Metagames and Hypergames for Deception-Robust Control

2021 ◽  
Vol 5 (3) ◽  
pp. 1-25
Author(s):  
Craig Bakker ◽  
Arnab Bhattacharya ◽  
Samrat Chatterjee ◽  
Draguna L. Vrabie

Increasing connectivity to the Internet for remote monitoring and control has made cyber-physical systems more vulnerable to deliberate attacks; purely cyber attacks can thereby have physical consequences. Long-term, stealthy attacks such as Stuxnet can be described as Advanced Persistent Threats (APTs). Here, we extend our previous work on hypergames and APTs to develop hypergame-based defender strategies that are robust to deception and do not rely on attack detection. These strategies provide provable bounds—and provably optimal bounds—on the attacker payoff. Strategies based on Bayesian priors do not provide such bounds. We then numerically demonstrate our approach on a building control subsystem and discuss next steps in extending this approach toward an operational capability.

2015 ◽  
Vol 762 ◽  
pp. 255-260 ◽  
Author(s):  
Mircea Murar ◽  
Stelian Brad

In the context of latest technological revolution, Industry 4.0, connectivity and therefore access and control of cyber-physical systems and resources from any place, at any time by any means represent a technological enabler of crucial importance. The first part of this paperwork contains a brief introduction of cyber-physical systems and IoT concepts, together with a review of major IoT providers. The second part introduces an approach towards achieving connectivity and remote control of task selection for a dual-arm industrial robot using a commercially available IoT infrastructure and technology provided by ioBridge. Within the third part, details about experimental testing and evaluation of the selected solutions are presented. The last part is allocated for conclusions and further research directions.


2017 ◽  
Vol 3 (02) ◽  
pp. 176-195
Author(s):  
I Made Marthana Yusa ◽  
Laksminta Rukmi

AbstrakMerkuri adalah salah satu jenis logam berat yang banyak ditemukan di alam dan tersebar dalam batuan, tanah, air dan udara sebagai senyawa anorganik dan organik. Merkuri dapat dimanfaatkan dalam berbagai bidang industri, salah satunya industri emas. Pengelolaan limbah hasil industri pengolahan emas yang tidak sesuai dengan prosedur yang baik dan benar akan menyebabkan pencemaran lingkungan. Merkuri yang telah mengontaminasi lingkungan dalam jangka waktu panjang akan membawa dampak buruk bagi kesehatan manusia yang sering berinteraksi dengan bahan merkuri ini. Dalam penelitian ini, dilakukan perancangan video berbasis animasi 2 dimensi, sebagai salah satu rekomendasi solusi edukasi, untuk pencegahan dampak kesehatan, akibat pencemaran lingkungan oleh merkuri di Lombok Tengah. Dari hasil penelitian didapatkan fakta bahwa responden yang terdiri dari staf Konservasi dan Sumber Daya Alam serta staf Pengawasan dan Pengendalian Lingkungan Kantor Lingkungan Hidup Kabupaten Lombok Tengah menilai video edukasi berbasis animasi 2 dimensi yang dihasilkan sangat baik dari segi desain maupun penyampaian informasinya. Video ini juga bermanfaat untuk mengedukasi masyarakat penambang emas di Lombok Tengah agar lebih mewaspadai merkuri dan bahayanya, juga menghargai kesehatan diri dan keselamatan kerja. Kata Kunci: Animasi 2 Dimensi, Bahaya Merkuri, Merkuri, Metil Merkuri, Video Edukasi AbstractMercury is one of the heavy metals found in nature and spread in rocks, soil, water and air as inorganic and organic compounds. Mercury can be utilized in various industrial fields, one of which is the gold industry. Waste management of gold processing industry that is not in accordance with good and correct procedures will cause environmental pollution. Mercury that has been contaminating the environment over the long term will have adverse effects on human health that often interact with these mercury ingredients. A 2-dimensional animation based video has been designed in this research, as one recommendation of educational solution, for the prevention of health impact, due to environmental pollution by mercury in Central Lombok. From the research results obtained the fact that respondents consisting of staff Conservation and Natural Resources and staff of Environmental Monitoring and Control Environment Office of Lombok Tengah District assessed 2-dimensional animation based animation videos produced very well in terms of design and delivery of information. This video is also useful to educate the gold miners community in Central Lombok to be more aware of mercury and its dangers, also appreciate the Occupational Health and Safety. Keywords: 2 Dimensional Animation, Mercury, Methyl Mercury, Educational Video


Telecom ◽  
2021 ◽  
Vol 2 (4) ◽  
pp. 536-553
Author(s):  
Lin-Shen Liew ◽  
Giedre Sabaliauskaite ◽  
Nandha Kumar Kandasamy ◽  
Choong-Yew William Wong

Cyber-Physical Systems (CPSs) are getting increasingly complex and interconnected. Consequently, their inherent safety risks and security risks are so intertwined that the conventional analysis approaches which address them separately may be rendered inadequate. STPA (Systems-Theoretic Process Analysis) is a top-down hazard analysis technique that has been incorporated into several recently proposed integrated Safety and Security (S&S) analysis methods. This paper presents a novel methodology that leverages not only STPA, but also custom matrices to ensure a more comprehensive S&S analysis. The proposed methodology is demonstrated using a case study of particular commercial cloud-based monitoring and control system for residential energy storage systems.


2021 ◽  
Vol 8 (1) ◽  
Author(s):  
Amir Mohammadzade Lajevardi ◽  
Morteza Amini

AbstractTargeted cyber attacks, which today are known as Advanced Persistent Threats (APTs), use low and slow patterns to bypass intrusion detection and alert correlation systems. Since most of the attack detection approaches use a short time-window, the slow APTs abuse this weakness to escape from the detection systems. In these situations, the intruders increase the time of attacks and move as slowly as possible by some tricks such as using sleeper and wake up functions and make detection difficult for such detection systems. In addition, low APTs use trusted subjects or agents to conceal any footprint and abnormalities in the victim system by some tricks such as code injection and stealing digital certificates. In this paper, a new solution is proposed for detecting both low and slow APTs. The proposed approach uses low-level interception, knowledge-based system, system ontology, and semantic correlation to detect low-level attacks. Since using semantic-based correlation is not applicable for detecting slow attacks due to its significant processing overhead, we propose a scalable knowledge-based system that uses three different concepts and approaches to reduce the time complexity including (1) flexible sliding window called Vermiform window to analyze and correlate system events instead of using fixed-size time-window, (2) effective inference using a scalable inference engine called SANSA, and (3) data reduction by ontology-based data abstraction. We can detect the slow APTs whose attack duration is about several months. Evaluation of the proposed approach on a dataset containing many APT scenarios shows 84.21% of sensitivity and 82.16% of specificity.


Author(s):  
Володимир Якович Певнев ◽  
Володимир Володимирович Торяник ◽  
Вячеслав Сергійович Харченко

The subject of this study is the radio frequency cyber vulnerability of information and control interaction technology in the wireless smart systems (WSS). WSS is the cyber-physical systems, that operate within the OSI model. The specificity and specialization of these systems are determined by radio technologies of the physical layer. For example, the Internet of Things (IoT, including medical IoMT), the Internet of Drones (IoD), systems for aviation monitoring ADS-B and traffic management ATM, and, in the future, the Internet of Everything (IoE) - all are types of WSS. The aim is to analyze the radio frequency parameters of information and control interaction in the WSS to identify possible radio frequency cyber vulnerabilities in the WSS. Objectives: summarize and systematize the physical and functional parameters of wireless technologies in the ISM (Industrial Scientific & Medical Band) and SRD (Short range devices) ranges, which are significant from the WSS radiofrequency cyber vulnerability perspective, including navigation technologies; analyze trends and methods of successful cyber attacks on the WSS; carry out expert assessments of potential WSSs cyber vulnerabilities depending on their architecture and application area. The methods used: analysis of trends in known radiofrequency incidents and expert assessments of the cyber vulnerability of the WSS information and control interaction channels. The following results were obtained: 12 actual WSS radio technologies were analyzed. 6 types of possible radio frequency cyber attacks on the WSS were typified. The expert assessment of the probability of exploiting vulnerabilities by ranges, radio technologies, and attack type was made. The special danger of high-tech targeted APT attacks, as well as the high potential radio vulnerability of cyber-physical systems, was shown. The cyber vulnerability of ADS-B aircraft systems was especially noted. Conclusions. The scientific novelty of the results obtained is as follows: a trend of APT attacks cost reduction and an increase in the probability of their implementation through the new capabilities of SDR technology (Software Defined Radio) were revealed. The possibility of a controlled SDR compromising of the security parameters of WSS channels in any radio range was shown. A promising direction of research was proposed - SDR-penetration testing of WSS.


2019 ◽  
Vol 2019 ◽  
pp. 1-13 ◽  
Author(s):  
Gyujin Na ◽  
Hanbit Lee ◽  
Yongsoon Eun

Stealthy attacks to cyber-physical systems (CPS) refer to the ones that avoid attack detection mechanisms augmented to the systems typically in the form of anomaly detectors. Various types of stealthy attacks have been reported in the literature. Among the attacks with stealthy property, a recently reported multiplicative coordinated attack is particularly dangerous in that it corrupts sensor and actuator data in a coordinated manner, and it does not require precise system knowledge in order to be stealthy. It must be noted that most of these attacks are applicable to CPS, the physical counterparts of which are of linear dynamics. This could be a limitation since most of the physical dynamic systems that are encountered from CPS perspective are of nonlinear nature. In this work, we present a version of multiplicative coordinated stealthy attack for a class of CPS, the physical counterpart of which possesses nonlinear dynamics. Specifically, for the physical systems with homogeneous property, the attack is constructed and the effect is analyzed. Various simulations are carried out to illustrate the effect of the attack.


Author(s):  
Aminat AJIBOLA ◽  
Innocent UJATA ◽  
Oluwasegun ADELAIYE ◽  
Noorihan Abdul RAHMAN

Cyber threats have been an issue of great concern since the advent of the information (computer and internet) age. But of greater concern is the most recent class of threats, known as Advanced Persistent Threats (APTs). It has drawn increasing attention all over the world, from researchers, and the industrial security sector. APTs are sophisticated cyber-attacks executed by sophisticated and well-resourced adversaries targeting specific information in companies and government. APT is a long-term campaign involving different steps. This form of attack if successful has significant implications to countries and large organizations, which may be from financial to reputational damage. This work presents a comprehensive study on APT, characterizing its uniqueness and attack model, and analyzing techniques commonly seen in APT attacks. On evaluating mitigation effects proposed and developed by researches, the use of a multiple mitigation methods shows good signs in detecting and preventing APT. Anomaly detection and dynamic analysis show high accuracy levels in detecting APT. This work also highlights and recommends security tips as well as methods of implementing countermeasures that can help to mitigate APTs, thereby giving directions for future research.


Zoosymposia ◽  
2016 ◽  
Vol 10 (1) ◽  
pp. 393-397
Author(s):  
LIDIA SIBIRINA ◽  
ALLA AKATKINA ◽  
ANNA SKRIPTZOVA ◽  
TATYANA VSHIVKOVA

Public environmental monitoring and control of fresh waters in Primorsky Territory has been conducted since 2003 when the "Clean Water" Scientific-Public Coordination Center was created. The long-term program of water protection in the Russian Far East was formulated in compliance with the Russian Clean Water Project in 2003. The network of more than 60 public ecological agencies (PEAs) was coordinated through the Clean Water Center in which the trained teachers, schoolchildren, students and amateurs conducted research on the ecological condition of regional freshwater resources and studied the biodiversity of the unique biota of Primorye. The results of this public work are compatible with activities of professional scientists and state environmental agencies.


Sign in / Sign up

Export Citation Format

Share Document