A Framework of Cyber-Security Protection for Warship Systems

Warship systems which belong to cyber-physical systems (CPSs) are facing severe cyber security challenges with the adoption of large amount of Information Technology. Security events happened in warship systems can cause serious consequences, such as death of person, destruction of warship and even the failure of the war, which are quite different from IT systems. This paper proposes a comprehensive resilient security protection framework which combines static security protection and dynamic security protection after analyzing warship systems security situation. In the framework, some prevention and isolation techniques are used for static protection to reinforce the security, and a close-loop based security protection with ability of intrusion tolerance is achieved for dynamic protection to realize active defense. This framework contributes to warship security design for designers and promote warship cyber security against cyber attacks.

[1]  Edward A. Lee Cyber Physical Systems: Design Challenges , 2008, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).

[2]  Lin Hai-tao Study on Security & Secrecy Demand of Ship Communication System , 2011 .

[3]  Richard G. Bensing An Assessment of Vulnerabilities for Ship-based Control Systems , 2009 .

[4]  Chen Hui,et al.  Study on the Architecture of Intelligent Warship's TSCE Based on Multi-view , 2014, 2014 13th International Symposium on Distributed Computing and Applications to Business, Engineering and Science.

[5]  Naixue Xiong,et al.  Anomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communications , 2014, Inf. Sci..

[6]  Yves Deswarte,et al.  Intrusion tolerance in distributed computing systems , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[7]  Shi Jianchen Study on the Security Protection for Warship Electronic Information Systems , 2012 .

[8]  Hans Liwång,et al.  Risk-based ship security analysis : a decision-support approach , 2015 .

[9]  Barbara Kordy,et al.  Attack-defense trees , 2014, J. Log. Comput..

[10]  Arthur K. Cebrowski,et al.  Network-Centric Warfare: Its Origin and Future , 1998 .

[11]  Marco R. Spruit,et al.  Designing a Secure Cloud Architecture: The SeCA Model , 2012, Int. J. Inf. Secur. Priv..