Vulnerability of Traffic Control System under Cyber- Attacks Using Falsified Data
نویسندگان
چکیده
Existing traffic control systems are mostly deployed in private wired networks. With the development of wireless technology, vehicles and infrastructure devices will be connected through wireless communications, which might open a new door for cyber attackers. It is still not clear what types of cyber-attacks can be performed through infrastructure-toinfrastructure (I2I) and vehicle-to-infrastructure (V2I) communications, whether such attacks can introduce critical failure to the system, and what impacts of cyber-attacks on traffic operations are. This paper investigates the vulnerability of traffic control system in a connected environment, where four typical elements including signal controllers, vehicle detectors, roadside units (RSUs), and onboard units (OBUs) are identified as the attack surfaces. The paper mainly focuses on attacking actuated and adaptive signal control systems by sending falsified data, which is considered as an indirect but realistic attack approach. The objective of an attacker is to maximize system delay with constraints such as budget and attack intensity. Empirical results show that different attack scenarios result in significant differences regarding delay and some ineffective attacks may even improve the system performance. Simulation results from a real world corridor show that critical intersections, which has a higher impact on congestion, can be identified by analyzing the attack locations. Identification of such intersections can be helpful in designing a more resilient transportation network.
منابع مشابه
Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کاملResilient Configuration of Distribution System versus False Data Injection Attacks Against State Estimation
State estimation is used in power systems to estimate grid variables based on meter measurements. Unfortunately, power grids are vulnerable to cyber-attacks. Reducing cyber-attacks against state estimation is necessary to ensure power system safe and reliable operation. False data injection (FDI) is a type of cyber-attack that tampers with measurements. This paper proposes network reconfigurati...
متن کاملAvoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کاملEXPOSE the Line Failures following a Cyber-Physical Attack on the Power Grid
Recent attacks on power grids demonstrated the vulnerability of the grids to cyber and physical attacks. To analyze this vulnerability, we study cyber-physical attacks that affect both the power grid physical infrastructure and its underlying Supervisory Control And Data Acquisition (SCADA) system. We assume that an adversary attacks an area by: (i) disconnecting some lines within that area, an...
متن کاملA Early Detection of Cyber Security Threats using Structured Behavior Modeling
The rapid evolution of network intrusions has rendered traditional Intrusion Detection Systems (IDS) insufficient for cyber attacks such as the Advanced Persistent Threats (APT), which are sophisticated and enduring network intrusion campaigns comprising multiple imperceptible steps of malicious cyber activities. Dealing with such elaborated network intrusions calls for novel and more proactive...
متن کامل