1,466 Hits in 3.7 sec

Taxonomy for description of cross-domain attacks on CPS

Mark Yampolskiy, Peter Horvath, Xenofon D. Koutsoukos, Yuan Xue, Janos Sztipanovits
2013 Proceedings of the 2nd ACM international conference on High confidence networked systems - HiCoNS '13  
In this paper, we propose a taxonomy for description of attacks on CPS. The proposed taxonomy is capable of representing both conventional cyber-attacks as well as cross-domain attacks.  ...  The vulnerability of CPS to such cross-domain attacks has been practically proven by numerous examples, e.g., by the currently most famous Stuxnet attack.  ...  The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the  ... 
doi:10.1145/2461446.2461465 dblp:conf/hicons/YampolskiyHKXS13 fatcat:y2mmg6nftjhahejhbqihpwtlfe

Systematic analysis of cyber-attacks on CPS-evaluating applicability of DFD-based approach

Mark Yampolskiy, Peter Horvath, Xenofon D. Koutsoukos, Yuan Xue, Janos Sztipanovits
2012 2012 5th International Symposium on Resilient Control Systems  
Finally, we outline the preliminary results of our work towards a Taxonomy of Cyber-Physical Attacks.  ...  This creates multiple vectors for CPS-internal (i.e., within CPS) as well as for CPSexternal (i.e., between CPS itself and its environment) Cyber-Physical Attacks.  ...  The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the  ... 
doi:10.1109/isrcs.2012.6309293 fatcat:5mmnygof2jeo3l5z3rqherto5q

Architecture and Its Vulnerabilities in Smart-Lighting Systems [article]

Florian Hofer, Barbara Russo
2021 arXiv   pre-print
Industry 4.0 embodies one of the significant technological changes of this decade.  ...  With the example of a Smart-lighting system, we create a dedicated unified taxonomy for the use case and analyze its distributed Smart-* architecture by multiple layer-based models.  ...  ACKNOWLEDGMENTS We thank Systems S.r.l for the funding and support of this project under the "Industry 4.0 for the Smart-* (I4S)" project.  ... 
arXiv:2109.09171v1 fatcat:cqdcmpd27bgcjiv5zbszyprwjy

A review: towards practical attack taxonomy for industrial control systems

Qais Saif Qassim, Norziana Jamil, Razali Jidin, Mohd Ezanee Rusli, Md Nabil Ahmad Zawawi, Md Zaini Jamaludin, Muhammad Reza Z'aba, Wan Azlan Wan Kamarulzaman
2018 International Journal of Engineering & Technology  
This paper presents a comprehensive review of existing cyber-attack taxonomies available in the literature and evaluates these taxonomies based on defined criteria.  ...  Therefore, there is a significant need to have a comprehensive understanding of various types of cyber-attacks and its classification associated with both Opera-tion Technology (OT) and Information Technology  ...  Acknowledgement This research study is funded by TNB Seed Fund 2016 under a project 'R&D in Micro Cryptographic Engine for Protecting Data in SCADA Link'.  ... 
doi:10.14419/ijet.v7i2.14.12815 fatcat:wuqiungyhjhelchqcyy7stmkky

SecureCPS: Defending a nanosatellite cyber-physical system

Lance Forbes, Huy Vu, Bogdan Udrea, Hamilton Hagar, Xenofon D. Koutsoukos, Mark Yampolskiy, Khanh D. Pham, Joseph L. Cox
2014 Sensors and Systems for Space Applications VII  
Based on these assumptions, we have used Vanderbilt's Cyber Physical -Attack Description Language 1 (CP-ADL) to represent realistic attacks, analyze how these attacks propagate in the ARAPAIMA architecture  ...  However, because a maneuvering nanosatellite can threaten high-value assets (HVA) on-orbit, it must provide a level of security typically reserved for HVAs.  ...  Figure 3- 2 . 2 Mode-Specific Machine Learning Models Figure 4 - 1 : 41 Taxonomy for description of cross-domain attacks on CPS (Based on [1]) Figure 4 - 2 : 42 Figure 4-2: Example of a machine-readable  ... 
doi:10.1117/12.2054162 fatcat:r4e4ehpoibaetjaqrwo7abpbbu

Embedded systems security: Threats, vulnerabilities, and attack taxonomy

Dorottya Papp, Zhendong Ma, Levente Buttyan
2015 2015 13th Annual Conference on Privacy, Security and Trust (PST)  
Moreover, based on the information, we derive an attack taxonomy for embedded systems.  ...  Embedded systems are the driving force for technological development in many domains such as automotive, healthcare, and industrial control in the emerging post-PC era.  ...  [21] placed their emphasis on how cyber attacks might influence the physical space and proposed a taxonomy that could be used to categorize cross-domain attacks as well.  ... 
doi:10.1109/pst.2015.7232966 dblp:conf/pst/PappMB15 fatcat:swgk42w5vnc7rduywvwfp6wlmi

Deep Learning-Based Anomaly Detection in Cyber-Physical Systems: Progress and Opportunities [article]

Yuan Luo, Ya Xiao, Long Cheng, Guojun Peng, Danfeng Daphne Yao
2021 arXiv   pre-print
Further, we utilize this taxonomy to identify and highlight new characteristics and designs in each CPS domain. Also, we discuss the limitations and open problems of these methods.  ...  However, due to the increasing complexity of CPSs and more sophisticated attacks, conventional anomaly detection methods, which face the growing volume of data and need domain-specific knowledge, cannot  ...  ., false data injection attacks) in different CPS domains (e.g., smart grid).  ... 
arXiv:2003.13213v2 fatcat:a43styztbrf5fjluknlcb6brxi

Towards a Framework for Assuring Cyber Physical System Security

Tianbo Lu, Jinyang Zhao, Lingling Zhao, Yang Li, Xiaoyan Zhang
2015 International Journal of Security and Its Applications  
For the past few years, researchers are focusing their researches on different aspects of security of cyber physical systems.  ...  Finally, a conclusion of this article is given. The prevalence and vulnerabilities of cyber physical systems draw the attention of both researchers and attackers.  ...  ACKNOWLEDGEMENTS International Journal of Security and Its Applications Vol. 9, No. 3 (2015)  ... 
doi:10.14257/ijsia.2015.9.3.04 fatcat:asagegebibe43pnssbe6q7d42q

Active Learning: Using Bloom's Taxonomy to Support Critical Pedagogy

Sirous Tabrizi, Glenn Rideout
2017 International Journal for Cross-Disciplinary Subjects in Education  
Critical pedagogy, on the other hand, focuses on empowering students to become agents of social change for greater equity and justice.  ...  are necessary for critical pedagogy.  ...  both attack and defend them.  ... 
doi:10.20533/ijcdse.2042.6364.2017.0429 fatcat:q46fci35jzegtazfabq4sz4qhy

A taxonomy and adversarial model for attacks against network log anonymization

Justin King, Kiran Lakkaraju, Adam Slagell
2009 Proceedings of the 2009 ACM symposium on Applied Computing - SAC '09  
In this paper, we present a taxonomy that relates similar kinds of attacks in a meaningful way.  ...  We also present a new adversarial model which we can map into the taxonomy by the types of attacks that can be perpetrated by a particular adversary.  ...  Any opinions, findings, and conclusions or recommendations expressed in this publication are those of the authors and do not necessarily reflect the views of the NSF.  ... 
doi:10.1145/1529282.1529572 dblp:conf/sac/KingLS09 fatcat:sggjvtxeffebxdjnyzsmhvh45i

Artificial intelligence in cyber physical systems

Petar Radanliev, David De Roure, Max Van Kleek, Omar Santos, Uchenna Ani
2020 AI & Society: The Journal of Human-Centred Systems and Machine Intelligence  
There is an increased attention on propositions on models, infrastructures and frameworks of IoT in both academic and technical papers.  ...  The literature review is focused on identifying a conceptual framework for increasing resilience with AI through automation supporting both, a technical and human level.  ...  In this study, we seek for improved understanding of CPS architecture and we seek that though a taxonomy of recent literature.  ... 
doi:10.1007/s00146-020-01049-0 pmid:32874020 pmcid:PMC7451704 fatcat:wxfbcnxiqjegvjomgtufglwfiu

Cybersecurity and Safety Co-Engineering of Cyberphysical Systems—A Comprehensive Survey

Georgios Kavallieratos, Sokratis Katsikas, Vasileios Gkioulos
2020 Future Internet  
Despite the extent of the existing literature, several aspects of the subject still remain to be fully addressed.  ...  Safeguarding both safety and cybersecurity is paramount to the smooth and trustworthy operation of contemporary cyber physical systems, many of which support critical functions and services.  ...  Analysis In order to provide a comprehensive description of the current landscape of methods for the joint analysis of safety and security of CPSs, the following list of attributes is used.  ... 
doi:10.3390/fi12040065 fatcat:nvlmwxe75veszdkbguujuzbhhy

A Comprehensive Survey on Security and Privacy for Electronic Health Data

Se-Ra Oh, Young-Duk Seo, Euijong Lee, Young-Gab Kim
2021 International Journal of Environmental Research and Public Health  
Based on the review, we obtained research taxonomy, security concerns, requirements, solutions, research trends, and open challenges for the components with strengths and weaknesses of the analyzed studies  ...  Then, we reviewed recent security and privacy studies that focus on each component of the e-health systems.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/ijerph18189668 pmid:34574593 fatcat:nx7rjvy7tfczjbgmmpqgyiajuu

Cyber-attacks on the Oil & Gas sector: A survey on incident assessment and attack patterns

George Stergiopoulos, Dimitris Gritzalis, Evangelos Limnaios
2020 IEEE Access  
For each domain, we document and analyze verified attacks based on real-world reports and published demo attacks on systems.  ...  In this paper, we survey cyber-attacks on all three domains of the oil and gas sector (upstream, midstream, downstream) starting from the early 90s up until 2020.  ...  These generic surveys combine several domains when addressing CPS security.  ... 
doi:10.1109/access.2020.3007960 fatcat:6xjtbwigvnaplfjijtq7x45eyq

A Survey on Threat-Modeling Techniques: Protected Objects and Classification of Threats

Anton Konev, Alexander Shelupanov, Mikhail Kataev, Valeriya Ageeva, Alina Nabieva
2022 Symmetry  
Based on the given analysis, it can be concluded that the existing methodologies only relate superficially to the description of system models and threats, and it is necessary to develop a more complete  ...  Information security is one of the most important attributes of distributed systems that often operate on unreliable networks.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/sym14030549 fatcat:s6vjpv6qonefjnx4egcmitvsoe
« Previous Showing results 1 — 15 out of 1,466 results