Cyber-Physical Vulnerability Assessment in Manufacturing Systems

被引:31
作者
DeSmit, Zach [1 ]
Elhabashy, Ahmad E. [1 ,2 ]
Wells, Lee J. [3 ]
Camelio, Jaime A. [1 ]
机构
[1] Virginia Tech, Grado Dept Ind & Syst Engn, Blacksburg, VA 24061 USA
[2] Univ Alexandria, Dept Prod Engn, Fac Engn, Alexandria 21544, Egypt
[3] Western Michigan Univ, Ind & Entrepreneurial Engn & Engn Management Dept, Kalamazoo, MI 49008 USA
来源
44TH NORTH AMERICAN MANUFACTURING RESEARCH CONFERENCE, NAMRC 44 | 2016年 / 5卷
基金
美国国家科学基金会;
关键词
Cyber-physical security; Decision tree analysis; Manufacturing systems; Vulnerability assessment;
D O I
10.1016/j.promfg.2016.08.075
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The rampant increase in frequency and complexity of cyber-attacks against manufacturing firms, has motivated the development of identification and mitigation techniques for cyber-physical vulnerabilities in manufacturing. While the field of cybersecurity assessment approaches is expansive, there is no literature aimed at assessing cyber-physical vulnerabilities for manufacturing systems. In response, this paper provides a framework for systematically identifying cyber-physical vulnerabilities in manufacturing systems. The proposed approach employs intersection mapping to identify cyberphysical vulnerabilities in manufacturing. A cyber-physical vulnerability impact analysis using decision trees then provides the manufacturer with a stoplight scale between low, medium, and high levels of cyber-physical vulnerability for each analyzed production process. The stoplight scale allows manufacturers to interpret assessment results in an intuitive way. Finally, the paper provides a case study of the proposed approach at an applied manufacturing research facility and provides general recommendations to securing similar facilities from cyber-physical attacks.
引用
收藏
页码:1060 / 1074
页数:15
相关论文
共 27 条
[1]  
Albright D., 2010, Technical Report
[2]  
[Anonymous], 2014, Framework for improving critical infrastructure cybersecurity, DOI 10.6028/NIST.CSWP.02122014
[3]  
[Anonymous], OCTAVE ALLEGRO GUIDE
[4]  
[Anonymous], CYB ADV MAN
[5]  
[Anonymous], 2014, Internet Security Threat Report 2014, V19
[6]  
Anthem Inc., 2015, ACC SIGN ID THEFT RE
[7]  
Baker G.H., 2005, DHS S BOST MASS DEP
[8]  
Bergvall J., 2012, THESIS
[9]  
CERULLO MJ, 1994, COMPUTER AUDIT J, P9
[10]  
Cherry S., 2011, SONS OF STUXNET