Posted in | News | Technology

Machine Learning Assesses Cyber Risks in Construction

A recent article published in Developments in the Built Environment proposed a machine learning (ML) method to assess common cyber risks for construction projects. The approach involved three components: a Monte Carlo-simulated dataset for risk prediction, an ML-based analysis of risk factors, and a greedy optimization algorithm to address high-risk factors efficiently.

Machine Learning Assesses Cyber Risks in Construction
Study: Assessing cyber risks in construction projects: A machine learning-centric approach. Image Credit: Summit Art Creations/Shutterstock.com

Background

While digital advancements have enhanced the efficiency and productivity of the construction sector, they have also increased cybersecurity vulnerabilities, resulting in significant delays, financial losses, and reputational damage in construction projects. The construction sector is lagging behind other industries in cybersecurity, encountering rising cyber incidents over the past decade.

Five types of cyber risks are mainly associated with the construction sector: ransomware attacks on blueprints and financial records, phishing to deceive individuals into revealing sensitive information, insider attacks to maliciously sabotage key resources, data breaches for unauthorized access to sensitive digital data, and supply chain attacks.

Equipping project managers with predictive tools to forecast cyber risks across project phases can proactively address these risks. This enables the managers to employ mitigation strategies, reducing or completely averting risks. A dynamic risk assessment tool that captures real-time project data and uses predictive models to evaluate cyber risk levels is preferable.

Methods

Developing an ML-centric approach for construction risk analysis involved multiple steps. Step 1 outlined the feature sources for the ML models derived from the identified risk factors. Step 2 involved generating datasets through Monte Carlo simulation and using an ensemble labeling approach combining fault tree analysis with criteria-based labeling.

Step 3 described the two-phase model development strategy, including determining the best model for each risk and optimal weight combination for various labeling methods. Step 4 employed an ML feature analysis to identify significant risk factors. Finally, step 5 introduced a greedy optimization algorithm to formulate efficient risk reduction strategies.

The above steps yielded a dynamic cyber risk assessment tool with three main modules: trained ML models for risk degree prediction (steps 1–3), risk factor analysis (step 4), and (3) risk reduction strategy formulation (step 5).

The ML model was based on the identified construction risk factors. Therefore, a systematic and rigorous process was employed to ensure the risk factors’ comprehensiveness, relevance, accuracy, and suitability. This involved a systematic literature review, the Delphi method for expert evaluation, and a detailed questionnaire survey.

Finally, a case study was conducted on a real construction project in the United Arab Emirates to demonstrate the practical applicability of the developed approach with three modules. This was a project for a leading engineering and contracting firm.

Results and Discussion

Among various analyzed risk factors, the insider attack risk consistently achieved near-perfect determination coefficient (R2) values across all ML models, indicating an almost linear relationship and making basic models suitable for prediction. Similarly, supply chain attack risk demonstrated high R2 values with simpler models, confirming linearity. Notably, the complex models overfitted in cases of obvious linearity and underperformed on test data; therefore, simpler models were chosen for these risks.

All ML models achieved high R2 values for ransomware attacks, but complex models like neural networks outperformed simpler ones, suggesting more non-linearity. A similar pattern was observed for phishing and data breach risks. The latter exhibited the lowest R2 values across all models, indicating significant non-linearity and the limited effectiveness of sophisticated models. Thus, complex models were more suitable for these risks.

Almost all identified risks exhibited some non-linearities, denoting their complex relation with cyber risks. Therefore, construction project managers should comprehensively understand these risk factors to analyze cyber risks. This requires a holistic approach and commitment to cybersecurity. Additionally, different cyber risks demonstrated unique non-linear relationships with the corresponding risk factors. Thus, effectively addressing each type of cyber risk might need specifically tailored strategies.

The developed ML models successfully predicted the incidence of cyber risks in two expert-labeled projects and a real construction project. These outcomes further demonstrated the efficacy and validity of the models. Notably, the models could predict cyber risk status at any stage of a construction project, allowing project managers to employ immediate risk reduction strategies. The model’s greedy optimization algorithm governed these strategies to maximize resource allocation efficiency.

Conclusion

Overall, the researchers successfully developed an ML-based approach to assess the five most common cyber risks in construction projects: ransomware, insider attacks, data breaches, phishing, and supply chain attacks. 

However, the study suffered significant limitations due to the lack of an existing dataset. Therefore, a simulated dataset based on defined probability distributions was used to train the ML models. Despite expert review and validation, these distributions may not fully replicate real-world scenarios, probably introducing variance in the model results.

The researchers plan to conduct sensitivity analyses to refine these distributions and expand the expert panel for data simulation. Additionally, they are actively collaborating with local companies to collect authentic data for model validation and access real-world data.

Journal Reference

Yao, D., & de Soto, G. (2024). Assessing Cyber Risks in Construction Projects: A Machine Learning-Centric Approach. Developments in the Built Environment, 100570. DOI: 10.1016/j.dibe.2024.100570, https://www.sciencedirect.com/science/article/pii/S2666165924002515

Disclaimer: The views expressed here are those of the author expressed in their private capacity and do not necessarily represent the views of AZoM.com Limited T/A AZoNetwork the owner and operator of this website. This disclaimer forms part of the Terms and conditions of use of this website.

Nidhi Dhull

Written by

Nidhi Dhull

Nidhi Dhull is a freelance scientific writer, editor, and reviewer with a PhD in Physics. Nidhi has an extensive research experience in material sciences. Her research has been mainly focused on biosensing applications of thin films. During her Ph.D., she developed a noninvasive immunosensor for cortisol hormone and a paper-based biosensor for E. coli bacteria. Her works have been published in reputed journals of publishers like Elsevier and Taylor & Francis. She has also made a significant contribution to some pending patents.  

Citations

Please use one of the following formats to cite this article in your essay, paper or report:

  • APA

    Dhull, Nidhi. (2024, November 26). Machine Learning Assesses Cyber Risks in Construction. AZoBuild. Retrieved on November 26, 2024 from https://www.azobuild.com/news.aspx?newsID=23657.

  • MLA

    Dhull, Nidhi. "Machine Learning Assesses Cyber Risks in Construction". AZoBuild. 26 November 2024. <https://www.azobuild.com/news.aspx?newsID=23657>.

  • Chicago

    Dhull, Nidhi. "Machine Learning Assesses Cyber Risks in Construction". AZoBuild. https://www.azobuild.com/news.aspx?newsID=23657. (accessed November 26, 2024).

  • Harvard

    Dhull, Nidhi. 2024. Machine Learning Assesses Cyber Risks in Construction. AZoBuild, viewed 26 November 2024, https://www.azobuild.com/news.aspx?newsID=23657.

Tell Us What You Think

Do you have a review, update or anything you would like to add to this news story?

Leave your feedback
Your comment type
Submit

While we only use edited and approved content for Azthena answers, it may on occasions provide incorrect responses. Please confirm any data provided with the related suppliers or authors. We do not provide medical advice, if you search for medical information you must always consult a medical professional before acting on any information provided.

Your questions, but not your email details will be shared with OpenAI and retained for 30 days in accordance with their privacy principles.

Please do not ask questions that use sensitive or confidential information.

Read the full Terms & Conditions.