Assessing the Severity of Smart Attacks in Industrial Cyber-Physical Systems

Industrial cyber-physical systems (ICPS) are heterogeneous inter-operating parts that can be physical, technical, networking, and even social like agent operators. Incrementally, they perform a central role in critical and industrial infrastructures, governmental, and personal daily life. Especially with the Industry 4.0 revolution, they became more dependent on the connectivity by supporting novel communication and distance control functionalities, which expand their attack surfaces that result in a high risk for cyber-attacks. Furthermore, regarding physical and social constraints, they may push up new classes of security breaches that might result in serious economic damages. Thus, designing a secure ICPS is a complex task, since this needs to guarantee security and harmonize the functionalities between the various parts that interact with different technologies. This article highlights the significance of cyber-security infrastructure and shows how to evaluate, prevent, and mitigate ICPS-based cyber-attacks. We carried out this objective by establishing an adequate semantics for ICPS’s entities and their composition, which includes social actors that act differently than mobile robots and automated processes. This article also provides the feasible attacks generated by a reinforcement learning mechanism based on multiple criteria that selects both appropriate actions for each ICPS component and the possible countermeasures for mitigation. To efficiently analyze ICPS’s security, we proposed a model-checking-based framework that relies on a set of predefined attacks from where the security requirements are used to assess how well the model is secure. Finally, to show the effectiveness of the proposed solution, we model, analyze, and evaluate the ICPS security on two real use cases.

[1]  Sridhar Adepu,et al.  Generalized Attacker and Attack Models for Cyber Physical Systems , 2016, 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC).

[2]  Rajeev Alur,et al.  Principles of Cyber-Physical Systems , 2015 .

[3]  Samir Ouchani,et al.  Ensuring the Functional Correctness of IoT through Formal Modeling and Verification , 2018, MEDI.

[4]  Nils Ole Tippenhauer,et al.  On Attacker Models and Profiles for Cyber-Physical Systems , 2016, ESORICS.

[5]  Qusay H. Mahmoud,et al.  Cyber physical systems security: Analysis, challenges and solutions , 2017, Comput. Secur..

[6]  Samir Ouchani,et al.  Security analysis of socio-technical physical systems , 2015, Comput. Electr. Eng..

[7]  Samir Ouchani,et al.  Generating attacks in SysML activity diagrams by detecting attack surfaces , 2015, J. Ambient Intell. Humaniz. Comput..

[8]  Aditya P. Mathur,et al.  Aligning Cyber-Physical System Safety and Security , 2014, CSDM Asia.

[9]  Jiexin Zhang,et al.  Modeling cyber-physical attacks based on probabilistic colored Petri nets and mixed-strategy game theory , 2017, Int. J. Crit. Infrastructure Prot..

[10]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[11]  Soummya Kar,et al.  Dynamic Attack Detection in Cyber-Physical Systems With Side Initial State Information , 2015, IEEE Transactions on Automatic Control.

[12]  Ing-Ray Chen,et al.  Modeling and Analysis of Attacks and Counter Defense Mechanisms for Cyber Physical Systems , 2016, IEEE Transactions on Reliability.

[13]  Nils Ole Tippenhauer,et al.  CPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions , 2016, ICFEM.

[14]  Marie-Laure Potet,et al.  Generation of Applicative Attacks Scenarios Against Industrial Systems , 2017, FPS.

[15]  K. G. Srinivasa,et al.  Cyber-Physical Systems: A Computational Perspective , 2015 .

[16]  William H. Sanders,et al.  Determining Tolerable Attack Surfaces that Preserves Safety of Cyber-Physical Systems , 2018, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC).

[17]  Ee-Chien Chang,et al.  Poster: Physics-Based Attack Detection for an Insider Threat Model in a Cyber-Physical System , 2018, AsiaCCS.