Toward Detection and Attribution of Cyber-Attacks in IoT-enabled Cyber-physical Systems

Author(s):  
Amir Namavar Jahromi ◽  
Hadis Karimipour ◽  
Ali Dehghantanha ◽  
Kim-Kwang Raymond Choo
Complexity ◽  
2019 ◽  
Vol 2019 ◽  
pp. 1-14 ◽  
Author(s):  
Shen Yan ◽  
Sing Kiong Nguang ◽  
Liruo Zhang

This article studies the problem of nonfragile integral-based event-triggered control for uncertain cyber-physical systems under cyber-attacks. An integral-based event-triggered scheme is proposed to reduce the data transmissions and save the limited network resources. The triggering condition is related to the mean of system state over a finite time interval instead of instant system state. Random cyber-attacks in a communication channel are taken into account and described by a stochastic variable subject to Bernoulli distribution. A novel Lyapunov–Krasovskii functional based on Legendre polynomials is constructed, and the Bessel–Legendre inequality technique is employed to handle the integral term induced by the integral-based event-triggered scheme. Resorting to these treatments, sufficient conditions are established via a set of linear matrix inequalities to guarantee the asymptotic mean-square stability of the closed-loop system. Finally, a numerical example shows that the presented method is effective.


Author(s):  
Bradley Potteiger ◽  
William Emfinger ◽  
Himanshu Neema ◽  
Xenofon Koutosukos ◽  
CheeYee Tang ◽  
...  

Author(s):  
Володимир Якович Певнев ◽  
Володимир Володимирович Торяник ◽  
Вячеслав Сергійович Харченко

The subject of this study is the radio frequency cyber vulnerability of information and control interaction technology in the wireless smart systems (WSS). WSS is the cyber-physical systems, that operate within the OSI model. The specificity and specialization of these systems are determined by radio technologies of the physical layer. For example, the Internet of Things (IoT, including medical IoMT), the Internet of Drones (IoD), systems for aviation monitoring ADS-B and traffic management ATM, and, in the future, the Internet of Everything (IoE) - all are types of WSS. The aim is to analyze the radio frequency parameters of information and control interaction in the WSS to identify possible radio frequency cyber vulnerabilities in the WSS. Objectives: summarize and systematize the physical and functional parameters of wireless technologies in the ISM (Industrial Scientific & Medical Band) and SRD (Short range devices) ranges, which are significant from the WSS radiofrequency cyber vulnerability perspective, including navigation technologies; analyze trends and methods of successful cyber attacks on the WSS; carry out expert assessments of potential WSSs cyber vulnerabilities depending on their architecture and application area. The methods used: analysis of trends in known radiofrequency incidents and expert assessments of the cyber vulnerability of the WSS information and control interaction channels. The following results were obtained: 12 actual WSS radio technologies were analyzed. 6 types of possible radio frequency cyber attacks on the WSS were typified. The expert assessment of the probability of exploiting vulnerabilities by ranges, radio technologies, and attack type was made. The special danger of high-tech targeted APT attacks, as well as the high potential radio vulnerability of cyber-physical systems, was shown. The cyber vulnerability of ADS-B aircraft systems was especially noted. Conclusions. The scientific novelty of the results obtained is as follows: a trend of APT attacks cost reduction and an increase in the probability of their implementation through the new capabilities of SDR technology (Software Defined Radio) were revealed. The possibility of a controlled SDR compromising of the security parameters of WSS channels in any radio range was shown. A promising direction of research was proposed - SDR-penetration testing of WSS.


Author(s):  
Qinxue Li ◽  
Bugong Xu ◽  
Shanbin Li ◽  
Yonggui Liu ◽  
Xuhuan Xie

Owing to the deep integration of the information and communication technologies, power cyber-physical systems (CPSs) have become smart but are vulnerable to cyber attacks. To correctly assess the vulnerability of power CPSs and further study feasible countermeasures, we verify that a data-driven target attack on a nonlinear Granger causality graph (NGCG) can be constructed successfully, even if adversaries cannot acquire the configuration information of the systems. A NGCG is a unified framework for the processing and analysis of nonlinear measurement data or datasets and can be used to evaluate the significance of power nodes or lines. In addition, an algorithm including data-driven parameter estimation, noise removal and data reconstruction based on symplectic geometry is introduced to make the NGCG a parameter-free and noise-tolerant method. In particular, three new indexes on the weight analysis of the NGCG are defined to quantitatively evaluate the significance of power nodes or lines. Finally, several case studies of a nonlinear simulation model and power systems in detail verify the effectiveness and superiority of the proposed data-driven target attack. The results show the proposed target attack can select the key attack targets more accurately and lead to physical system collapse with the least number of attack steps.


Author(s):  
Karrar Hameed Abdulkareem ◽  
Nabeel Salih Ali ◽  
Zaheera Zainal Abidin ◽  
Rabiah Ahmad ◽  
MOHAMMED NASSER AL MHIQANI

Sign in / Sign up

Export Citation Format

Share Document