Classification of and resilience to cyber-attacks on cyber-physical systems

The growing connectivity of cyber-physical systems (CPSes) has led to an increased concern over the ability of cyber-attacks to inflict physical damage. Current cybersecurity measures focus on preventing attacks from penetrating control supervisory networks. These reactive techniques, however, are o...

Full description

Bibliographic Details
Main Author: Lyn, Kevin G.
Other Authors: Lerner, Lee W., Collins, Thomas R., Electrical and Computer Engineering, Beyah, Raheem A., Coyle, Edward J.
Format: Thesis
Language:English
Published: Georgia Institute of Technology 2015
Subjects:
Online Access:http://hdl.handle.net/1853/53926
id ftgeorgiatech:oai:smartech.gatech.edu:1853/53926
record_format openpolar
spelling ftgeorgiatech:oai:smartech.gatech.edu:1853/53926 2023-05-15T18:30:22+02:00 Classification of and resilience to cyber-attacks on cyber-physical systems Lyn, Kevin G. Lerner, Lee W. Collins, Thomas R. Electrical and Computer Engineering Beyah, Raheem A. Coyle, Edward J. 2015-09-21T14:26:32Z application/pdf http://hdl.handle.net/1853/53926 en_US eng Georgia Institute of Technology Cyber-physical systems Autonomic control Embedded device security Trust Resilience Thesis 2015 ftgeorgiatech 2018-09-18T19:52:12Z The growing connectivity of cyber-physical systems (CPSes) has led to an increased concern over the ability of cyber-attacks to inflict physical damage. Current cybersecurity measures focus on preventing attacks from penetrating control supervisory networks. These reactive techniques, however, are often plagued with vulnerabilities and zero-day exploits. Embedded processors in CPS field devices often possess little security of their own, and are easily exploited once the network is penetrated. In response, researchers at Georgia Tech and Virginia Tech have proposed a Trustworthy Autonomic Interface Guardian Architecture (TAIGA), which monitors communication between the embedded controller and physical process. This autonomic architecture provides the physical process with a last line of defense against cyber-attacks by switching process control to a trusted backup controller if an attack causes a system specification violation. This thesis focuses on classifying the effects of cyberattacks on embedded controllers, evaluating TAIGA’s resilience against these attacks, and determining the applicability of TAIGA to other CPSes. This thesis identifies four possible outcomes of a cyber-attack on a CPS embedded processor. We then evaluate TAIGA’s mechanisms to defend against those attack outcomes, and verify TAIGA satisfies the listed trust requirements. Next, we discuss an implementation and the experimental results of TAIGA on a hazardous cargo transportation robot. Then, by making various modifications to the setup configuration, we are able to explore TAIGA’s ability to provide security and process protection to other CPSes with varying levels of autonomy or distributed components. M.S. Thesis taiga Georgia Institute of Technology: SMARTech - Scholarly Materials and Research at Georgia Tech
institution Open Polar
collection Georgia Institute of Technology: SMARTech - Scholarly Materials and Research at Georgia Tech
op_collection_id ftgeorgiatech
language English
topic Cyber-physical systems
Autonomic control
Embedded device security
Trust
Resilience
spellingShingle Cyber-physical systems
Autonomic control
Embedded device security
Trust
Resilience
Lyn, Kevin G.
Classification of and resilience to cyber-attacks on cyber-physical systems
topic_facet Cyber-physical systems
Autonomic control
Embedded device security
Trust
Resilience
description The growing connectivity of cyber-physical systems (CPSes) has led to an increased concern over the ability of cyber-attacks to inflict physical damage. Current cybersecurity measures focus on preventing attacks from penetrating control supervisory networks. These reactive techniques, however, are often plagued with vulnerabilities and zero-day exploits. Embedded processors in CPS field devices often possess little security of their own, and are easily exploited once the network is penetrated. In response, researchers at Georgia Tech and Virginia Tech have proposed a Trustworthy Autonomic Interface Guardian Architecture (TAIGA), which monitors communication between the embedded controller and physical process. This autonomic architecture provides the physical process with a last line of defense against cyber-attacks by switching process control to a trusted backup controller if an attack causes a system specification violation. This thesis focuses on classifying the effects of cyberattacks on embedded controllers, evaluating TAIGA’s resilience against these attacks, and determining the applicability of TAIGA to other CPSes. This thesis identifies four possible outcomes of a cyber-attack on a CPS embedded processor. We then evaluate TAIGA’s mechanisms to defend against those attack outcomes, and verify TAIGA satisfies the listed trust requirements. Next, we discuss an implementation and the experimental results of TAIGA on a hazardous cargo transportation robot. Then, by making various modifications to the setup configuration, we are able to explore TAIGA’s ability to provide security and process protection to other CPSes with varying levels of autonomy or distributed components. M.S.
author2 Lerner, Lee W.
Collins, Thomas R.
Electrical and Computer Engineering
Beyah, Raheem A.
Coyle, Edward J.
format Thesis
author Lyn, Kevin G.
author_facet Lyn, Kevin G.
author_sort Lyn, Kevin G.
title Classification of and resilience to cyber-attacks on cyber-physical systems
title_short Classification of and resilience to cyber-attacks on cyber-physical systems
title_full Classification of and resilience to cyber-attacks on cyber-physical systems
title_fullStr Classification of and resilience to cyber-attacks on cyber-physical systems
title_full_unstemmed Classification of and resilience to cyber-attacks on cyber-physical systems
title_sort classification of and resilience to cyber-attacks on cyber-physical systems
publisher Georgia Institute of Technology
publishDate 2015
url http://hdl.handle.net/1853/53926
genre taiga
genre_facet taiga
_version_ 1766213860784603136