首页 > 最新文献

Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy最新文献

英文 中文
Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy 2018网络物理系统安全与隐私研讨会论文集
{"title":"Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy","authors":"","doi":"10.1145/3264888","DOIUrl":"https://doi.org/10.1145/3264888","url":null,"abstract":"","PeriodicalId":247918,"journal":{"name":"Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy","volume":"7 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134126949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Session details: Session 2: Intrusion and Anomaly detection 会话详细信息:会话2:入侵和异常检测
A. Cárdenas
{"title":"Session details: Session 2: Intrusion and Anomaly detection","authors":"A. Cárdenas","doi":"10.1145/3285936","DOIUrl":"https://doi.org/10.1145/3285936","url":null,"abstract":"","PeriodicalId":247918,"journal":{"name":"Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114962464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Autonomous Cyber-Physical Systems Through Verifiable Information Flow Control 通过可验证的信息流控制来保护自主网络物理系统
Pub Date : 2018-01-15 DOI: 10.1145/3264888.3264889
Jed Liu
Modern cyber-physical systems are complex networked computing systems that electronically control physical systems. Autonomous road vehicles are an important and increasingly ubiquitous instance. Unfortunately, their increasing complexity often leads to security vulnerabilities. Network connectivity exposes these vulnerable systems to remote software attacks that can result in real-world physical damage, including vehicle crashes and loss of control authority. We introduce an integrated architecture to provide provable security and safety assurance for cyber-physical systems by ensuring that safety-critical operations and control cannot be unintentionally affected by potentially malicious parts of the system. Fine-grained information flow control is used to design both hardware and software, determining how low-integrity information can affect high-integrity control decisions. This security assurance is used to improve end-to-end security across the entire cyber-physical system. We demonstrate this integrated approach by developing a mobile robotic testbed modeling a self-driving system and testing it with a malicious attack.
现代信息物理系统是复杂的网络计算系统,以电子方式控制物理系统。自动驾驶汽车是一个重要且越来越普遍的例子。不幸的是,它们日益增加的复杂性常常导致安全漏洞。网络连接使这些易受攻击的系统暴露在远程软件攻击之下,从而导致现实世界的物理损坏,包括车辆碰撞和失去控制权。我们引入了一个集成架构,通过确保安全关键操作和控制不会无意中受到系统潜在恶意部分的影响,为网络物理系统提供可证明的安全性和安全保障。细粒度信息流控制用于设计硬件和软件,确定低完整性信息如何影响高完整性控制决策。这种安全保证用于提高整个网络物理系统的端到端安全性。我们通过开发一个移动机器人测试平台来演示这种集成方法,该平台对自动驾驶系统进行建模,并对其进行恶意攻击测试。
{"title":"Secure Autonomous Cyber-Physical Systems Through Verifiable Information Flow Control","authors":"Jed Liu","doi":"10.1145/3264888.3264889","DOIUrl":"https://doi.org/10.1145/3264888.3264889","url":null,"abstract":"Modern cyber-physical systems are complex networked computing systems that electronically control physical systems. Autonomous road vehicles are an important and increasingly ubiquitous instance. Unfortunately, their increasing complexity often leads to security vulnerabilities. Network connectivity exposes these vulnerable systems to remote software attacks that can result in real-world physical damage, including vehicle crashes and loss of control authority. We introduce an integrated architecture to provide provable security and safety assurance for cyber-physical systems by ensuring that safety-critical operations and control cannot be unintentionally affected by potentially malicious parts of the system. Fine-grained information flow control is used to design both hardware and software, determining how low-integrity information can affect high-integrity control decisions. This security assurance is used to improve end-to-end security across the entire cyber-physical system. We demonstrate this integrated approach by developing a mobile robotic testbed modeling a self-driving system and testing it with a malicious attack.","PeriodicalId":247918,"journal":{"name":"Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114836278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Science Hackathons for Cyberphysical System Security Research: Putting CPS testbed platforms to good use 网络物理系统安全研究的科学黑客马拉松:善用CPS测试平台
Pub Date : 2018-01-15 DOI: 10.1145/3264888.3264897
S. Foley, F. Autrel, Edwin Bourget, Thomas Clédel, Stephane Grunenwald, José Rubio-Hernán, Alexandre Kabil, Raphaël M. J. I. Larsen, V. Rooney, Kirsten Vanhulst
A challenge is to develop cyber-physical system scenarios that reflect the diversity and complexity of real-life cyber-physical systems in the research questions that they address. Time-bounded collaborative events, such as hackathons, jams and sprints, are increasingly used as a means of bringing groups of individuals together, in order to explore challenges and develop solutions. This paper describes our experiences, using a science hackathon to bring individual researchers together, in order to develop a common use-case implemented on a shared CPS testbed platform that embodies the diversity in their own security research questions. A qualitative study of the event was conducted, in order to evaluate the success of the process, with a view to improving future similar events.
一个挑战是开发网络物理系统场景,反映现实生活中网络物理系统的多样性和复杂性,在他们解决的研究问题。有时间限制的协作活动,如黑客马拉松、果酱和冲刺,越来越多地被用作将个人群体聚集在一起的一种手段,以探索挑战并制定解决方案。本文描述了我们的经验,利用科学黑客马拉松将个人研究人员聚集在一起,以开发一个在共享的CPS测试平台上实现的通用用例,体现了他们自己的安全研究问题的多样性。对这一事件进行了定性研究,以评价这一进程的成功,以期改进今后类似的事件。
{"title":"Science Hackathons for Cyberphysical System Security Research: Putting CPS testbed platforms to good use","authors":"S. Foley, F. Autrel, Edwin Bourget, Thomas Clédel, Stephane Grunenwald, José Rubio-Hernán, Alexandre Kabil, Raphaël M. J. I. Larsen, V. Rooney, Kirsten Vanhulst","doi":"10.1145/3264888.3264897","DOIUrl":"https://doi.org/10.1145/3264888.3264897","url":null,"abstract":"A challenge is to develop cyber-physical system scenarios that reflect the diversity and complexity of real-life cyber-physical systems in the research questions that they address. Time-bounded collaborative events, such as hackathons, jams and sprints, are increasingly used as a means of bringing groups of individuals together, in order to explore challenges and develop solutions. This paper describes our experiences, using a science hackathon to bring individual researchers together, in order to develop a common use-case implemented on a shared CPS testbed platform that embodies the diversity in their own security research questions. A qualitative study of the event was conducted, in order to evaluate the success of the process, with a view to improving future similar events.","PeriodicalId":247918,"journal":{"name":"Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123669942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
ACE: Advanced CIP Evaluator ACE:高级CIP评估员
Pub Date : 2018-01-15 DOI: 10.1145/3264888.3264891
Kiel Gordon, M. Davis, Zachary Birnbaum, A. Dolgikh
Industrial control systems (ICS) are key enabling systems that drive the productivity and efficiency of omnipresent industries such as power, gas, water treatment, transportation, and manufacturing. These systems consist of interconnected components that communicate over industrial networks using industrial protocols such as the Common Industrial Protocol (CIP). CIP is one of the most commonly used network-based process control protocols, and utilizes an object-oriented communication structure for device to device interaction. Due to this object-oriented structure, CIP communication reveals detailed information about the devices, the communication patterns, and the system, providing an in-depth view of the system. The details from this in-depth system perspective can be utilized as part of a system cybersecurity or discovery approach. However, due to the variety of commands, corresponding parameters, and variable layer structure of the CIP network layer, processing this layer is a challenging task. This paper presents a tool, Advanced CIP Evaluator (ACE), which passively processes the CIP communication layer and automatically extracts device, communication, and system information from observed network traffic. ACE was tested and verified using a representative ICS power generation testbed. Since ACE operates passively, without generating any network traffic of its own, system operations are not disturbed. This novel tool provides ICS information, such as networked devices, communication patterns, and system operation, at a depth and breadth that is unique compared with other known tools.
工业控制系统(ICS)是推动电力、天然气、水处理、运输和制造业等无处不在的行业的生产力和效率的关键支持系统。这些系统由相互连接的组件组成,这些组件通过工业网络使用通用工业协议(CIP)等工业协议进行通信。CIP是最常用的基于网络的过程控制协议之一,它利用面向对象的通信结构实现设备间的交互。由于这种面向对象的结构,CIP通信揭示了有关设备、通信模式和系统的详细信息,从而提供了系统的深入视图。从这个深入的系统角度获得的细节可以用作系统网络安全或发现方法的一部分。然而,由于CIP网络层的命令种类繁多,相应参数多变,层结构多变,对该层的处理是一项具有挑战性的任务。本文提出了一种先进的CIP评估器(Advanced CIP Evaluator, ACE),它可以被动地处理CIP通信层,并从观察到的网络流量中自动提取设备、通信和系统信息。采用具有代表性的ICS发电试验台对ACE进行了测试和验证。由于ACE是被动运行的,它自己不产生任何网络流量,所以系统运行不会受到干扰。这种新颖的工具提供ICS信息,如网络设备、通信模式和系统操作,其深度和广度与其他已知工具相比是独一无二的。
{"title":"ACE: Advanced CIP Evaluator","authors":"Kiel Gordon, M. Davis, Zachary Birnbaum, A. Dolgikh","doi":"10.1145/3264888.3264891","DOIUrl":"https://doi.org/10.1145/3264888.3264891","url":null,"abstract":"Industrial control systems (ICS) are key enabling systems that drive the productivity and efficiency of omnipresent industries such as power, gas, water treatment, transportation, and manufacturing. These systems consist of interconnected components that communicate over industrial networks using industrial protocols such as the Common Industrial Protocol (CIP). CIP is one of the most commonly used network-based process control protocols, and utilizes an object-oriented communication structure for device to device interaction. Due to this object-oriented structure, CIP communication reveals detailed information about the devices, the communication patterns, and the system, providing an in-depth view of the system. The details from this in-depth system perspective can be utilized as part of a system cybersecurity or discovery approach. However, due to the variety of commands, corresponding parameters, and variable layer structure of the CIP network layer, processing this layer is a challenging task. This paper presents a tool, Advanced CIP Evaluator (ACE), which passively processes the CIP communication layer and automatically extracts device, communication, and system information from observed network traffic. ACE was tested and verified using a representative ICS power generation testbed. Since ACE operates passively, without generating any network traffic of its own, system operations are not disturbed. This novel tool provides ICS information, such as networked devices, communication patterns, and system operation, at a depth and breadth that is unique compared with other known tools.","PeriodicalId":247918,"journal":{"name":"Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132803087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
CORGIDS: A Correlation-based Generic Intrusion Detection System corgid:一个基于关联的通用入侵检测系统
Pub Date : 2018-01-15 DOI: 10.1145/3264888.3264893
Ekta Aggarwal, Mehdi Karimibiuki, K. Pattabiraman, A. Ivanov
Cyber-physical systems (CPS) consist of software and physical components which are knitted together and interact with each other continuously. CPS have been targets of security attacks due to their safety-critical nature and relative lack of protection. Specification based intrusion detection systems (IDS) using data, temporal, data temporal and time, and logical correlations have been proposed in the past. But none of the approaches except the ones using logical correlations take into account the main ingredient in the operation of CPS, namely the use of physical properties. On the other hand, IDS that use physical properties either require the developer to define invariants manually, or have designed their IDS for a specific CPS. This paper proposes CORGIDS, a generic IDS capable of detecting security attacks by inferring the logical correlations of the physical properties of a CPS, and checking if they adhere to the predefined framework. We build a CORGIDS-based prototype and demonstrate its use for detecting attacks in the two CPS. We find that CORGIDS achieves a precision of 95.70%, and a recall of 87.90%, with modest memory and performance overheads.
信息物理系统(CPS)由软件和物理组件组成,它们编织在一起并不断相互作用。由于其安全关键的性质和相对缺乏保护,CPS一直是安全攻击的目标。过去已经提出了基于规范的入侵检测系统(IDS),该系统使用数据、时间、数据时间和时间以及逻辑相关性。但是,除了使用逻辑相关性的方法外,其他方法都没有考虑到CPS操作中的主要成分,即物理性质的使用。另一方面,使用物理属性的IDS要么要求开发人员手动定义不变量,要么为特定的CPS设计IDS。本文提出了CORGIDS,一种能够通过推断CPS物理属性的逻辑相关性并检查它们是否遵循预定义框架来检测安全攻击的通用IDS。我们构建了一个基于corgid的原型,并演示了它在两个CPS中检测攻击的用途。我们发现CORGIDS的准确率为95.70%,召回率为87.90%,内存和性能开销适中。
{"title":"CORGIDS: A Correlation-based Generic Intrusion Detection System","authors":"Ekta Aggarwal, Mehdi Karimibiuki, K. Pattabiraman, A. Ivanov","doi":"10.1145/3264888.3264893","DOIUrl":"https://doi.org/10.1145/3264888.3264893","url":null,"abstract":"Cyber-physical systems (CPS) consist of software and physical components which are knitted together and interact with each other continuously. CPS have been targets of security attacks due to their safety-critical nature and relative lack of protection. Specification based intrusion detection systems (IDS) using data, temporal, data temporal and time, and logical correlations have been proposed in the past. But none of the approaches except the ones using logical correlations take into account the main ingredient in the operation of CPS, namely the use of physical properties. On the other hand, IDS that use physical properties either require the developer to define invariants manually, or have designed their IDS for a specific CPS. This paper proposes CORGIDS, a generic IDS capable of detecting security attacks by inferring the logical correlations of the physical properties of a CPS, and checking if they adhere to the predefined framework. We build a CORGIDS-based prototype and demonstrate its use for detecting attacks in the two CPS. We find that CORGIDS achieves a precision of 95.70%, and a recall of 87.90%, with modest memory and performance overheads.","PeriodicalId":247918,"journal":{"name":"Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115084152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Session details: Session 4: Industrial Control and SCADA Systems 会议详情:会议4:工业控制和SCADA系统
R. Bobba
{"title":"Session details: Session 4: Industrial Control and SCADA Systems","authors":"R. Bobba","doi":"10.1145/3285938","DOIUrl":"https://doi.org/10.1145/3285938","url":null,"abstract":"","PeriodicalId":247918,"journal":{"name":"Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129602284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Temporal Phase Shifts in SCADA Networks SCADA网络中的时间相移
Pub Date : 2018-01-15 DOI: 10.1145/3264888.3264898
Chen Markman, A. Wool, A. Cárdenas
In Industrial Control Systems (ICS/SCADA), machine to machine data traffic is highly periodic. Previous work showed that in many cases, it is possible to create an automata-based model of the traffic between each individual Programmable Logic Controller (PLC) and the SCADA server, and to use the model to detect anomalies in the traffic. When testing the validity of previous models, we noticed that overall, the models have difficulty in dealing with communication patterns that change over time. In this paper we show that in many cases the traffic exhibits phases in time, where each phase has a unique pattern, and the transition between the different phases is rather sharp. We suggest a method to automatically detect traffic phase shifts, and a new anomaly detection model that incorporates multiple phases of the traffic. Furthermore we present a new sampling mechanism for training set assembly, which enables the model to learn all phases during the training stage with lower complexity. The model presented has similar accuracy and much less permissiveness compared to the previous general Deterministic Finite Automata (DFA) model. Moreover, the model can provide the operator with information about the state of the controlled process at any given time, as seen in the traffic phases.
在工业控制系统(ICS/SCADA)中,机器到机器的数据流量是高度周期性的。先前的工作表明,在许多情况下,可以创建每个可编程逻辑控制器(PLC)和SCADA服务器之间的基于自动机的流量模型,并使用该模型检测流量中的异常情况。在测试以前模型的有效性时,我们注意到,总的来说,这些模型在处理随时间变化的通信模式方面存在困难。在本文中,我们证明了在许多情况下,交通在时间上呈现阶段性,其中每个阶段都有一个独特的模式,并且不同阶段之间的过渡相当尖锐。我们提出了一种自动检测流量相移的方法,以及一种包含多阶段流量的新的异常检测模型。此外,我们提出了一种新的训练集集合采样机制,使模型能够以较低的复杂度学习训练阶段的所有阶段。该模型与以往的一般确定性有限自动机(DFA)模型相比具有相似的精度和更小的容错性。此外,该模型可以在任何给定时间为操作员提供有关被控制过程状态的信息,如在流量阶段中所见。
{"title":"Temporal Phase Shifts in SCADA Networks","authors":"Chen Markman, A. Wool, A. Cárdenas","doi":"10.1145/3264888.3264898","DOIUrl":"https://doi.org/10.1145/3264888.3264898","url":null,"abstract":"In Industrial Control Systems (ICS/SCADA), machine to machine data traffic is highly periodic. Previous work showed that in many cases, it is possible to create an automata-based model of the traffic between each individual Programmable Logic Controller (PLC) and the SCADA server, and to use the model to detect anomalies in the traffic. When testing the validity of previous models, we noticed that overall, the models have difficulty in dealing with communication patterns that change over time. In this paper we show that in many cases the traffic exhibits phases in time, where each phase has a unique pattern, and the transition between the different phases is rather sharp. We suggest a method to automatically detect traffic phase shifts, and a new anomaly detection model that incorporates multiple phases of the traffic. Furthermore we present a new sampling mechanism for training set assembly, which enables the model to learn all phases during the training stage with lower complexity. The model presented has similar accuracy and much less permissiveness compared to the previous general Deterministic Finite Automata (DFA) model. Moreover, the model can provide the operator with information about the state of the controlled process at any given time, as seen in the traffic phases.","PeriodicalId":247918,"journal":{"name":"Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123526861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Specification-based State Replication Approach for Digital Twins 基于规范的数字孪生状态复制方法
Pub Date : 2018-01-15 DOI: 10.1145/3264888.3264892
Matthias Eckhart, Andreas Ekelhart
Digital twins play a key role in realizing the vision of a smart factory. While this concept is often associated with maintenance, optimization, and simulation, digital twins can also be leveraged to enhance the security and safety of cyber-physical systems (CPSs). In particular, digital twins can run in parallel to a CPS, allowing to perform a security and safety analysis during operation without the risk of disrupting live systems. However, replicating states of physical devices within a CPS in functionally equivalent virtual replicas, so that they precisely mirror the internal behavior of their counterparts, is an open research topic. In this paper, we propose a novel state replication approach that first identifies stimuli based on the system's specification and then replicates them in a virtual environment. We believe that replicating states of CPSs is a prerequisite for a multitude of security and safety enhancing features that can be implemented on the basis of digital twins. To demonstrate the feasibility of the specification-based state replication approach, we provide a prototypical implementation and evaluate it in an experimental CPS test bed. The results of this paper show that attacks against CPSs can be successfully detected by leveraging the proposed state replication approach.
数字孪生体在实现智能工厂愿景方面发挥着关键作用。虽然这个概念通常与维护、优化和模拟相关联,但数字孪生也可以用来增强网络物理系统(cps)的安全性。特别是,数字孪生可以与CPS并行运行,允许在运行期间执行安全和安全分析,而不会有中断运行系统的风险。然而,在功能等效的虚拟副本中复制CPS内物理设备的状态,以便它们精确地反映其对应对象的内部行为,是一个开放的研究课题。在本文中,我们提出了一种新的状态复制方法,该方法首先根据系统的规格识别刺激,然后在虚拟环境中复制它们。我们认为,复制cps的状态是在数字孪生的基础上实现大量安全性和安全性增强功能的先决条件。为了证明基于规范的状态复制方法的可行性,我们提供了一个原型实现,并在实验CPS测试台上对其进行了评估。本文的结果表明,利用所提出的状态复制方法可以成功检测针对cps的攻击。
{"title":"A Specification-based State Replication Approach for Digital Twins","authors":"Matthias Eckhart, Andreas Ekelhart","doi":"10.1145/3264888.3264892","DOIUrl":"https://doi.org/10.1145/3264888.3264892","url":null,"abstract":"Digital twins play a key role in realizing the vision of a smart factory. While this concept is often associated with maintenance, optimization, and simulation, digital twins can also be leveraged to enhance the security and safety of cyber-physical systems (CPSs). In particular, digital twins can run in parallel to a CPS, allowing to perform a security and safety analysis during operation without the risk of disrupting live systems. However, replicating states of physical devices within a CPS in functionally equivalent virtual replicas, so that they precisely mirror the internal behavior of their counterparts, is an open research topic. In this paper, we propose a novel state replication approach that first identifies stimuli based on the system's specification and then replicates them in a virtual environment. We believe that replicating states of CPSs is a prerequisite for a multitude of security and safety enhancing features that can be implemented on the basis of digital twins. To demonstrate the feasibility of the specification-based state replication approach, we provide a prototypical implementation and evaluate it in an experimental CPS test bed. The results of this paper show that attacks against CPSs can be successfully detected by leveraging the proposed state replication approach.","PeriodicalId":247918,"journal":{"name":"Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131566558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
Detecting Cyber Attacks in Industrial Control Systems Using Convolutional Neural Networks 利用卷积神经网络检测工业控制系统中的网络攻击
Pub Date : 2018-01-15 DOI: 10.1145/3264888.3264896
Moshe Kravchik, A. Shabtai
This paper presents a study on detecting cyber attacks on industrial control systems (ICS) using convolutional neural networks. The study was performed on a Secure Water Treatment testbed (SWaT) dataset, which represents a scaled-down version of a real-world industrial water treatment plant. We suggest a method for anomaly detection based on measuring the statistical deviation of the predicted value from the observed value. We applied the proposed method by using a variety of deep neural network architectures including different variants of convolutional and recurrent networks. The test dataset included 36 different cyber attacks. The proposed method successfully detected 31 attacks with three false positives thus improving on previous research based on this dataset. The results of the study show that 1D convolutional networks can be successfully used for anomaly detection in industrial control systems and outperform recurrent networks in this setting. The findings also suggest that 1D convolutional networks are effective at time series prediction tasks which are traditionally considered to be best solved using recurrent neural networks. This observation is a promising one, as 1D convolutional neural networks are simpler, smaller, and faster than the recurrent neural networks.
本文提出了一种基于卷积神经网络的工业控制系统网络攻击检测方法。该研究是在安全水处理试验台(SWaT)数据集上进行的,该数据集代表了现实世界工业水处理厂的缩小版。我们提出了一种基于测量预测值与观测值的统计偏差的异常检测方法。我们通过使用各种深度神经网络架构(包括卷积和循环网络的不同变体)来应用所提出的方法。测试数据集包括36种不同的网络攻击。该方法成功检测了31次攻击,其中有3次假阳性,从而改进了先前基于该数据集的研究。研究结果表明,一维卷积网络可以成功地用于工业控制系统中的异常检测,并且在这种情况下优于循环网络。研究结果还表明,一维卷积网络在时间序列预测任务中是有效的,而这些任务通常被认为是使用循环神经网络最好的解决方案。这个观察结果很有前途,因为1D卷积神经网络比循环神经网络更简单、更小、更快。
{"title":"Detecting Cyber Attacks in Industrial Control Systems Using Convolutional Neural Networks","authors":"Moshe Kravchik, A. Shabtai","doi":"10.1145/3264888.3264896","DOIUrl":"https://doi.org/10.1145/3264888.3264896","url":null,"abstract":"This paper presents a study on detecting cyber attacks on industrial control systems (ICS) using convolutional neural networks. The study was performed on a Secure Water Treatment testbed (SWaT) dataset, which represents a scaled-down version of a real-world industrial water treatment plant. We suggest a method for anomaly detection based on measuring the statistical deviation of the predicted value from the observed value. We applied the proposed method by using a variety of deep neural network architectures including different variants of convolutional and recurrent networks. The test dataset included 36 different cyber attacks. The proposed method successfully detected 31 attacks with three false positives thus improving on previous research based on this dataset. The results of the study show that 1D convolutional networks can be successfully used for anomaly detection in industrial control systems and outperform recurrent networks in this setting. The findings also suggest that 1D convolutional networks are effective at time series prediction tasks which are traditionally considered to be best solved using recurrent neural networks. This observation is a promising one, as 1D convolutional neural networks are simpler, smaller, and faster than the recurrent neural networks.","PeriodicalId":247918,"journal":{"name":"Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123881849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 208
期刊
Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1