Autonomous mitigation of cyber risks in the Cyber-Physical Systems

被引:47
作者
Kholidy, Hisham A. [1 ]
机构
[1] State Univ New York SUNY Polytech Inst, Coll Engn, Dept Networks & Comp Secur NCS, Utica, NY 13502 USA
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2021年 / 115卷
关键词
Cyberattacks; CPS security; Risk mitigation; Self-protection; Autonomous intrusion response;
D O I
10.1016/j.future.2020.09.002
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Cyber-Physical Systems (CPS) attacks and vulnerabilities are increasing and the consequences of such attacks can be catastrophic. The CPS needs to be self-resilient to cyber-attacks through a precise autonomous and timely risk mitigation model that can analyze and assess the risk of the CPS and apply a proper response strategy against the ongoing attacks. There is a limited amount of work on the self-protection of the cyber risks in the CPS. This paper contributes toward the need of advanced security approaches to respond against the attacks across the CPS in an autonomous way, with or without including a system administrator in the loop for troubleshooting based on the criticality of the CPS asset that can be protected, once the alert about a possible intrusion has been raised. To this end, this paper augments our existing security framework with an Autonomous Response Controller (ARC). ARC uses our quantitative Hierarchical Risk Correlation Tree (HRCT) that models the paths an attacker can traverse to reach certain goals and measures the financial risk that the CPS assets face from cyber-attacks. ARC also uses a Competitive Markov Decision Process (CMDP) to model the security reciprocal interaction between the protection system and the attacker/adversary as a multi-step, sequential, two player stochastic game in which each player tries to maximize his/her benefit. The experiments' results depict that the accuracy of ARC outperforms the traditional Static Intrusion Response System (S-IRS) by 43.61%. To experimentally test and validate ARC in real-time large-scale data, we run the Aurora attack to open the generator breaker in our testbed to create a cascading failure and voltage collapse. ARC was able to recover the CPS system and provide a timely response in less than 6 s. We compared the output of ARC against the current state of the art, the Suricata intrusion response system. ARC was able to mitigate the single line to ground (SLG) attacks and recover the CPS to its normal state in 122 s before Suricata does. (c) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页码:171 / 187
页数:17
相关论文
共 44 条
[31]  
Morris T., 2012, P 45 IEEE HAW INT C
[32]   An intrusion response decision-making model based on hierarchical task network planning [J].
Mu, Chengpo ;
Li, Yingjiu .
EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (03) :2465-2472
[33]  
Murphy K., 2002, MARKOV DECISION PROC
[34]   Usable Global Network Access Policy for Process Control Systems [J].
Nicol, David M. ;
Sanders, William H. ;
Singh, Sankalp ;
Seri, Mouna .
IEEE SECURITY & PRIVACY, 2008, 6 (06) :30-36
[35]   Towards automated incident handling: How to select an appropriate response against a network-based attack? [J].
Ossenbuehl, Sven ;
Steinberger, Jessica ;
Baier, Harald .
2015 NINTH INTERNATIONAL CONFERENCE ON IT SECURITY INCIDENT MANAGEMENT & IT FORENSICS (IMF), 2015, :51-67
[36]  
Rakaczky E., 2007, PROCESS CONTROL SYST
[37]  
Roesch M, 1999, USENIX ASSOCIATION PROCEEDINGS OF THE THIRTEENTH SYSTEMS ADMINISTRATION CONFERENCE (LISA XIII), P229
[38]  
Shameli-Sendi A., 2015, J NETW COMPUT APPL
[39]   Modeling Cyber-Physical Vulnerability of the Smart Grid With Incomplete Information [J].
Srivastava, Anurag ;
Morris, Thomas ;
Ernster, Timothy ;
Vellaithurai, Ceeman ;
Pan, Shengyi ;
Adhikari, Uttam .
IEEE TRANSACTIONS ON SMART GRID, 2013, 4 (01) :235-244
[40]   Cost-sensitive model for preemptive intrusion response systems [J].
Stakhanova, Natalia ;
Basu, Samik ;
Wong, Johnny .
21ST INTERNATIONAL CONFERENCE ON ADVANCED NETWORKING AND APPLICATIONS, PROCEEDINGS, 2007, :428-+