A method for evaluating the consequence propagation of security attacks in cyber-physical systems

被引:38
作者
Orojloo, Hamed [1 ]
Azgomi, Mohammad Abdollahi [1 ]
机构
[1] Iran Univ Sci & Technol, Sch Comp Engn, Trustworthy Comp Lab, Tehran, Iran
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2017年 / 67卷
关键词
Cyber-physical systems (CPSs); Security evaluation; Physical dynamics; Consequence propagation; DEMATEL METHOD; INDUSTRY; IMPACT; MCDM;
D O I
10.1016/j.future.2016.07.016
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Estimating the possible impacts of security attacks on physical processes can help to rank the critical assets based on their sensitivity to performed attacks and predict their attractiveness from the attacker's point of view. To address this challenge, this paper proposes a new method for assessing the direct and indirect impacts of attacks on cyber-physical systems (CPSs). The proposed method studies the dynamic behavior of systems in normal situation and under security attacks and evaluates the consequence propagation of attacks. The inputs to the model are control parameters including sensor readings and controller signals. The output of the model is evaluating the consequence propagation of attacks, ranking the important assets of systems based on their sensitivity to conducted attacks, and prioritizing the attacks based on their impacts on the behavior of system. The validation phase of the proposed method is performed by modeling and evaluating the consequence propagation of attacks against a boiling water power plant (BWPP). (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:57 / 71
页数:15
相关论文
共 44 条
  • [1] AHMED M, 2013, PHYSICS, P1
  • [2] [Anonymous], 2011, P 6 ACM S INF COMP C, DOI DOI 10.1145/1966913.1966959
  • [3] Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment
    Ashok, Aditya
    Hahn, Adam
    Govindarasu, Manimaran
    [J]. JOURNAL OF ADVANCED RESEARCH, 2014, 5 (04) : 481 - 489
  • [4] A novel hybrid MCDM approach based on fuzzy DEMATEL, fuzzy ANP and fuzzy TOPSIS to evaluate green suppliers
    Buyukozkan, Gulcin
    Cifci, Gizem
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2012, 39 (03) : 3000 - 3011
  • [5] Chen H. K., 2014, J QUAL, V21
  • [6] Gabus A., 1972, World Problems an Invitation to Further Thought within the Framework of Dematel
  • [7] Genge B, 2012, INT J COMPUT COMMUN, V7, P674
  • [8] A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures
    Genge, Bela
    Kiss, Istvan
    Haller, Piroska
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2015, 10 : 3 - 17
  • [9] Genge B, 2012, LECT NOTES COMPUT SC, V7289, P121, DOI 10.1007/978-3-642-30045-5_10
  • [10] Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems
    Goldenberg, Niv
    Wool, Avishai
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2013, 6 (02) : 63 - 75