Cyber-Physical Control Systems: Vulnerabilities, Threats, and Mitigations
نویسندگان
چکیده
Cyber-Physical Systems (CPS) are yielding novel problems and solutions for security researchers. CPSs connect computerized controllers and human supervisors with physical systems used in the energy, transportation, water, manufacturing, and other sectors. A recent and well-known attack is the Stuxnet computer worm [1], which targeted Siemens industrial software used to control nuclear fuel processing plants. The worm exploited several extremely complicated cyber attack vectors, including four Windows zero-day vulnerabilities, to sabotage a suspected uranium processing facility. The scale and complexity of the attack clearly demonstrated the need to fully monitor cyber-physical critical infrastructures in real time for both accidental and malicious failures. Recent similar attacks against CPS have prompted unprecedented investigation into new threats [2] and mitigations [3], [4] against CPSs. However, despite the increased interest in CPS security problems, the security community faces significant learning curves in addressing them. Modern CPSs are founded on control theory, real-time systems, and obscure, often ad-hoc programming practices. Furthermore, the traditional definitions of security are often in conflict with the goals and operational constraints of CPSs. A security measure that blocks a system operator from executing a critical action could cause as much or more damage than an actual attack!
منابع مشابه
Mitigations for Security Vulnerabilities Found in Control System Networks
Industry is aware of the need for Control System (CS) security, but in on-site assessments, Idaho National Laboratory (INL) has observed that security procedures and devices are not consistently and effectively implemented. The Department of Homeland Security (DHS), National Cyber Security Division (NCSD), established the Control Systems Security Center (CSSC) at INL to help industry and govern...
متن کاملA grounded analysis of experts' decision-making during security assessments
Security analysis requires specialized knowledge to align threats and vulnerabilities in information technology. To identify mitigations, analysts need to understand how threats, vulnerabilities, and mitigations are composed together to yield security requirements. Despite abundant guidance in the form of checklists and controls about how to secure systems, evidence suggests that security exper...
متن کاملCritical Infrastructure Attack Modeling
The development and connection of information and communication technologies with industrial control systems in the so-called critical infrastructure have contributed to the emergence of new complex threats. The critical infrastructure has become a target of sophisticated cyber attacks which exploit several, also unknown, vulnerabilities in one course of an attack. The paper proposes an attack ...
متن کاملCyber Attack Vulnerabilities Analysis for Unmanned Aerial Vehicles
As the technological capabilities of automated systems have increased, the use of unmanned aerial vehicles (UAVs) for traditionally exhausting and dangerous manned missions has become more feasible. The United States Army, Air Force, and Navy have released plans for the increased use of UAVs, but have only recently shown interest in the cyber security aspect of UAVs. As a result, current autopi...
متن کاملFUZZBUSTER: A System for Self-Adaptive Immunity from Cyber Threats
Today’s computer systems are under relentless attack from cyber attackers armed with sophisticated vulnerability search and exploit development toolkits. To protect against such threats, we are developing FUZZBUSTER, an automated system that provides adaptive immunity against a wide variety of cyber threats. FUZZBUSTER reacts to observed attacks and proactively searches for never-before-seen vu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015