Analysis of Cyber Physical Systems Security via Networked Attacks
Title | Analysis of Cyber Physical Systems Security via Networked Attacks |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Ge, H., Yue, D., p Xie, X., Deng, S., Zhang, Y. |
Conference Name | 2017 36th Chinese Control Conference (CCC) |
Keywords | actuator security, actuators, Analytical models, closed-loop security control structure, composability, computer network security, Cyber Attacks, cyber physical systems, cyber physical systems security, Cyber-physical systems, defense functions, denial-of-service, DoS, Human Behavior, information disclosure, Iron, man-in-the-middle attack, Mathematical model, Metrics, MITM, networked attacks, Networked Control System, networked control systems, pubcrawl, resilience, Resiliency, security, Security Control, security of data, security perspective, Stealth Attack, system security conditions, telecommunication security, Telecommunications, unified models |
Abstract | In this paper, cyber physical system is analyzed from security perspective. A double closed-loop security control structure and algorithm with defense functions is proposed. From this structure, the features of several cyber attacks are considered respectively. By this structure, the models of information disclosure, denial-of-service (DoS) and Man-in-the-Middle Attack (MITM) are proposed. According to each kind attack, different models are obtained and analyzed, then reduce to the unified models. Based on this, system security conditions are obtained, and a defense scenario with detail algorithm is design to illustrate the implementation of this program. |
URL | http://ieeexplore.ieee.org/document/8028028/ |
DOI | 10.23919/ChiCC.2017.8028028 |
Citation Key | ge_analysis_2017 |
- security
- Metrics
- MITM
- networked attacks
- Networked Control System
- networked control systems
- pubcrawl
- resilience
- Resiliency
- Mathematical model
- Security Control
- security of data
- security perspective
- Stealth Attack
- system security conditions
- telecommunication security
- Telecommunications
- unified models
- cyber-physical systems
- actuators
- Analytical models
- closed-loop security control structure
- composability
- computer network security
- Cyber Attacks
- cyber physical systems
- Cyber Physical Systems Security
- actuator security
- defense functions
- Denial-of-Service
- DoS
- Human behavior
- information disclosure
- Iron
- man-in-the-middle attack