A review on security analysis of cyber physical systems using Machine learning

被引:29
作者
Ahmed Jamal A. [1 ]
Mustafa Majid A.-A. [1 ]
Konev A. [1 ]
Kosachenko T. [1 ]
Shelupanov A. [1 ]
机构
[1] Department of Complex Information Security of Computer Systems, Faculty of Security, Tomsk State University of Control Systems and Radioelectronics, Tomsk
关键词
Cyber security; Cyber threat intelligence; Intrusion detection; Machine learning;
D O I
10.1016/j.matpr.2021.06.320
中图分类号
学科分类号
摘要
The concept of Cyber Physical System (CPS) is widely used in different industries across the globe. In fact, it is the holistic approach towards dealing with cyber space and physical environments that do have inter-dependencies. In the existing systems, there was a separate approach for security of the two worlds (cyber and physical). However, it does not provide necessary security when security is employed independently. The research in this paper identifies the need for integrated security for CPS. Besides it throws light into different security challenges associated with CPS and the countermeasures that existed based on machine learning and deep learning techniques that come under Artificial Intelligence (AI) and data science. From the review of literature, it is understood that data science perspective is suitable for protecting CPS with required adaptive strategy. This paper provides several useful insights related to security analysis of CPS using machine learning. It paves way for further investigation and realize a comprehensive security framework to protect CPS from internal and external cyber-attacks. © 2021
引用
收藏
页码:2302 / 2306
页数:4
相关论文
共 62 条
[1]  
Vinayakumar R., Alazab M., Soman K.P., Poornachandran P., Al-Nemrat A.
[2]  
Tantawy A., Abdelwahed S., Erradi A., Shaban K., Model-based risk assessment for cyber physical systems security, Comput. Sec., 96, (2020)
[3]  
Xinping G., Bo Y., Cailian C., Wenbin D., Yiyin W., A comprehensive overview of cyber-physical systems: from perspective of feedback system, IEEE/CAA J. Autom. Sin., 3, 1, pp. 1-14, (2016)
[4]  
Guo L., Ye J., Cyber-physical security of electric vehicles with four motor drives, IEEE Trans. Power Electron., 36, 4, pp. 4463-4477, (2021)
[5]  
Akkaya I., Derler P., Emoto S., Lee E.A., Systems engineering for industrial cyber-physical systems using aspects, Proc. IEEE, 104, 5, pp. 997-1012, (2016)
[6]  
Wang T., Liang Y., Yang Y.I., Xu G., Peng H., Liu A., Jia W., An intelligent edge-computing-based method to counter coupling problems in cyber-physical systems, IEEE Network, 34, 3, pp. 16-22, (2020)
[7]  
Chen Y., Poskitt C.M., Sun J., Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System, 2018 IEEE Symposium on Security and Privacy (SP), (2018)
[8]  
Settanni G., Skopik F., Karaj A., Wurzenberger M., Fiedler R., Protecting cyber physical production systems using anomaly detection to enable self-adaptation, 2018 IEEE Industrial Cyber-Physical Systems (ICPS), (2018)
[9]  
Babiceanu R.F., Seker R., Big Data and virtualization for manufacturing cyber-physical systems: A survey of the current status and future outlook, Comput. Ind., 81, pp. 128-137, (2016)
[10]  
Machado C., Medeiros Frohlich A.A., IoT Data Integrity Verification for Cyber-Physical Systems Using Blockchain, 2018 IEEE 21st International Symposium on Real-Time Distributed Computing (ISORC), (2018)