1,476 Hits in 6.0 sec

System-Aware Cyber Security

Rick A. Jones, Barry Horowitz
2011 2011 Eighth International Conference on Information Technology: New Generations  
+ Verifiable Voting for trans-attack attack deflection • Physical Configuration Hopping for moving target defense • Virtual Configuration Hopping for moving target defense • Data Consistency Checking  ...  , Restoral) Automatic Control * Physical Control for Configuration Hopping (Moving Target, Restoral) * State Estimation Techniques (Data Integrity) * System Identification (Data Integrity  ... 
doi:10.1109/itng.2011.158 dblp:conf/itng/JonesH11 fatcat:fnkows5qjfdbzglzv5qiff6pmm

Defense as a Service Cloud for Cyber-Physical Systems

Mohamed Azab, Mohamed Eltoweissy
2011 Proceedings of the 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing  
In this paper, we present CyPhyCARD (Cooperative Autonomous Resilient Defense "CARD" platform for Cyber Physical Systems) as a resilient and secure defense cloud.  ...  a moving target defense.  ...  .] • Cyber security is oblivious of and is not coordinated with physical security to protect the target cyber-physical system. Human intervention is need to facilitate such coordination.  ... 
doi:10.4108/icst.collaboratecom.2011.247118 dblp:conf/colcom/AzabE11 fatcat:oaucgz457rdjroarroz7rn4aea

VERCASM-CPS: Vulnerability Analysis and Cyber Risk Assessment for Cyber-Physical Systems

Bradley Northern, Trey Burks, Marlana Hatcher, Michael Rogers, Denis Ulybyshev
2021 Information  
We also integrate the CPS cyber risk analysis with a Controlled Moving Target Defense, which either replaces the vulnerable CPS components or re-configures the CPS to harden it, while the vulnerable components  ...  Since Cyber-Physical Systems (CPS) are widely used in critical infrastructures, it is essential to protect their assets from cyber attacks to increase the level of security, safety and trustworthiness,  ...  Acknowledgments: We thank the Department of Computer Science and Cyber Education Research and Outreach Center (CEROC) at Tennessee Technological University for providing funds and resources for this project  ... 
doi:10.3390/info12100408 fatcat:lzxq32uh3vbtbjpvq3msw6eqty

Security and Science of Agility

Patrick McDaniel, Srikanth V. Krishnamurthy, Iulian Neamtiu, Trent Jaeger, Thomas F. La Porta, Nicolas Papernot, Robert J. Walls, Alexander Kott, Lisa Marvel, Ananthram Swami, Prasant Mohapatra
2014 Proceedings of the First ACM Workshop on Moving Target Defense - MTD '14  
This paper details a recently launched 10-year Cyber-Security Collaborative Research Alliance effort focused in-part on the development of a new science of system agility, of which moving target defenses  ...  Moving target defenses alter the environment in response to adversarial action and perceived threats.  ...  Research was sponsored by the Army Research Laboratory and was accomplished under Cooperative Agreement Number W911NF-13-2-0045 (ARL Cyber Security CRA).  ... 
doi:10.1145/2663474.2663476 dblp:conf/ccs/McDanielJPPWKMS14 fatcat:ng3usp3wabeo5au6mzloefloby

Control Challenges for Resilient Control Systems [article]

Quanyan Zhu
2021 arXiv   pre-print
Hence the resiliency issues for control systems need to be addressed by integrating the cyber resiliency with the physical layer resiliency.  ...  The main challenge for control systems is its cyber-physical system nature which strongly couples the cyber systems with physical layer dynamics.  ...  Despite the effort in developing cyber defense for control systems, the perfect security is not always achievable.  ... 
arXiv:2001.00712v2 fatcat:tkvaoe7ehnab5gv3z73i7e27fq

Cyber Resiliency Engineering Overview of the Architectural Assessment Process

Deborah J. Bodeau, Richard D. Graubart, Ellen R. Laderman
2014 Procedia Computer Science  
Internal consistency / coordination: How consistently and with how much coordination are cyber defenses, and supporting security controls managed in a given administrative span of control?  ...  Computer Network Defense plans, Cyber Courses of Actions (CCoA) or cyber playbooks Describes processes, procedures, and cyber resources used in those processes for cyber defense.  ... 
doi:10.1016/j.procs.2014.03.100 fatcat:zoses3erbjbivg26tdrpmf6uvy

On Moving Target Techniques for Network Defense Security

Shouq Mohsen Alnemari, Sabah M Alzahrani
2021 International journal of recent technology and engineering  
This paper conducts a comprehensive study to cover the following aspects of moving target defense, characteristics of target attacks and its limitation, classifications of defense types, major methodologies  ...  The moving target defense idea appeared as a preemptive protect mechanism aimed at preventing attacks.  ...  Put, these technologies switch systems into moving targets difficult for cyber scoundrels to hit.  ... 
doi:10.35940/ijrte.e5111.019521 fatcat:stts5i22abfvzpcf3cawvjvpmy

Cross-layer security framework for smart grid: Physical security layer

Mohammed M. Farag, Mohamed Azab, Bassem Mokhtar
2014 IEEE PES Innovative Smart Grid Technologies, Europe  
CyNetPhy tightly integrates and coordinates between three interrelated, and highly cooperative real-time security systems crossing section various layers of the grid cyber and physical domains to simultaneously  ...  We describe an attack scenario raising the emerging hardware Trojan threat in process control systems (PCSes) and its novel PSL resolution leveraging the model predictive control principles.  ...  INTRODUCTION The smart grid is a cyber-physical system that tightly integrates control, computation, and communication technologies in the electrical power infrastructure.  ... 
doi:10.1109/isgteurope.2014.7028963 fatcat:yb2v7gm5e5cfrlvxpek7jb6tye

Control Systems Cyber Security Reference Architecture (RA) for Critical Infrastructure: Healthcare and Hospital Vertical Example

Aleksandra Scalco, David Flanigan, Steven Simske
2021 Journal of Critical Infrastructure Policy  
security requirements for control systems.  ...  (COTS) and Government-Off-The-Shelf (GOTS) components to form a control system cyber defensive solution.  ...  Acknowledgments and Funding Aspects of this research are being used to fulfill the requirements for a Systems Engineering PhD at Colorado State University.  ... 
doi:10.18278/jcip.2.2.7 fatcat:luyxtwdjxzasxeakc2emm2wpfe

Optimal Strategy for Cyberspace Mimic Defense Based on Game Theory

Zequan Chen, Gang Cui, Lin Zhang, Xin Yang, Hui Li, Yan Zhao, Chengtao Ma, Tao Sun
2021 IEEE Access  
The main research direction is cyber security defense in depth of electrcial power monitoring system for nuclear power station, prevention and control strategy, network security supervisory and so on.  ...  The cyberspace security defense mechanisms include honeynets [13] , moving target defense [1] , obfuscation [14] , perturbations [15] [16] and cyberspace mimic defense [2] .  ... 
doi:10.1109/access.2021.3077075 fatcat:xo5m3pfuwrdebgpe26ordqvwky

Cyber-Physical System Security and Impact Analysis

Alexandru Stefanov, Chen-Ching Liu
2014 IFAC Proceedings Volumes  
A testbed architecture provides an accurate and powerful tool for identification of cyber-physical system vulnerabilities, security enhancement, impact analysis, and mitigation of cyber attacks.  ...  They are increasingly dependent on Information and Communication Technologies (ICTs) for the operation and control of physical facilities.  ...  National Science Foundation, "Collaborative Research: Resiliency Against Coordinated Cyber Attacks on Power Grid." EECS-1202229.  ... 
doi:10.3182/20140824-6-za-1003.00528 fatcat:y2hizvpimvaztikqv3q3weezqa

Cloud-Based Cyber Physical Systems: Design Challenges and Security Needs

Yenumula B. Reddy
2014 2014 10th International Conference on Mobile Ad-hoc and Sensor Networks  
The cyber-physical systems are the combination of computational elements and physical entities that can interact with humans through many modalities.  ...  The research in cyberphysical systems is in its initial stage. Therefore, first we discussed the status of security in cloud cyber-physical systems.  ...  Current technology is trying to integrate cyber capabilities into every physical process including ecommerce, automation, defense, flight control, and facilities in daily life.  ... 
doi:10.1109/msn.2014.50 dblp:conf/msn/Reddy14 fatcat:morqoyy3vvgxhnpyugnggdadiu

A moving target defense approach for protecting resource-constrained distributed devices

Valentina Casola, Alessandra De Benedictis, Massimiliano Albanese
2013 2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)  
Techniques aimed at continuously changing a system's attack surface, usually referred to as Moving Target Defense (MTD), are emerging as powerful tools for thwarting cyber attacks.  ...  Such mechanisms increase the uncertainty, complexity, and cost for attackers, limit the exposure of vulnerabilities, and ultimately increase overall resiliency.  ...  This approach to cyber defense is generally referred to as Moving Target Defense (MTD), and it is currently considered one of the game-changing themes in cyber security by the Executive Office of the President  ... 
doi:10.1109/iri.2013.6642449 dblp:conf/iri/CasolaBA13 fatcat:o3shtvxnrfbkbjufnmlozvy6gi

Agent-based cyber control strategy design for resilient control systems: Concepts, architecture and methodologies

Craig Rieger, Quanyan Zhu, Tamer Basar
2012 2012 5th International Symposium on Resilient Control Systems  
The resulting strategy will provide a framework for researching solutions to security and unrecognized interdependency concerns with industrial control systems.  ...  A similar approach is proposed for cyber security, where current border-protection designs have been inherited from information technology developments that lack consideration of the high-reliability,  ...  Department of Energy under DOE Idaho Operations Office Contract DE-AC07-05ID14517, performed as part of the Instrumentation, Control, and Intelligent Systems (ICIS) Distinctive Signature of Idaho National  ... 
doi:10.1109/isrcs.2012.6309291 fatcat:prd5kboxwffyng2uz7i6sqsvq4

Reinforcement Learning for Feedback-Enabled Cyber Resilience [article]

Yunhan Huang, Linan Huang, Quanyan Zhu
2021 arXiv   pre-print
We introduce three application domains of CRMs: moving target defense, defensive cyber deception, and assistive human security technologies. The RL algorithms also have vulnerabilities themselves.  ...  Lastly, we discuss the future challenges of RL for cyber security and resilience and emerging applications of RL-based CRMs.  ...  The CRM acts on the recommended decisions by reconfiguring the security parameters and updating the cyber systems. The reasoning for the optimal cyber response can be viewed as a controller.  ... 
arXiv:2107.00783v2 fatcat:faffbbapnrg5djpjhjq7rcb7ym
« Previous Showing results 1 — 15 out of 1,476 results