Enhancing attack resilience of cyber-physical systems through state dependency graph models
نویسندگان
چکیده
Abstract This paper presents a method that utilizes graph theory and state modelling algorithms to perform automatic complexity analysis of the architecture cyber-physical systems (CPS). It describes cyber physical risk assessment (CPSRA), tool provide decision support for enhancing overall resilience CPS architectures often used in critical infrastructures. CPRSA is built enhance industrial improve against malicious attacks on domain can affect processes, which distributed environment. Such compromise execution states components lead hazards or even disasters through plant malfunction. CPSRA tested real-world testbed model large SCADA system infused with CVE vulnerabilities some its components. The creates an isomorphic process uses network analytics test cyber-attacks evaluate attack aspects. tool’s output then pinpoint high-complexity terms influence suggest mitigation points security measure implementation while considering every potential subattack path subliminal model’s graph. complements standardized reports contributes infrastructure environments be as basis dependencies threat propagation larger digital twins, need outlined major NIST publications concerning was previously done manually, without insight into vulnerability influences.
منابع مشابه
Analytic Dependency Loops in Architectural Models of Cyber-Physical Systems
Rigorous engineering of safety-critical CyberPhysical Systems (CPS) requires integration of heterogeneous modeling methods from different disciplines. It is often necessary to view this integration from the perspective of analyses – algorithms that read and change models. Although such analytic integration supports formal contract-based verification of model evolution, it suffers from the limit...
متن کاملEnhancing Security in Cyber Physical Systems through Policy based Trust Management against Deception Attack
The World is moving towards invisible computers, Ubiquitous Computing (any information everywhere), Pervasive Computing (which combines current network technology with wireless computing), Ambient Intelligence (which refers to electronic environments that are sensitive and responsive to the presence of people), and Traditional Embedded System (which is a closed system, not only in the sense of ...
متن کاملResilience through Learning in Multi-Agent Cyber-Physical Systems
The paper contributes to the design of secure and resilient supervisory Cyber-Physical Systems (CPS) through learning. The reported approach involves the inclusion of learning modules in each of the supervised agents, and considers a scenario where the system’s coordinator privately transmits to individual agents their action plans in the form of symbolic strings. Each agent’s plans belong in s...
متن کاملEnhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs
In this work, we provide an evaluation of the fitness of a cipher implementation for automated, low overhead, Side Channel Attack (SCA) countermeasure insertion through instruction re-scheduling. This evaluation is automated by means of an extension to the Clang/LLVM compiler framework and is thus amenable to be performed on a generic cipher implementation in C.
متن کاملEnhancing Resilience through Cyber Incident Data Sharing and Analysis
This document outlines the benefits of a trusted cyber incident data repository that enterprise risk owners and insurers could use to anonymously share sensitive cyber incident data and is the first in a series of white papers. This paper outlines the potential benefits of a trusted cyber incident data repository that enterprise risk owners and insurers could use to anonymously share, store, ag...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Information Security
سال: 2023
ISSN: ['1615-5262', '1615-5270']
DOI: https://doi.org/10.1007/s10207-023-00731-w