Assessing the Consequence of Cyber and Physical Malicious Attacks in Complex, Cyber-Physical Systems During Early System Design

被引:0
|
作者
O'Halloran, Bryan M. [1 ]
Papakonstantinou, Nikolaos [2 ]
Van Bossuyt, Douglas L. [1 ]
机构
[1] Naval Postgrad Sch, Dept Syst Engn, Monterey, CA 93943 USA
[2] VTT Tech Res Ctr, Espoo, Finland
关键词
Cyber-physical systems; engineering design; failure propagation; design methods; systems engineering; STUXNET;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This research contributes to the lifecycle assessment of complex cyber-physical systems (CCPSs) to better understand and mitigate risks of malicious attacks through design. This assessment capability is proposed during the early phase of engineering design where significant decision-making flexibility exists. This is done by assessing potential malicious attacks carried out by humans interacting with the system across all phases of the system's lifecycle. We propose a novel quantification of an attacker-centric risk, then optimize the large set of attacks using a genetic algorithm. This research is motivated by the increased vulnerability of CCPSs due to their increasingly complex interconnected and digitally connected nature. A specific area of interest for CCPSs has been the increasing degree of connectedness. For example, several recent federal reports indicate that significant risk exists in the design of commercial aircraft where the entertainment system is connected to the avionics through a central network. The result is an increased ability to attack a specific subsystem or component to produce system failure. These findings, as well as others, have led to a significant concern with malicious attacks to target critical components of the CCPS. While assessments can be performed on a CCPS during the later phases of engineering design, techniques are currently not available during the early phase. We propose an assessment technique which is useful to practitioners during conceptual design. In this research, we assess a nuclear power plant as an example CCPS. The resulting methodology provides useful insight to the risks of malicious attacks throughout the system's lifecycle.
引用
收藏
页码:733 / 740
页数:8
相关论文
共 50 条
  • [1] Coordinated cyber-physical attacks of cyber-physical power system
    Yang Y.
    Lan S.
    Qin Z.
    Liu H.
    Dianli Zidonghua Shebei/Electric Power Automation Equipment, 2020, 40 (02): : 97 - 102
  • [2] A Resiliency Coordinator Against Malicious Attacks for Cyber-Physical Systems
    Eun, Yongsoon
    Park, Jaegeun
    Jeong, Yechan
    Kim, Daehoon
    Park, Kyung-Joon
    2022 22ND INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND SYSTEMS (ICCAS 2022), 2022, : 1698 - 1703
  • [3] Secure Control for Cyber-Physical Systems Under Malicious Attacks
    Wu, Chengwei
    Yao, Weiran
    Pan, Wei
    Sun, Guanghui
    Liu, Jianxing
    Wu, Ligang
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2022, 9 (02): : 775 - 788
  • [4] Determination of Security Index for Linear Cyber-Physical Systems Subject to Malicious Cyber Attacks
    Baniamerian, Amir
    Khorasani, Khashayar
    Meskin, Nader
    2019 IEEE 58TH CONFERENCE ON DECISION AND CONTROL (CDC), 2019, : 4507 - 4513
  • [5] Improved control of cyber-physical systems subject to cyber and physical attacks
    Mahmoud M.S.
    Hamdan M.M.
    Cyber-Physical Systems, 2019, 5 (03) : 173 - 190
  • [6] Defending Malicious Attacks in Cyber Physical Systems
    Chen, Chia-Mei
    Hsiao, Han-Wei
    Yang, Peng-Yu
    Ou, Ya-Hui
    2013 IEEE 1ST INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS, NETWORKS, AND APPLICATIONS (CPSNA), 2013, : 13 - 18
  • [7] Integrity Attacks on Cyber-Physical Systems
    Mo, Yilin
    Sinopoli, Bruno
    HICONS 12: PROCEEDINGS OF THE 1ST ACM INTERNATIONAL CONFERENCE ON HIGH CONFIDENCE NETWORKED SYSTEMS, 2012, : 47 - 54
  • [8] Cryptanalytical Attacks on Cyber-physical Systems
    Novotny, Martin
    2016 5TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2016, : 10 - 10
  • [9] Cryptanalytic attacks on cyber-physical systems
    Novotny, Martin
    MICROPROCESSORS AND MICROSYSTEMS, 2017, 52 : 534 - 539
  • [10] A method for evaluating the consequence propagation of security attacks in cyber-physical systems
    Orojloo, Hamed
    Azgomi, Mohammad Abdollahi
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 67 : 57 - 71