Naval cyber-physical anomaly propagation analysis based on a quality assessed graph

被引:0
作者
Pelissero, Nicolas [1 ]
Laso, Pedro Merino [2 ]
Puentes, John [3 ]
机构
[1] Ecole Navale, Chair Naval Cyber Def, Brest, France
[2] French Maritime Acad ENSM, Nantes, France
[3] IMT Atlantique, Lab STICC, UMR CNRS 6285, Brest, France
来源
2020 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA 2020) | 2020年
关键词
Cyber-physical system; anomalies; propagation analysis; data and information quality; graph theory; DATA INJECTION ATTACKS;
D O I
10.1109/cybersa49311.2020.9139634
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As any other infrastructure relying on cyberphysical systems (CPS), naval CPS are highly interconnected and collect considerable data streams, on which depend multiple command and navigation decisions. Being a data-driven decision system requiring optimized supervisory control on a permanent basis, it is critical to examine the CPS vulnerability to anomalies and their propagation. This paper presents an approach to detect CPS anomalies and estimate their propagation applying a quality assessed graph, which represents the CPS physical and digital subsystems, combined with system variables dependencies and a set of data and information quality measures vectors. Following the identification of variables dependencies and high-risk nodes in the CPS, data and information quality measures reveal how system variables are modified when an anomaly is detected, also indicating its propagation path. Taking as reference the normal state of a naval propulsion management system, four anomalies in the form of cyber-attacks - port scan, programmable logical controller stop, and man in the middle to change the motor speed and operation of a tank valve - were produced. Three anomalies were properly detected and their propagation path identified. These results suggest the feasibility of anomaly detection and estimation of propagation estimation in CPS, applying data and information quality analysis to a system graph.
引用
收藏
页数:8
相关论文
共 19 条
  • [1] Detecting cyber-physical threats in an autonomous robotic vehicle using Bayesian Networks
    Bezemskij, Anatolij
    Loukas, George
    Gan, Diane
    Anthony, Richard J.
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2017, : 98 - 103
  • [2] The structure and dynamics of multilayer networks
    Boccaletti, S.
    Bianconi, G.
    Criado, R.
    del Genio, C. I.
    Gomez-Gardenes, J.
    Romance, M.
    Sendina-Nadal, I.
    Wang, Z.
    Zanin, M.
    [J]. PHYSICS REPORTS-REVIEW SECTION OF PHYSICS LETTERS, 2014, 544 (01): : 1 - 122
  • [3] An Overview of Data Quality Frameworks
    Cichy, Corinna
    Rass, Stefan
    [J]. IEEE ACCESS, 2019, 7 : 24634 - 24648
  • [4] Data Quality Management Framework for Smart Grid Systems
    Ge, Mouzhi
    Chren, Stanislav
    Rossi, Bruno
    Pitner, Tomas
    [J]. BUSINESS INFORMATION SYSTEMS, BIS 2019, PT II, 2019, 354 : 299 - 310
  • [5] Real-Time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning-Based Intelligent Mechanism
    He, Youbiao
    Mendis, Gihan J.
    Wei, Jin
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2017, 8 (05) : 2505 - 2516
  • [6] Jacq O, 2018, 2018 2ND CYBER SECURITY IN NETWORKING CONFERENCE (CSNET)
  • [7] Kavallieratos Georgios, 2019, Computer Security. ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018. Revised Selected Papers: Lecture Notes in Computer Science (LNCS 11387), P20, DOI 10.1007/978-3-030-12786-2_2
  • [8] Laso PM, 2017, DATA BRIEF, V14, P186, DOI 10.1016/j.dib.2017.07.038
  • [9] Laso Pedro Merino, 2016, INT C SENS SYST SOFT, P105
  • [10] Deep learning in bioinformatics
    Min, Seonwoo
    Lee, Byunghan
    Yoon, Sungroh
    [J]. BRIEFINGS IN BIOINFORMATICS, 2017, 18 (05) : 851 - 869