Assessing the Physical Impact of Cyberattacks on Industrial Cyber-Physical Systems

被引:110
作者
Huang, Kaixing [1 ]
Zhou, Chunjie [1 ]
Tian, Yu-Chu [2 ]
Yang, Shuanghua [3 ,4 ]
Qin, Yuanqing [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Automat, Key Lab Minist Educ Image Proc & Intelligent Cont, Wuhan 430074, Hubei, Peoples R China
[2] Queensland Univ Technol, Sch Elect Engn & Comp Sci, Brisbane, Qld 4001, Australia
[3] Southern Univ Sci & Technol, Dept Comp Sci & Engn, Shenzhen 518000, Peoples R China
[4] Loughborough Univ, Dept Comp Sci, Loughborough LE11 3TU, Leics, England
基金
美国国家科学基金会;
关键词
Bayesian; industrial cyber-physical system (ICPS); risk assessment; security; stochastic hybrid system (SHS); SECURITY; SAFETY;
D O I
10.1109/TIE.2018.2798605
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Industrial cyber-physical systems (ICPSs) are widely applied in critical infrastructures such as chemical plants, water distribution networks, and power grids. However, they face various cyberattacks, whichmay cause physical damage to these industrial facilities. Therefore, ensuring the security of ICPSs is of paramount importance. For this purpose, a new risk assessment method is presented in this paper to quantify the impact of cyberattacks on the physical system of ICPSs. This method helps carry out appropriate attack mitigation measures. The method uses a Bayesian network to model the attack propagation process and infers the probabilities of sensors and actuators to be compromised. These probabilities are fed into a stochastic hybrid system (SHS) model to predict the evolution of the physical process being controlled. Then, the security risk is quantified by evaluating the system availability with the SHS model. The effectiveness of the proposed method is demonstrated with a case study on a hardware-in-the-loop simulation test bed.
引用
收藏
页码:8153 / 8162
页数:10
相关论文
共 23 条
[11]   False sequential logic attack on SCADA system and its physical impact analysis [J].
Li, Weize ;
Xie, Lun ;
Deng, Zulan ;
Wang, Zhiliang .
COMPUTERS & SECURITY, 2016, 58 :149-159
[12]   Cybersecurity in Distributed Power Systems [J].
Li, Zhiyi ;
Shahidehpour, Mohammad ;
Aminifar, Farrokh .
PROCEEDINGS OF THE IEEE, 2017, 105 (07) :1367-1388
[13]   On Hybrid State Estimation for Stochastic Hybrid Systems [J].
Liu, Weiyi ;
Hwang, Inseok .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (10) :2615-2628
[14]   Common vulnerability, scoring system [J].
Mell, Peter ;
Scarfone, Karen ;
Romanosky, Sasha .
IEEE SECURITY & PRIVACY, 2006, 4 (06) :85-89
[15]   A Survey of Intrusion Detection Techniques for Cyber-Physical Systems [J].
Mitchell, Robert ;
Chen, Ing-Ray .
ACM COMPUTING SURVEYS, 2014, 46 (04)
[16]   Learning Bayesian network parameters from small data sets: application of Noisy-OR gates [J].
Onisko, A ;
Druzdzel, MJ ;
Wasyluk, H .
INTERNATIONAL JOURNAL OF APPROXIMATE REASONING, 2001, 27 (02) :165-182
[17]  
Orojloo Hamed., 2015, 2015 CSI Symposium on Real-Time and Embedded Systems and Technologies (RTEST), P1
[18]   Dynamic Security Risk Management Using Bayesian Attack Graphs [J].
Poolsappasit, Nayot ;
Dewri, Rinku ;
Ray, Indrajit .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (01) :61-74
[19]  
Shin J., 2016, NUCL ENG TECHNOL, V49, P296
[20]   Analysis and control of a nonlinear boiler-turbine unit [J].
Tan, W ;
Marquez, HJ ;
Chen, TW ;
Liu, JZ .
JOURNAL OF PROCESS CONTROL, 2005, 15 (08) :883-891