Detecting Cyber-Attacks Against Cyber-Physical Manufacturing System: A Machining Process Invariant Approach

被引:1
作者
Li, Zedong [1 ,2 ]
Chen, Xin [1 ,2 ]
Chen, Yuqi [3 ]
Li, Shijie [1 ,2 ]
Wang, Hangyu [1 ,2 ]
Lv, Shichao [1 ,2 ]
Sun, Limin [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing Key Lab IOT Informat Secur Technol, Beijing 100085, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 101408, Peoples R China
[3] ShanghaiTech Univ, Sch Informat Sci & Technol, Shanghai 201210, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 10期
关键词
Machining; Codes; Servers; Cyberattack; Computer numerical control; Intrusion detection; Process control; Computer numerical control (CNC); cyber attack; cyber-physical manufacturing systems (CPMSs); Industrial Internet of Things; intrusion detection;
D O I
10.1109/JIOT.2024.3358798
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The era of the Industrial Internet of Things has led to an escalating menace of cyber-physical manufacturing systems (CPMSs) to cyber-attacks. Presently, the field of intrusion detection for CPMS has significant advancements. However, current methodologies require significant costs for collecting historical data to train detection models, which are tailored to specific machining scenarios. Evolving machining scenarios in the real world challenge the adaptability of these methods. In this article, We found that the machining code of the CPMS contains a complete machining process, which is an excellent detection basis. Therefore, we propose MPI-CNC, an intrusion detection approach based on Machining Process Invariant in the machining code. Specifically, MPI-CNC automates the analysis of the machining codes to extract machining process rules and key parameter rules, which serve as essential detection rules. Then, MPI-CNC actively acquires runtime status from the CPMS and matches the detection rules to identify cyber-attacks behavior. MPI-CNC was evaluated using two FANUC computer numerical control (CNC) machine tools across ten real machining scenarios. The experiment demonstrated the exceptional adaptability capability of MPI-CNC. Furthermore, MPI-CNC showed superior accuracy in detecting cyber-attacks against CPMS compared to existing state-of-the-art detection methods while ensuring normal machining operations.
引用
收藏
页码:17602 / 17614
页数:13
相关论文
共 34 条
[1]   Securing cyber-physical additive manufacturing systems by in-situ process authentication using streamline video analysis [J].
Al Mamun, Abdullah ;
Liu, Chenang ;
Kan, Chen ;
Tian, Wenmeng .
JOURNAL OF MANUFACTURING SYSTEMS, 2022, 62 :429-440
[2]  
[Anonymous], 2009, 698312009 ISO
[3]   Digital Twin-Based Cyber-Attack Detection Framework for Cyber-Physical Manufacturing Systems [J].
Balta, Efe C. ;
Pease, Michael ;
Moyne, James ;
Barton, Kira ;
Tilbury, Dawn M. .
IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2024, 21 (02) :1695-1712
[4]  
Bayens C, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1181
[5]   Needle in a Haystack: Detecting Subtle Malicious Edits to Additive Manufacturing G-Code Files [J].
Beckwith, Caleb ;
Naicker, Harsh Sankar ;
Mehta, Svara ;
Udupa, Viba R. ;
Nim, Nghia Tri ;
Gadre, Varun ;
Pearce, Hammond ;
Mac, Gary ;
Gupta, Nikhil .
IEEE EMBEDDED SYSTEMS LETTERS, 2022, 14 (03) :111-114
[6]   Digital Audio Signature for 3D Printing Integrity [J].
Belikovetsky, Sofia ;
Solewicz, Yosef A. ;
Yampolskiy, Mark ;
Toh, Jinghui ;
Elovici, Yuval .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (05) :1127-1141
[7]   Tool of Spies: Leaking your IP by Altering the 3D Printer Compiler [J].
Chhetri, Sujit Rokka ;
Barua, Anomadarshi ;
Faezi, Sina ;
Regazzoni, Francesco ;
Canedo, Arquimedes ;
Al Faruque, Mohammad Abdullah .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (02) :667-678
[8]   KCAD: Kinetic Cyber-Attack Detection Method for Cyber-Physical Additive Manufacturing Systems [J].
Chhetri, Sujit Rokka ;
Canedo, Arquimedes ;
Al Faruque, Mohammad Abdullah .
2016 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2016,
[9]   Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach [J].
Choi, Hongjun ;
Lee, Wen-Chuan ;
Aafer, Yousra ;
Fei, Fan ;
Tu, Zhan ;
Zhang, Xiangyu ;
Xu, Dongyan ;
Deng, Xinyan .
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, :801-816
[10]   A Survey of Man In The Middle Attacks [J].
Conti, Mauro ;
Dragoni, Nicola ;
Lesyk, Viktor .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (03) :2027-2051