scispace - formally typeset
Open AccessJournal ArticleDOI

Modeling and Analysis of Attacks and Counter Defense Mechanisms for Cyber Physical Systems

Robert Mitchell, +1 more
- 01 Mar 2016 - 
- Vol. 65, Iss: 1, pp 350-358
TLDR
An analytical model based on stochastic Petri nets is developed to capture the dynamics between adversary behavior and defense for cyber physical systems and reveals there exists a design tradeoff between exfiltration failure, attrition failure, and pervasion failure when using redundancy to improve the overall system reliability.
Abstract
In this paper, we develop an analytical model based on stochastic Petri nets to capture the dynamics between adversary behavior and defense for cyber physical systems. We consider several types of failures including attrition failure, pervasion failure, and exfiltration failure which can happen to a cyber physical system. Using a modernized electrical grid as an example, we illustrate the parameterization process. Our results reveal optimal design conditions, including the intrusion detection interval, and the redundancy level, under which the modernized electrical grid's mean time to failure is maximized. Further, there exists a design tradeoff between exfiltration failure, attrition failure, and pervasion failure when using redundancy to improve the overall system reliability.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Cyber-physical systems and their security issues

TL;DR: The aim of this paper is to analyse and classify existing research papers on the security of cyber-physical systems, and to propose a tree of attacks on cyber- physical systems.
Journal ArticleDOI

A survey of trust computation models for service management in internet of things systems

TL;DR: This paper surveys trust computation models for Internet of things (IoT) systems for the purpose of service management, i.e., whether or not to select an IoT device as a service provider, and summarizes pros and cons of each dimension's options, and highlights the effectiveness of defense mechanisms against malicious attacks.
Proceedings Article

Smart grid

TL;DR: The use of digital information and controls technology to improve reliability, security, and efficiency of the electric grid.
Journal ArticleDOI

Cyber Physical System (CPS)-Based Industry 4.0: A Survey

TL;DR: This review paper summarizes the current state-of-the-art CPS in Industry 4.0 from Web of Science (WoS) database and proposes a potential framework of CPS systematically, and identifies research trends and challenges.
Journal ArticleDOI

A Survey on Modeling and Optimizing Multi-Objective Systems

TL;DR: A comprehensive survey of the state-of-the-art modeling and solution techniques to solve multi-objective optimization problems and suggests future work directions in terms of what critical design factors should be considered to design and analyze a system with multiple objectives.
References
More filters
Journal ArticleDOI

The Byzantine Generals Problem

TL;DR: The Albanian Generals Problem as mentioned in this paper is a generalization of Dijkstra's dining philosophers problem, where two generals have to come to a common agreement on whether to attack or retreat, but can communicate only by sending messengers who might never arrive.
Book ChapterDOI

The Byzantine generals problem

TL;DR: In this article, a group of generals of the Byzantine army camped with their troops around an enemy city are shown to agree upon a common battle plan using only oral messages, if and only if more than two-thirds of the generals are loyal; so a single traitor can confound two loyal generals.
Journal ArticleDOI

Modeling Cyber–Physical Systems

TL;DR: Specific technologies described include hybrid system modeling and simulation, concurrent and heterogeneous models of computation, the use of domain-specific ontologies to enhance modularity, and the joint modeling of functionality and implementation architectures.
Proceedings ArticleDOI

SPNP: stochastic Petri net package

TL;DR: SPNP, a powerful GSPN package that allows the modeling of complex system behaviors, is presented and is compared with two other SPN-based packages, Great SPN and METASAN.
Journal ArticleDOI

A survey of intrusion detection techniques for cyber-physical systems

TL;DR: The approach is to classify modern CPS Intrusion Detection System techniques based on two design dimensions: detection technique and audit material, and provides insight on the effectiveness of IDS techniques as they apply to CPSs.
Related Papers (5)