A Survey on Machine-Learning Based Security Design for Cyber-Physical Systems

被引:30
|
作者
Kim, Sangjun [1 ]
Park, Kyung-Joon [1 ]
机构
[1] Daegu Gyeongbuk Inst Sci & Technol DGIST, Dept Informat & Commun Engn, Daegu 42988, South Korea
来源
APPLIED SCIENCES-BASEL | 2021年 / 11卷 / 12期
关键词
cyber-physical systems; hierarchical CPS structure; CPS security; cyber-physical attacks; machine learning-based detection; learning-enabled CPS; NETWORKED CONTROL-SYSTEMS; INTRUSION DETECTION; ATTACK DETECTION; COMMUNICATION; RESILIENT; INJECTION; TUTORIAL; DEEP; VULNERABILITY; TECHNOLOGIES;
D O I
10.3390/app11125458
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
A cyber-physical system (CPS) is the integration of a physical system into the real world and control applications in a computing system, interacting through a communications network. Network technology connecting physical systems and computing systems enables the simultaneous control of many physical systems and provides intelligent applications for them. However, enhancing connectivity leads to extended attack vectors in which attackers can trespass on the network and launch cyber-physical attacks, remotely disrupting the CPS. Therefore, extensive studies into cyber-physical security are being conducted in various domains, such as physical, network, and computing systems. Moreover, large-scale and complex CPSs make it difficult to analyze and detect cyber-physical attacks, and thus, machine learning (ML) techniques have recently been adopted for cyber-physical security. In this survey, we provide an extensive review of the threats and ML-based security designs for CPSs. First, we present a CPS structure that classifies the functions of the CPS into three layers: the physical system, the network, and software applications. Then, we discuss the taxonomy of cyber-physical attacks on each layer, and in particular, we analyze attacks based on the dynamics of the physical system. We review existing studies on detecting cyber-physical attacks with various ML techniques from the perspectives of the physical system, the network, and the computing system. Furthermore, we discuss future research directions for ML-based cyber-physical security research in the context of real-time constraints, resiliency, and dataset generation to learn about the possible attacks.
引用
收藏
页数:30
相关论文
共 50 条
  • [31] Behaviour-Based Security for Cyber-Physical Systems
    Serpanos, Dimitrios
    Shrobe, Howard
    Khan, Muhammad Taimoor
    ERCIM NEWS, 2016, (107): : 53 - 54
  • [32] Security Analysis of Cyber-Physical Systems Using Reinforcement Learning
    Ibrahim, Mariam
    Elhafiz, Ruba
    SENSORS, 2023, 23 (03)
  • [33] Reinforcement Learning for Cyber-Physical Security Assessment of Power Systems
    Liu, Xiaorui
    Konstantinou, Charalambos
    2019 IEEE MILAN POWERTECH, 2019,
  • [34] On the Role of Latent Design Conditions in Cyber-Physical Systems Security
    Frey, Sylvain
    Rashid, Awais
    Zanutto, Alberto
    Busby, Jerry
    Follis, Karolina
    2016 IEEE/ACM 2ND INTERNATIONAL WORKSHOP ON SOFTWARE ENGINEERING FOR SMART CYBER-PHYSICAL SYSTEMS (SESCPS), 2016, : 43 - 46
  • [35] Analysis of security in cyber-physical systems
    Chen, Jie
    Zhang, Fan
    Sun, Jian
    SCIENCE CHINA-TECHNOLOGICAL SCIENCES, 2017, 60 (12) : 1975 - 1977
  • [36] Cyber-physical systems and their security issues
    Alguliyev, Rasim
    Imamverdiyev, Yadigar
    Sukhostat, Lyudmila
    COMPUTERS IN INDUSTRY, 2018, 100 : 212 - 223
  • [37] Safety and security of cyber-physical systems
    Biro, Miklos
    Mashkoor, Atif
    Sametinger, Johannes
    JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2023, 35 (07)
  • [38] Analysis of security in cyber-physical systems
    CHEN Jie
    ZHANG Fan
    SUN Jian
    Science China(Technological Sciences), 2017, (12) : 1975 - 1977
  • [39] Cyber-Physical Systems: A Security Perspective
    Konstantinou, Charalambos
    Maniatakos, Michail
    Saqib, Fareena
    Hu, Shiyan
    Plusquellic, Jim
    Jin, Yier
    2015 20TH IEEE EUROPEAN TEST SYMPOSIUM (ETS), 2015,
  • [40] Cyber-Physical Systems Security and Privacy
    Henkel, Jorg
    IEEE DESIGN & TEST, 2017, 34 (04) : 4 - 4