A Survey on Machine-Learning Based Security Design for Cyber-Physical Systems

被引:30
|
作者
Kim, Sangjun [1 ]
Park, Kyung-Joon [1 ]
机构
[1] Daegu Gyeongbuk Inst Sci & Technol DGIST, Dept Informat & Commun Engn, Daegu 42988, South Korea
来源
APPLIED SCIENCES-BASEL | 2021年 / 11卷 / 12期
关键词
cyber-physical systems; hierarchical CPS structure; CPS security; cyber-physical attacks; machine learning-based detection; learning-enabled CPS; NETWORKED CONTROL-SYSTEMS; INTRUSION DETECTION; ATTACK DETECTION; COMMUNICATION; RESILIENT; INJECTION; TUTORIAL; DEEP; VULNERABILITY; TECHNOLOGIES;
D O I
10.3390/app11125458
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
A cyber-physical system (CPS) is the integration of a physical system into the real world and control applications in a computing system, interacting through a communications network. Network technology connecting physical systems and computing systems enables the simultaneous control of many physical systems and provides intelligent applications for them. However, enhancing connectivity leads to extended attack vectors in which attackers can trespass on the network and launch cyber-physical attacks, remotely disrupting the CPS. Therefore, extensive studies into cyber-physical security are being conducted in various domains, such as physical, network, and computing systems. Moreover, large-scale and complex CPSs make it difficult to analyze and detect cyber-physical attacks, and thus, machine learning (ML) techniques have recently been adopted for cyber-physical security. In this survey, we provide an extensive review of the threats and ML-based security designs for CPSs. First, we present a CPS structure that classifies the functions of the CPS into three layers: the physical system, the network, and software applications. Then, we discuss the taxonomy of cyber-physical attacks on each layer, and in particular, we analyze attacks based on the dynamics of the physical system. We review existing studies on detecting cyber-physical attacks with various ML techniques from the perspectives of the physical system, the network, and the computing system. Furthermore, we discuss future research directions for ML-based cyber-physical security research in the context of real-time constraints, resiliency, and dataset generation to learn about the possible attacks.
引用
收藏
页数:30
相关论文
共 50 条
  • [41] Security Enumerations for Cyber-Physical Systems
    Schlette, Daniel
    Menges, Florian
    Baumer, Thomas
    Pernul, Guenther
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXIV, DBSEC 2020, 2020, 12122 : 64 - 76
  • [42] Modeling security in cyber-physical systems
    Burmester, Mike
    Magkos, Ernmanouil
    Chrissikopoulos, Vassilis
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2012, 5 (3-4) : 118 - 126
  • [43] Security Games for Cyber-Physical Systems
    Vigo, Roberto
    Bruni, Alessandro
    Yuksel, Ender
    SECURE IT SYSTEMS, NORDSEC 2013, 2013, 8208 : 17 - 32
  • [44] Analysis of security in cyber-physical systems
    CHEN Jie
    ZHANG Fan
    SUN Jian
    Science China(Technological Sciences), 2017, 60 (12) : 1975 - 1977
  • [45] Security Synthesis for Cyber-Physical Systems
    Li, Jitao
    Wang, Zhenhua
    Shen, Yi
    Xie, Lihua
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2023, 53 (02): : 1027 - 1037
  • [46] Security and networking for cyber-physical systems
    Wu, Shaoen
    Wang, Honggang
    Wu, Dalei
    Chatzimisios, Periklis
    Chen, Zhigang
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (09) : 807 - 807
  • [47] Analysis of security in cyber-physical systems
    Jie Chen
    Fan Zhang
    Jian Sun
    Science China Technological Sciences, 2017, 60 : 1975 - 1977
  • [48] Machine Learning Based Manufacturing Control System for Intelligent Cyber-Physical Systems
    Shah, Vaibhav
    Putnik, Goran D.
    FME TRANSACTIONS, 2019, 47 (04): : 802 - 809
  • [49] PDM: Privacy-Aware Deployment of Machine-Learning Applications for Industrial Cyber-Physical Cloud Systems
    Xu, Xiaolong
    Mo, Ruichao
    Yin, Xiaochun
    Khosravi, Mohammad R.
    Aghaei, Fahimeh
    Chang, Victor
    Li, Guangshun
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (08) : 5819 - 5828
  • [50] Security in the Era of Cyber-Physical Systems of Systems
    Karnouskos, Stamatis
    ERCIM NEWS, 2014, (97): : 44 - 45