. Information Processing in Agriculture, 2023.
  31. A review of cybersecurity incidents in the water sector. Journal of Environmental Engineering, 146(5):03120003, 2020.
  32. Recommendations on using digitalisation for our common future: A report by the policy network on environment and digitalisation. Internet Governance Forum, 2022.
  33. Cybersecurity policy and the legislative context of the water and wastewater sector in south africa. Sustainability, 13(1):291, 2020.
  34. Center for Strategic and International Studies. Significant Cyber Incidents — csis.org. https://www.csis.org/programs/strategic-technologies-program/significant-cyber-incidents, 2023. [Accessed 04-10-2023].
  35. Monsanto confirms Anonymous hacking attack — cnet.com. https://www.cnet.com/news/privacy/monsanto-confirms-anonymous-hacking-attack/. [Accessed 04-10-2023].
  36. Monsanto Confirms Security Breach — wsj.com. https://www.wsj.com/articles/monsanto-confirms-security-breach-1401403777. [Accessed 04-10-2023].
  37. Monsanto Unit Reports Data Breach — foxbusiness.com. https://www.foxbusiness.com/features/monsanto-unit-reports-data-breach. [Accessed 04-10-2023].
  38. Target Confirms Unauthorized Access to Payment Card Data in U.S. Stores — corporate.target.com. https://corporate.target.com/news-features/article/2013/12/target-confirms-unauthorized-access-to-payment-car, 2013. [Accessed 04-10-2023].
  39. An update on our data breach and financial performance — corporate.target.com. https://corporate.target.com/news-features/article/2014/01/an-update-on-our-data-breach-and-financial-perform, 2014. [Accessed 04-10-2023].
  40. Form 10-K. https://www.sec.gov/Archives/edgar/data/27419/000002741917000008/tgt-20170128x10k.htm, 2017. [Accessed 04-10-2023].
  41. Wendy’s Payment Card Incident — wendys.com. https://www.wendys.com/payment-card-incident, 2018. [Accessed 04-10-2023].
  42. Wendy’s agrees to pay $50M to settle data breach claims — restaurantbusinessonline.com. https://www.restaurantbusinessonline.com/financing/wendys-agrees-pay-50-million-settle-data-breach-claims, 2019. [Accessed 04-10-2023].
  43. Chipotle Mexican Grill Reports Findings from Investigation of Payment Card Security Incident — ir.chipotle.com. https://ir.chipotle.com/news-releases?item=122402, 2017. [Accessed 04-10-2023].
  44. Mondelez and Zurich reach settlement in NotPetya cyberattack insurance suit — therecord.media. https://therecord.media/mondelez-and-zurich-reach-settlement-in-notpetya-cyberattack-insurance-suit, 2022a. [Accessed 04-10-2023].
  45. Pirates without borders: The propagation of cyberattacks through firms’ supply chains. Journal of Financial Economics, 147(2):432–448, 2023.
  46. Big Companies Thought Insurance Covered a Cyberattack; They May Be Wrong — www.nytimes.com. https://www.nytimes.com/2019/04/15/technology/cyberinsurance-notpetya-attack.html, 2019. [Accessed 04-10-2023].
  47. Data Breach Takes a Bite Out of Whole Foods — cyberpolicy.com. https://www.cyberpolicy.com/cybersecurity-education/data-breach-takes-a-bite-out-of-whole-foods, 2017. [Accessed 04-10-2023].
  48. Angelica Peebles. Whole Foods suffers data breach in some stores — cnbc.com. https://www.cnbc.com/2017/09/28/whole-foods-suffers-data-breach-in-some-stores.html, 2017. [Accessed 04-10-2023].
  49. Amazon-owned Whole Foods says several stores hit with credit card hack — Globalnews.ca. https://globalnews.ca/news/3777956/amazon-whole-foods-credit-hack/, 2017. [Accessed 04-10-2023].
  50. CISOMAG. Attackers Launch DDoS Attack on Food Delivery Startup Liefrando — cisomag.com. https://cisomag.com/attackers-launch-ddos-attack-on-food-delivery-startup-liefrando/, 2020. [Accessed 04-10-2023].
  51. Food Delivery Service in Germany Under DDoS Attack — bleepingcomputer.com. https://www.bleepingcomputer.com/news/security/food-delivery-service-in-germany-under-ddos-attack/, 2020. [Accessed 04-10-2023].
  52. Agromart & Sollio AG Privacy Breach Class Action — foremancompany.com. https://www.foremancompany.com/agromart-sollio-privacy-breach, 2021. [Accessed 04-10-2023].
  53. Inoculating farms against computer hacks — farmtario.com. https://farmtario.com/news/inoculating-farms-against-computer-hacks/, 2020. [Accessed 04-10-2023].
  54. DarkOwl Analyst Team. REvil hackers continue to wrack up high-profile targets with ransomware attacks — darkowl.com. https://www.darkowl.com/blog-content/revil-hackers-continue-to-wrack-up-high-profile-targets-with-ransomware-attacks/, 2020. [Accessed 04-10-2023].
  55. D. Howard Kass. REvil Ransomware Attacks Food Distributors; Hackers Seek $7.5M Ransom — msspalert.com. https://www.msspalert.com/news/revil-hits-food-distributors, 2020. [Accessed 04-10-2023].
  56. U.S. Department of Homeland Security. Public-Private Analytic Exchange Program (AEP) Deliverables — dhs.gov. https://www.dhs.gov/aep-deliverables, 2022. [Accessed 04-10-2023].
  57. Cold storage giant Americold outage caused by network breach — bleepingcomputer.com. https://www.bleepingcomputer.com/news/security/cold-storage-giant-americold-outage-caused-by-network-breach/, 2023. [Accessed 04-10-2023].
  58. Form 8-K. https://www.sec.gov/Archives/edgar/data/1455863/000162828023014332/art-20230426.htm, 2023. [Accessed 04-10-2023].
  59. William Marshal. Americold Network Breach: Cold Storage and Logistics Giant Faces IT Issues — thecybersecuritytimes.com. https://www.thecybersecuritytimes.com/americold-network-breach-cold-storage-and-logistics-giant-faces-it-issues/, 2023. [Accessed 04-10-2023].
  60. Campari Group. Campari Group Press Release — camparigroup.com. https://www.camparigroup.com/sites/default/files/downloads/20201204_Campari%20Group%20Press%20release.pdf, 2020. [Accessed 04-10-2023].
  61. Graham Cluley. Campari staggers to its feet following $15 million Ragnar Locker ransomware attack — bitdefender.com. https://www.bitdefender.com/blog/hotforsecurity/campari-staggers-to-its-feet-following-15-million-ragnar-locker-ransomware-attack/, 2020. [Accessed 04-10-2023].
  62. Kroger. Information About the Accellion Incident — kroger.com. https://www.kroger.com/i/accellion-incident, 2021. [Accessed 04-10-2023].
  63. Sara Merken. Kroger agrees to pay $5 million over Accellion data breach — reuters.com. https://www.reuters.com/legal/litigation/kroger-agrees-pay-5-million-over-accellion-data-breach-2021-07-01/, 2021. [Accessed 04-10-2023].
  64. US farm loses $9 million in the aftermath of a ransomware attack — therecord.media. https://therecord.media/us-farm-loses-9-million-in-the-aftermath-of-a-ransomware-attack, 2021. [Accessed 04-10-2023].
  65. Cyber criminals targeting agribusiness — world-grain.com. https://www.world-grain.com/articles/16973-cyber-criminals-targeting-agribusiness, 2022. [Accessed 04-10-2023].
  66. Molson Coors Beverage Company. Molson Coors Reaffirms Key Financial Guidance for Full Year 2021 and Provides an Update on the Impact of the Cybersecurity Incident and Texas Storms — ir.molsoncoors.com. https://ir.molsoncoors.com/news/news-details/2021/Molson-Coors-Reaffirms-Key-Financial-Guidance-for-Full-Year-2021-and-Provides-an-Update-on-the-Impact-of-the-Cybersecurity-Incident-and-Texas-Storms/default.aspx, 2021. [Accessed 04-10-2023].
  67. Bugs Allowed Hackers to Dox John Deere Tractor Owners — vice.com. https://www.vice.com/en/article/4avy8j/bugs-allowed-hackers-to-dox-all-john-deere-owners, 2021. [Accessed 04-10-2023].
  68. Condé Nast. A New Jailbreak for John Deere Tractors Rides the Right-to-Repair Wave — wired.com. https://www.wired.com/story/john-deere-tractor-jailbreak-defcon-2022/, 2022. [Accessed 04-10-2023].
  69. Emma Roth. Def Con hacker shows John Deere’s tractors can run Doom — theverge.com. https://www.theverge.com/2022/8/15/23306650/def-con-hacker-john-deere-tractors-run-doom-right-to-repair, 2022. [Accessed 04-10-2023].
  70. JBS Food USA. JBS USA Cyberattack Media Statement — jbsfoodsgroup.com. https://jbsfoodsgroup.com/articles/jbs-usa-cyberattack-media-statement-june-9, 2021. [Accessed 04-10-2023].
  71. Heather Haddon. McDonald’s Hit by Data Breach — wsj.com. https://www.wsj.com/articles/mcdonalds-hit-by-data-breach-in-south-korea-taiwan-11623412800, 2021. [Accessed 04-10-2023].
  72. Kaseya. Incident Overview & Technical Details — dhs.gov. https://www.dhs.gov/aep-deliverables, 2021. [Accessed 04-10-2023].
  73. Crystal Valley. Important Notice: Crystal Valley — crystalvalley.coop. https://www.crystalvalley.coop/about-us/news/article/important-notice, 2021a. [Accessed 04-10-2023].
  74. Crystal Valley. Cyber-Attack Update: Crystal Valley — crystalvalley.coop. https://www.crystalvalley.coop/about-us/news/article/cyber-attack-update, 2021b. [Accessed 04-10-2023].
  75. Karl Plume Tom Polansek. Minnesota grain handler targeted in ransomware attack — reuters.com. https://www.reuters.com/technology/minnesota-grain-handler-targeted-ransomware-attack-2021-09-23/, 2021. [Accessed 04-10-2023].
  76. Russian hackers target Iowa grain co-op in $5.9 million ransomware attack — washingtonpost.com. https://www.washingtonpost.com/business/2021/09/21/new-cooperative-hack-ransomware/, 2021. [Accessed 04-10-2023].
  77. Christopher Bing Karl Plume. Iowa farm services firm: systems offline due to cybersecurity incident — reuters.com. https://www.reuters.com/technology/iowa-farm-services-company-reports-cybersecurity-incident-2021-09-20/, 2021. [Accessed 04-10-2023].
  78. Are you a robot? — bloomberg.com. https://www.bloomberg.com/news/newsletters/2021-12-10/supply-chain-latest-cream-cheese-is-the-latest-casualty-of-cyberattacks, 2021. [Accessed 04-10-2023].
  79. Jan Shepel. Schreiber Foods hit with cyberattack; plants closed — wisfarmer.com. https://www.wisfarmer.com/story/news/2021/10/26/schreiber-foods-hit-cyberattack-plants-closed/8558252002/, 2021. [Accessed 04-10-2023].
  80. Ramishah Maruf. The surprising reason you can’t find cream cheese anywhere — CNN Business — cnn.com. https://www.cnn.com/2021/12/18/business/cream-cheese-cyberattack-schreiber-foods, 2021. [Accessed 04-10-2023].
  81. KP Snacks hack prompts crisp and nut supplies warning — bbc.com. https://www.bbc.com/news/technology-60230077, 2022. [Accessed 04-10-2023].
  82. KP Snacks hit with ransomware attack — zdnet.com. https://www.zdnet.com/article/kp-snacks-hit-with-ransomware-attack/, 2022. [Accessed 04-10-2023].
  83. KP Snacks Left with Crumbs After Ransomware Attack — threatpost.com. https://threatpost.com/kp-snacks-crumbs-ransomware-attack/178176/, 2022. [Accessed 04-10-2023].
  84. Shortage of KP Nuts and Hula Hoops looms after cyber-attack — theguardian.com. https://www.theguardian.com/business/2022/feb/03/shortage-of-kp-nuts-and-hula-hoops-looms-after-cyber-attack, 2022b. [Accessed 04-10-2023].
  85. Pro-Russian hackers attack institutional websites in Italy, police say — reuters.com. https://www.reuters.com/world/europe/pro-russian-hackers-attack-institutional-websites-italy-police-2022-05-20/, 2022. [Accessed 04-10-2023].
  86. Russian Hackers Claim Responsibility for Attacks on Italian Government Websites — wsj.com. https://www.wsj.com/livecoverage/russia-ukraine-latest-news-2022-05-20/card/russian-hackers-claim-responsibility-for-attacks-on-italian-government-websites-wmCkW0kSJtZDP33vFZfp, 2022. [Accessed 04-10-2023].
  87. Apetito. Apetito victim of International Criminal Cyber-attack: Major Disruption Inevitable — apetito.co.uk. https://www.apetito.co.uk/media/wysiwyg/apetito-uk/Documents/Home_Page/5.0_apetito_Cyber_Attack_Communication_Updated_.pdf, 2022. [Accessed 04-10-2023].
  88. Maple Leaf Foods. Confirms System Outage Linked to Cybersecurity Incident — mapleleaffoods.com. https://www.mapleleaffoods.com/news/system-outage-linked-to-cybersecurity-incident/, 2022. [Accessed 04-10-2023].
  89. Eduard Kovacs. Ransomware Gang Takes Credit for Maple Leaf Foods Hack — securityweek.com. https://www.securityweek.com/ransomware-gang-takes-credit-maple-leaf-foods-hack/, 2022. [Accessed 04-10-2023].
  90. Maple Leaf Foods confirms it was hit by ransomware, won’t pay attackers — itworldcanada.com. https://www.itworldcanada.com/article/black-basta-ransomware-group-claims-it-hit-maple-leaf-foods/515358, 2022. [Accessed 04-10-2023].
  91. Cyberattack cost Maple Leaf Foods at least CA$23 million — wattagnet.com. https://www.wattagnet.com/broilers-turkeys/article/15537594/cyberattack-cost-maple-leaf-foods-at-least-ca23-million, 2022. [Accessed 04-10-2023].
  92. Dole. US Securities and Exchange Commission, Form 20-F. https://www.sec.gov/Archives/edgar/data/1857475/000185747523000013/dole-20221231.htm, 2023a. [Accessed 04-10-2023].
  93. Amritpal Kaur Sandhu-Longoria. Dole cyberattack may be the cause of prepackaged lettuce shortage — usatoday.com. https://www.usatoday.com/story/money/2023/02/22/dole-cyberattack-cause-of-lettuce-shortage-internal-memo-states/11326340002/, 2023. [Accessed 04-10-2023].
  94. Dole. Dole plc Reports First Quarter 2023 Financial Results. https://s202.q4cdn.com/638653076/files/doc_financials/2023/q1/Dole-plc-Reports-First-Quarter-2023-Financial-Results.pdf, 2023b. [Accessed 04-10-2023].
  95. Cyber attack leaves irrigation systems in Upper Galilee dysfunctional — jpost.com. https://www.jpost.com/israel-news/article-738790, 2023. [Accessed 04-10-2023].
  96. The Council on Foreign Relations. Connect the Dots on State-Sponsored Cyber Incidents - Attack on Israeli water utilities — cfr.org. https://www.cfr.org/cyber-operations/attack-israeli-water-utilities, 2020. [Accessed 04-10-2023].
  97. Melissa Hathaway. Best practices in computer network defense: Incident detection and response, volume 35. IOS Press, 2014. ISBN 9781614993711.
  98. Maintaining a cybersecurity curriculum: Professional certifications as valuable guidance. Journal of Information Systems Education, 28(2):101, 2017.
  99. The cybersecurity focus area maturity (cysfam) model. Journal of Cybersecurity and Privacy, 1(1):119–139, 2021.
  100. Hillary Baron. Secure DevOps and Misconfigurations Survey Report — cloudsecurityalliance.org. https://cloudsecurityalliance.org/artifacts/secure-devops-and-misconfigurations-survey-report/, 2021. [Accessed 09-10-2023].
  101. Dan Constantin Tofan. Information security standards. Journal of Mobile, Embedded and Distributed Systems, 3(3):128–135, 2011.
  102. Cybersecurity and Infrastructure Security Agency. Best Practices for MITRE ATT&CK® Mapping — cisa.gov. https://www.cisa.gov/news-events/news/best-practices-mitre-attckr-mapping, 2023. [Accessed 04-10-2023].
  103. On the use of cyber threat intelligence (cti) in support of developing the commander’s understanding of the adversary. In MILCOM 2019-2019 IEEE Military Communications Conference (MILCOM), pages 1–6. IEEE, 2019.
  104. Enhanced cyber threat model for financial services sector (fss) institutions. The Homeland Security Systems Engineering and Development Institute: McLean, VA, USA, 2018.
  105. Integrated Task Force. Executive order 13636: Improving critical infrastructure cybersecurity. 2013.
  106. Eric A Fischer. Cybersecurity issues and challenges: In brief, 2014.
  107. Cherilyn E Pascoe. Public draft: The nist cybersecurity framework 2.0. 2023.
  108. Center for Internet Security. Benchmarks Overview — cisecurity.org. https://www.cisecurity.org/cis-benchmarks-overview, 2023. [Accessed 09-10-2023].
  109. Georg Disterer. Iso/iec 27000, 27001 and 27002 for information security management. Journal of Information Security, 4(2), 2013.
  110. Mitre att&ck: Design and philosophy. In Technical report. The MITRE Corporation, 2018.
  111. Cybersecurity Framework. Getting started with the nist. 2021.
  112. International Organization for Standardization. ISO - ISO/IEC 27000 family — Information security management — iso.org. https://www.iso.org/standard/iso-iec-27000-family, 2018. [Accessed 09-10-2023].
  113. Charu Pelnekar. Planning for and implementing iso 27001. ISACA Journal, 4:28, 2011.
  114. Jay Bethea. Cisco Secure Endpoint Shines in the 2022 MITRE® Engenuity ATT&CK Evaluation — cisco.com. https://blogs.cisco.com/security/cisco-secure-endpoint-shines-in-the-2022-mitre-engenuity-attck-evaluation, 2022. [Accessed 04-10-2023].
  115. Fortinet. Assess Your Endpoint Security: Better Understand Capabilities Using MITRE Engenuity ATT&CK Evaluations — fortinet.com. https://www.fortinet.com/content/dam/fortinet/assets/white-papers/wp-assess-your-endoint-security.pdf, 2021. [Accessed 04-10-2023].
  116. Claroty. How Claroty Supports the MITRE ATT&CK for ICS Framework — claroty.com. https://claroty.com/blog/how-claroty-supports-the-mitre-attck-for-ics-framework, 2021. [Accessed 04-10-2023].
  117. AttackIQ. Leveraging MITRE ATT&CK to Secure the Cloud — attackiq.com. https://www.attackiq.com/lp/leveraging-mitre-attack-to-secure-the-cloud/, 2021. [Accessed 04-10-2023].
  118. Arista. Securing Against Ransomware Through MITRE ATT&CK– It’s Too Late If They Exfiltrate — arista.com. https://www.arista.com/assets/data/pdf/Whitepapers/Arista-White-Paper_ransomware.pdf, 2022. [Accessed 04-10-2023].
  119. Ransomware: Getting Started Guide and Deep Dive into REvil — mitre.org. https://www.mitre.org/news-insights/publication/ransomware-getting-started-guide-and-deep-dive-revil, 2022. [Accessed 04-10-2023].
  120. Finding cyber threats with att&ck-based analytics. The MITRE Corporation, Bedford, MA, Technical Report No. MTR170202, 2017.
  121. Getting started with att&ck. 2019.
  122. Survey for smart farming technologies: Challenges and issues. Computers & Electrical Engineering, 92:107104, 2021.
  123. Towards leveraging the role of machine learning and artificial intelligence in precision agriculture and smart farming. Computers and Electronics in Agriculture, 198:107119, 2022.
  124. A survey on smart agriculture: Development modes, technologies, and security and privacy challenges. IEEE/CAA Journal of Automatica Sinica, 8(2):273–302, 2021.
  125. Smart farming using artificial intelligence: A review. Engineering Applications of Artificial Intelligence, 120:105899, 2023.
  126. Deep gaussian process for crop yield prediction based on remote sensing data. In Proceedings of the AAAI conference on artificial intelligence, volume 31, 2017.
  127. weednet: Dense semantic weed classification using multispectral images and mav for smart farming. IEEE robotics and automation letters, 3(1):588–595, 2017.
  128. Towards on-farm pig face recognition using convolutional neural networks. Computers in Industry, 98:145–152, 2018.
  129. Machine-learning algorithms for predicting on-farm direct water and electricity consumption on pasture based dairy farms. Computers and electronics in agriculture, 150:74–87, 2018.
  130. Water usage optimization of smart farm automated irrigation system using artificial neural network. In 2017 5th International Conference on Information and Communication Technology (ICoIC7), pages 1–5. IEEE, 2017.
  131. Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. Journal of Information Security and Applications, 50:102419, 2020.
  132. A survey of deep learning-based network anomaly detection. Cluster Computing, 22:949–961, 2019.
  133. A survey of machine and deep learning methods for internet of things (iot) security. IEEE Communications Surveys & Tutorials, 22(3):1646–1685, 2020.
  134. Hongyu Liu and Bo Lang. Machine learning and deep learning methods for intrusion detection systems: A survey. applied sciences, 9(20):4396, 2019.
  135. Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies, 32(1):e4150, 2021.
  136. Deepfarm: Ai-driven management of farm production using explainable causality. In 2022 IEEE 29th Annual Software Technology Conference (STC), pages 27–36. IEEE, 2022.
  137. Deepag: Deep learning approach for measuring the effects of outlier events on agricultural production and policy. In 2021 IEEE Symposium Series on Computational Intelligence (SSCI), pages 1–8. IEEE, 2021.
  138. A comprehensive survey and taxonomy of the svm-based intrusion detection systems. Journal of Network and Computer Applications, 178:102983, 2021.
  139. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications surveys & tutorials, 18(2):1153–1176, 2015.
  140. A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE communications surveys & tutorials, 21(1):686–728, 2018.
  141. Sp2f: A secured privacy-preserving framework for smart agricultural unmanned aerial vehicles. Computer Networks, 187:107819, 2021.
  142. Ton_iot: The role of heterogeneity and the need for standardization of features and attack types in iot network intrusion data sets. IEEE Internet of Things Journal, 9(1):485–496, 2021.
  143. A technique for generating a botnet dataset for anomalous activity detection in iot networks. In 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pages 134–140. IEEE, 2020.
  144. Machine learning-based uav assisted agricultural information security architecture and intrusion detection. IEEE Internet of Things Journal, 2023.
  145. A lévy flight based probabilistic motion planning for uavs in constricted environments. In 2022 IEEE Aerospace Conference (AERO), pages 1–8. IEEE, 2022.
  146. A detailed analysis of the kdd cup 99 data set. In 2009 IEEE symposium on computational intelligence for security and defense applications, pages 1–6. Ieee, 2009.
  147. Introduction to mitre att&ck: Concepts and use cases. In 2023 International Conference on Information Networking (ICOIN), pages 158–161. IEEE, 2023.
  148. Performance of machine learning-based multi-model voting ensemble methods for network threat detection in agriculture 4.0. Sensors, 21(22):7475, 2021.
  149. Deep malware detection framework for iot-based smart agriculture. Computers and Electrical Engineering, 104:108410, 2022.
  150. Malware images: visualization and automatic classification. In Proceedings of the 8th international symposium on visualization for cyber security, pages 1–7, 2011.
  151. Multiclass malware classification via first-and second-order texture statistics. Computers & Security, 97:101895, 2020.
  152. Intrusion detection using machine learning for risk mitigation in iot-enabled smart irrigation in smart farming. Journal of Food Quality, 2022:1–8, 2022.
  153. An intrusion detection system for edge-envisioned smart agriculture in extreme environment. IEEE Internet of Things Journal, 2023.
  154. Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp, 1:108–116, 2018.
  155. Edge-iiotset: A new comprehensive realistic cyber security dataset of iot and iiot applications for centralized and federated learning. IEEE Access, 10:40281–40306, 2022.
  156. Deep learning-based intrusion detection for distributed denial of service attack in agriculture 4.0. Electronics, 10(11):1257, 2021a.
  157. Developing realistic distributed denial of service (ddos) attack dataset and taxonomy. In 2019 International Carnahan Conference on Security Technology (ICCST), pages 1–8. IEEE, 2019.
  158. Keerthi Kethineni and G Pradeepini. Intrusion detection in internet of things-based smart farming using hybrid deep learning framework. Cluster Computing, pages 1–14, 2023.
  159. Pefl: Deep privacy-encoding-based federated learning framework for smart agriculture. IEEE Micro, 42(1):33–40, 2022.
  160. Felids: Federated learning-based intrusion detection system for agricultural internet of things. Journal of Parallel and Distributed Computing, 165:17–31, 2022.
  161. Mqttset, a new dataset for machine learning techniques on mqtt. Sensors, 20(22):6578, 2020.
  162. Insdn: A novel sdn intrusion dataset. Ieee Access, 8:165263–165284, 2020.
  163. Agri-food supply chain: evolution and performance with conflicting consumer and societal demands. European Review of Agricultural Economics, 44(4):634–657, 2017.
  164. Understanding the potential applications of artificial intelligence in agriculture sector. Advanced Agrochem, 2(1):15–30, 2023.
  165. Ai down on the farm. IT Professional, 22(3):22–26, 2020.
  166. Graph neural networks for modeling causality in international trade. In The international FLAIRS conference proceedings, volume 34, 2021.
  167. Public policymaking for international agricultural trade using association rules and ensemble machine learning. Machine Learning with Applications, 5:100046, 2021a.
  168. Simon Y Liu. Artificial intelligence (ai) in agriculture. IT Professional, 22(3):14–15, 2020.
  169. Feed-forward and generalised regression neural networks in modelling feeding behaviour of pigs in the grow-finish phase. Biosystems Engineering, 173:124–133, 2018.
  170. BA King and KC Shellie. Evaluation of neural network modeling to predict non-water-stressed leaf temperature in wine grape for calculation of crop water stress index. Agricultural water management, 167:38–52, 2016.
  171. Statistical and machine learning methods evaluated for incorporating soil and weather into corn nitrogen recommendations. Computers and Electronics in Agriculture, 164:104872, 2019.
  172. Application of machine learning methodologies for predicting corn economic optimal nitrogen rate. Agronomy Journal, 110(6):2596–2607, 2018.
  173. Corn response to nitrogen is influenced by soil texture and weather. Agronomy Journal, 104(6):1658–1671, 2012.
  174. Strengths and limitations of nitrogen rate recommendations for corn and opportunities for improvement. Agronomy Journal, 110(1):1–37, 2018.
  175. Artificial intelligence and critical systems: From hype to reality. Computer, 53(11):45–52, 2020.
  176. The us biomanufacturing economy. 2023.
  177. AI for Cyberbiosecurity in Water Systems—A Survey. Springer, 2023. ISBN 9783031260339.
  178. A survey on artificial intelligence assurance. Journal of Big Data, 8(1):60, 2021b.
  179. The White House. Fact Sheet: President Biden Issues Executive Order on Safe, Secure, and Trustworthy Artificial Intelligence — The White House — whitehouse.gov. https://www.whitehouse.gov/briefing-room/statements-releases/2023/10/30/fact-sheet-president-biden-issues-executive-order-on-safe-secure-and-trustworthy-artificial-intelligence/, 2023. [Accessed 31-10-2023].
  180. National Artifical Iintelligence Research and Development Strategic Plan 2023 Update — nitrd.gov. https://www.nitrd.gov/national-artificial-intelligence-research-and-development-strategic-plan-2023-update/, 2023. [Accessed 18-10-2023].
  181. The roadmap to an effective AI assurance ecosystem - extended version — gov.uk. https://www.gov.uk/government/publications/the-roadmap-to-an-effective-ai-assurance-ecosystem/the-roadmap-to-an-effective-ai-assurance-ecosystem-extended-version, 2021. [Accessed 18-10-2023].
  182. Enabling artificial intelligence adoption through assurance. Social Sciences, 10(9):322, 2021.
  183. Explainable artificial intelligence (xai): What we know and what is left to attain trustworthy artificial intelligence. Information Fusion, 99:101805, 2023.
  184. A survey of human-centered evaluations in human-centered machine learning. In Computer Graphics Forum, volume 40, pages 543–568. Wiley Online Library, 2021.
  185. explainer: A visual analytics framework for interactive and explainable machine learning. IEEE transactions on visualization and computer graphics, 26(1):1064–1074, 2019.
  186. Unmanned aerial vehicle applications in agriculture. In IOP Conference Series: Materials Science and Engineering, volume 506, page 012063. IOP Publishing, 2019.
  187. Ai meets uavs: A survey on ai empowered uav perception systems for precision agriculture. Neurocomputing, 518:242–270, 2023.
  188. Unmanned aerial vehicles (uavs) for uk agriculture: Creating an invisible precision farming technology. White Paper, July, 2016.
  189. What is human-centered about human-centered ai? a map of the research landscape. In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, pages 1–23, 2023.
  190. Ben Shneiderman. Human-centered artificial intelligence: Reliable, safe & trustworthy. International Journal of Human–Computer Interaction, 36(6):495–504, 2020.
  191. Mark O Riedl. Human-centered artificial intelligence and machine learning. Human behavior and emerging technologies, 1(1):33–36, 2019.
  192. Ben Shneiderman. Human-centered ai. Issues in Science and Technology, 37(2):56–61, 2021.
  193. Foundations of data imbalance and solutions for a data democracy. Elsevier, 2020. ISBN 9780128183663.
  194. Putting ai ethics to work: are the tools fit for purpose? AI and Ethics, 2(3):405–429, 2022.
  195. Ryan Mark. Ethics of using ai and big data in agriculture: The case of a large agriculture multinational. The ORBIT Journal, 2(2):1–27, 2019.
  196. Peeking inside the black-box: a survey on explainable artificial intelligence (xai). IEEE access, 6:52138–52160, 2018.
  197. Te Kipa Kepa Brian Morgan. Decision-support tools and the indigenous paradigm. In Proceedings of the Institution of Civil Engineers-Engineering Sustainability, volume 159, pages 169–177. Thomas Telford Ltd, 2006.
  198. Survey on security threats in agricultural iot and smart farming. Sensors, 20(22):6458, November 2020. doi: 10.3390/s20226458. URL https://www.mdpi.com/1424-8220/20/22/6458.
  199. Internet of things: A review from ‘farm to fork’. In 2016 27th Irish signals and systems conference (ISSC), pages 1–6. IEEE, 2016.
  200. Internet of Things and Microservices in Supply Chain: Cybersecurity Challenges, and Research Opportunities, volume 451, page 556–566. Springer International Publishing, Cham, 2022. ISBN 9783030996185.
  201. Cybersecurity in the food and beverage industry: A reference framework. Computers in Industry, 141:103702, 2022.
  202. The economic value of water in agriculture: concepts and policy applications. Water policy, 4(5):423–446, 2002.
  203. Lindsey Fields Bryant. Water and Wastewater Infrastructure, page 417–440. Springer International Publishing, Cham, 2022. ISBN 9783030928209.
  204. Evolution and trends of industrial control system cyber incidents since 2017. Journal of Critical Infrastructure Policy, 2(INL/JOU-21-65119-Rev000), 2021.
  205. Using government websites to enhance democratic e-governance: A conceptual model for evaluation. Government Information Quarterly, 36(2):208–225, 2019.
  206. Cyberbiosecurity: A new perspective on protecting us food and agricultural system. Frontiers in bioengineering and biotechnology, 7:63, 2019.
  207. Center for Food Safety and Applied Nutrition. Food safety modernization act (FSMA), Aug 2023. URL https://www.fda.gov/food/guidance-regulation-food-and-dietary-supplements/food-safety-modernization-act-fsma.
  208. Stephen Streng. Food industry cybersecurity summit meeting report. Technical report, Food Protection and Defense Institute, 2016.
  209. Handbook on the Economics of the Internet. Edward Elgar Publishing, 2016. ISBN 9781788116770.
  210. Cyberattacks on critical infrastructure: An economic perspective. Economics and Business Review, 5(2):24–47, 2019.
  211. Retail food price vulnerability to extreme weather events. 2022.
  212. Anomalies in agricultural trade: A bayesian classifier approach. Journal of the Agricultural and Applied Economics Association, 2023.
  213. A survey on data collection for machine learning: a big data-ai integration perspective. IEEE Transactions on Knowledge and Data Engineering, 33(4):1328–1347, 2019.
  214. Cyber security intrusion detection for agriculture 4.0: Machine learning-based solutions, datasets, and future directions. IEEE/CAA Journal of Automatica Sinica, 9(3):407–436, 2021b.
  215. A survey on smart farming data, applications and techniques. Computers in Industry, 138:103624, 2022.
  216. ACWA: An ai-driven cyber-physical testbed for intelligent water systems. 2023.
  217. Smart water campus–a testbed for smart water applications. Water Science & Technology, 86(11):2834–2847, 2022.
  218. Understanding and promoting adoption of conservation practices by rural landholders. Australian journal of experimental agriculture, 46(11):1407–1424, 2006.
  219. Factors affecting farmers’ adoption of agricultural innovations: A panel data analysis of the use of artificial insemination among dairy farmers in ireland. Journal of Agricultural Science, 4(6):171, 2012.
  220. Determinants of agricultural best management practice adoption: Evidence from the literature. Journal of soil and water conservation, 63(5):300–311, 2008.
Citations (2)

Summary

No one has generated a summary of this paper yet.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.