Security challenges and methods for protecting critical infrastructure cyber-physical systems
Title | Security challenges and methods for protecting critical infrastructure cyber-physical systems |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Taylor, J. M., Sharif, H. R. |
Conference Name | 2017 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT) |
Date Published | May 2017 |
Publisher | IEEE |
ISBN Number | 978-1-5090-4977-6 |
Keywords | agent based game theoretic, attack tree, Communication networks, compositionality, Computer crime, confidentiality, covert channels, covert communications channel, CPS system, critical infrastructure cyber-physical systems, critical infrastructures, cyber attackers, cyber-physical adversary, cyber-physical attackers, Cyber-physical systems, denial of service, industrial control systems, information assurance, information technology systems, integrated circuits, integrity, Modbus, Protocols, pubcrawl, replay, Resiliency, Scalability, security, security of data, Sensors, weak information security applications |
Abstract | Cyber-Physical Systems (CPS) represent a fundamental link between information technology (IT) systems and the devices that control industrial production and maintain critical infrastructure services that support our modern world. Increasingly, the interconnections among CPS and IT systems have created exploitable security vulnerabilities due to a number of factors, including a legacy of weak information security applications on CPS and the tendency of CPS operators to prioritize operational availability at the expense of integrity and confidentiality. As a result, CPS are subject to a number of threats from cyber attackers and cyber-physical attackers, including denial of service and even attacks against the integrity of the data in the system. The effects of these attacks extend beyond mere loss of data or the inability to access information system services. Attacks against CPS can cause physical damage in the real world. This paper reviews the challenges of providing information assurance services for CPS that operate critical infrastructure systems and industrial control systems. These methods are thorough measures to close integrity and confidentiality gaps in CPS and processes to highlight the security risks that remain. This paper also outlines approaches to reduce the overhead and complexity for security methods, as well as examine novel approaches, including covert communications channels, to increase CPS security. |
URL | http://ieeexplore.ieee.org/document/8045959/ |
DOI | 10.1109/MoWNet.2017.8045959 |
Citation Key | taylor_security_2017 |
- denial of service
- weak information security applications
- sensors
- security of data
- security
- Scalability
- Resiliency
- replay
- pubcrawl
- Protocols
- Modbus
- integrity
- integrated circuits
- information technology systems
- Information Assurance
- Industrial Control Systems
- agent based game theoretic
- cyber-physical systems
- cyber-physical attackers
- cyber-physical adversary
- cyber attackers
- critical infrastructures
- critical infrastructure cyber-physical systems
- CPS system
- covert communications channel
- covert channels
- confidentiality
- Computer crime
- Compositionality
- Communication networks
- attack tree