Safety-critical cyber-physical attacks: analysis, detection, and mitigation

Today's cyber-physical systems (CPSs) can have very different characteristics in terms of control algorithms, configurations, underlying infrastructure, communication protocols, and real-time requirements. Despite these variations, they all face the threat of malicious attacks that exploit the vulnerabilities in the cyber domain as footholds to introduce safety violations in the physical processes. In this paper, we focus on a class of attacks that impact the physical processes without introducing anomalies in the cyber domain. We present the common challenges in detecting this type of attacks in the contexts of two very different CPSs (i.e., power grids and surgical robots). In addition, we present a general principle for detecting such cyber-physical attacks, which combine the knowledge of both cyber and physical domains to estimate the adverse consequences of malicious activities in a timely manner.

[1]  S. Shankar Sastry,et al.  Research Challenges for the Security of Control Systems , 2008, HotSec.

[2]  Haibo He,et al.  Resilience Analysis of Power Grids Under the Sequential Attack , 2014, IEEE Transactions on Information Forensics and Security.

[3]  Haibo He,et al.  Supplementary File : Revealing Cascading Failure Vulnerability in Power Grids using Risk-Graph , 2013 .

[4]  Morgan Quigley,et al.  ROS: an open-source Robot Operating System , 2009, ICRA 2009.

[5]  David K. Y. Yau,et al.  Optimal False Data Injection Attack against Automatic Generation Control in Power Grids , 2016, 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS).

[6]  Ravishankar K. Iyer,et al.  Adapting Bro into SCADA: building a specification-based intrusion detection system for the DNP3 protocol , 2013, CSIIRW '13.

[7]  Lang Tong,et al.  Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.

[8]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[9]  I. Dobson,et al.  Risk Assessment of Cascading Outages: Methodologies and Challenges , 2012, IEEE Transactions on Power Systems.

[10]  Carl A. Gunter,et al.  Cumulative Attestation Kernels for Embedded Systems , 2009, IEEE Transactions on Smart Grid.

[11]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[12]  Blake Hannaford,et al.  Raven-II: An Open Platform for Surgical Robotics Research , 2013, IEEE Transactions on Biomedical Engineering.

[13]  Sandip Roy,et al.  Power System Extreme Event Detection: The Vulnerability Frontier , 2007, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).

[14]  Réka Albert,et al.  Structural vulnerability of the North American power grid. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[15]  Blake Hannaford,et al.  Plugfest 2009: Global interoperability in Telerobotics and telemedicine , 2010, 2010 IEEE International Conference on Robotics and Automation.

[16]  Klara Nahrstedt,et al.  Detecting False Data Injection Attacks on DC State Estimation , 2010 .

[17]  Blake Hannaford,et al.  The RAVEN: Design and Validation of a Telesurgery System , 2009, Int. J. Robotics Res..

[18]  A. Bose,et al.  Reactive Power Considerations in Automatic Contingency Selection , 1982, IEEE Transactions on Power Apparatus and Systems.

[19]  Ulf Lindqvist,et al.  Using Model-based Intrusion Detection for SCADA Networks , 2006 .

[20]  Bruno Sinopoli,et al.  Integrity Data Attacks in Power Market Operations , 2011, IEEE Transactions on Smart Grid.

[21]  Ravishankar K. Iyer,et al.  Runtime Semantic Security Analysis to Detect and Mitigate Control-Related Attacks in Power Grids , 2018, IEEE Transactions on Smart Grid.

[22]  P. Hines,et al.  Do topological models provide good information about electricity infrastructure vulnerability? , 2010, Chaos.

[23]  Thenkurussi Kesavadas,et al.  Targeted Attacks on Teleoperated Surgical Robots: Dynamic Model-Based Detection and Mitigation , 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[24]  Abdullah Abusorrah,et al.  Bilevel Model for Analyzing Coordinated Cyber-Physical Attacks on Power Systems , 2016, IEEE Transactions on Smart Grid.