Assessing the Consequence of Cyber and Physical Malicious Attacks in Complex, Cyber-Physical Systems During Early System Design

被引:0
|
作者
O'Halloran, Bryan M. [1 ]
Papakonstantinou, Nikolaos [2 ]
Van Bossuyt, Douglas L. [1 ]
机构
[1] Naval Postgrad Sch, Dept Syst Engn, Monterey, CA 93943 USA
[2] VTT Tech Res Ctr, Espoo, Finland
关键词
Cyber-physical systems; engineering design; failure propagation; design methods; systems engineering; STUXNET;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This research contributes to the lifecycle assessment of complex cyber-physical systems (CCPSs) to better understand and mitigate risks of malicious attacks through design. This assessment capability is proposed during the early phase of engineering design where significant decision-making flexibility exists. This is done by assessing potential malicious attacks carried out by humans interacting with the system across all phases of the system's lifecycle. We propose a novel quantification of an attacker-centric risk, then optimize the large set of attacks using a genetic algorithm. This research is motivated by the increased vulnerability of CCPSs due to their increasingly complex interconnected and digitally connected nature. A specific area of interest for CCPSs has been the increasing degree of connectedness. For example, several recent federal reports indicate that significant risk exists in the design of commercial aircraft where the entertainment system is connected to the avionics through a central network. The result is an increased ability to attack a specific subsystem or component to produce system failure. These findings, as well as others, have led to a significant concern with malicious attacks to target critical components of the CCPS. While assessments can be performed on a CCPS during the later phases of engineering design, techniques are currently not available during the early phase. We propose an assessment technique which is useful to practitioners during conceptual design. In this research, we assess a nuclear power plant as an example CCPS. The resulting methodology provides useful insight to the risks of malicious attacks throughout the system's lifecycle.
引用
收藏
页码:733 / 740
页数:8
相关论文
共 50 条
  • [21] Modeling and Simulation of Attacks on Cyber-physical Systems
    Bernardeschi, Cinzia
    Domenici, Andrea
    Palmieri, Maurizio
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2019, : 700 - 708
  • [22] Stealthy Deception Attacks for Cyber-Physical Systems
    Goes, Romulo Meira
    Kang, Eunsuk
    Kwong, Raymond
    Lafortune, Stephane
    2017 IEEE 56TH ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2017,
  • [23] Cyber-physical attacks on power distribution systems
    Ayad, Abdelrahman
    Farag, Hany
    Youssef, Amr
    El-Saadany, Ehab
    IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2020, 5 (02) : 218 - 225
  • [24] A Survey of Network Attacks on Cyber-Physical Systems
    Cao, Liwei
    Jiang, Xiaoning
    Zhao, Yumei
    Wang, Shouguang
    You, Dan
    Xu, Xianli
    IEEE ACCESS, 2020, 8 : 44219 - 44227
  • [25] Covert Attacks in Cyber-Physical Control Systems
    de Sa, Alan Oliveira
    Rust da Costa Carmo, Luiz F.
    Machado, Raphael C. S.
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (04) : 1641 - 1651
  • [26] A toolbox for assessing the impacts of cyber-physical attacks on water distribution systems
    Taormina, R.
    Galelli, S.
    Douglas, H. C.
    Tippenhauer, N. O.
    Salomons, E.
    Ostfeld, A.
    ENVIRONMENTAL MODELLING & SOFTWARE, 2019, 112 : 46 - 51
  • [27] Detection of Replay Attacks in Cyber-Physical Systems
    Hoehn, Andreas
    Zhang, Ping
    2016 AMERICAN CONTROL CONFERENCE (ACC), 2016, : 290 - 295
  • [28] A language for describing attacks on cyber-physical systems
    Yampolskiy, Mark
    Horvath, Peter
    Koutsoukos, Xenofon D.
    Xue, Yuan
    Sztipanovits, Janos
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2015, 8 : 40 - 52
  • [29] MPC for the Cyber-Physical System with Deception Attacks
    Liu, Yuezhi
    Chen, Yong
    Li, Meng
    Wan, Zhi
    PROCEEDINGS OF THE 32ND 2020 CHINESE CONTROL AND DECISION CONFERENCE (CCDC 2020), 2020, : 3847 - 3852
  • [30] Robustness of Asymmetric Cyber-Physical Power Systems Against Cyber Attacks
    Lai, Rong
    Qiu, Xiaoyu
    Wu, Jiajing
    IEEE ACCESS, 2019, 7 : 61342 - 61352