Classification of and resilience to cyber-attacks on cyber-physical systems
The growing connectivity of cyber-physical systems (CPSes) has led to an increased concern over the ability of cyber-attacks to inflict physical damage. Current cybersecurity measures focus on preventing attacks from penetrating control supervisory networks. These reactive techniques, however, are o...
Main Author: | |
---|---|
Other Authors: | , , , , |
Format: | Thesis |
Language: | English |
Published: |
Georgia Institute of Technology
2015
|
Subjects: | |
Online Access: | http://hdl.handle.net/1853/53926 |
id |
ftgeorgiatech:oai:smartech.gatech.edu:1853/53926 |
---|---|
record_format |
openpolar |
spelling |
ftgeorgiatech:oai:smartech.gatech.edu:1853/53926 2023-05-15T18:30:22+02:00 Classification of and resilience to cyber-attacks on cyber-physical systems Lyn, Kevin G. Lerner, Lee W. Collins, Thomas R. Electrical and Computer Engineering Beyah, Raheem A. Coyle, Edward J. 2015-09-21T14:26:32Z application/pdf http://hdl.handle.net/1853/53926 en_US eng Georgia Institute of Technology Cyber-physical systems Autonomic control Embedded device security Trust Resilience Thesis 2015 ftgeorgiatech 2018-09-18T19:52:12Z The growing connectivity of cyber-physical systems (CPSes) has led to an increased concern over the ability of cyber-attacks to inflict physical damage. Current cybersecurity measures focus on preventing attacks from penetrating control supervisory networks. These reactive techniques, however, are often plagued with vulnerabilities and zero-day exploits. Embedded processors in CPS field devices often possess little security of their own, and are easily exploited once the network is penetrated. In response, researchers at Georgia Tech and Virginia Tech have proposed a Trustworthy Autonomic Interface Guardian Architecture (TAIGA), which monitors communication between the embedded controller and physical process. This autonomic architecture provides the physical process with a last line of defense against cyber-attacks by switching process control to a trusted backup controller if an attack causes a system specification violation. This thesis focuses on classifying the effects of cyberattacks on embedded controllers, evaluating TAIGA’s resilience against these attacks, and determining the applicability of TAIGA to other CPSes. This thesis identifies four possible outcomes of a cyber-attack on a CPS embedded processor. We then evaluate TAIGA’s mechanisms to defend against those attack outcomes, and verify TAIGA satisfies the listed trust requirements. Next, we discuss an implementation and the experimental results of TAIGA on a hazardous cargo transportation robot. Then, by making various modifications to the setup configuration, we are able to explore TAIGA’s ability to provide security and process protection to other CPSes with varying levels of autonomy or distributed components. M.S. Thesis taiga Georgia Institute of Technology: SMARTech - Scholarly Materials and Research at Georgia Tech |
institution |
Open Polar |
collection |
Georgia Institute of Technology: SMARTech - Scholarly Materials and Research at Georgia Tech |
op_collection_id |
ftgeorgiatech |
language |
English |
topic |
Cyber-physical systems Autonomic control Embedded device security Trust Resilience |
spellingShingle |
Cyber-physical systems Autonomic control Embedded device security Trust Resilience Lyn, Kevin G. Classification of and resilience to cyber-attacks on cyber-physical systems |
topic_facet |
Cyber-physical systems Autonomic control Embedded device security Trust Resilience |
description |
The growing connectivity of cyber-physical systems (CPSes) has led to an increased concern over the ability of cyber-attacks to inflict physical damage. Current cybersecurity measures focus on preventing attacks from penetrating control supervisory networks. These reactive techniques, however, are often plagued with vulnerabilities and zero-day exploits. Embedded processors in CPS field devices often possess little security of their own, and are easily exploited once the network is penetrated. In response, researchers at Georgia Tech and Virginia Tech have proposed a Trustworthy Autonomic Interface Guardian Architecture (TAIGA), which monitors communication between the embedded controller and physical process. This autonomic architecture provides the physical process with a last line of defense against cyber-attacks by switching process control to a trusted backup controller if an attack causes a system specification violation. This thesis focuses on classifying the effects of cyberattacks on embedded controllers, evaluating TAIGA’s resilience against these attacks, and determining the applicability of TAIGA to other CPSes. This thesis identifies four possible outcomes of a cyber-attack on a CPS embedded processor. We then evaluate TAIGA’s mechanisms to defend against those attack outcomes, and verify TAIGA satisfies the listed trust requirements. Next, we discuss an implementation and the experimental results of TAIGA on a hazardous cargo transportation robot. Then, by making various modifications to the setup configuration, we are able to explore TAIGA’s ability to provide security and process protection to other CPSes with varying levels of autonomy or distributed components. M.S. |
author2 |
Lerner, Lee W. Collins, Thomas R. Electrical and Computer Engineering Beyah, Raheem A. Coyle, Edward J. |
format |
Thesis |
author |
Lyn, Kevin G. |
author_facet |
Lyn, Kevin G. |
author_sort |
Lyn, Kevin G. |
title |
Classification of and resilience to cyber-attacks on cyber-physical systems |
title_short |
Classification of and resilience to cyber-attacks on cyber-physical systems |
title_full |
Classification of and resilience to cyber-attacks on cyber-physical systems |
title_fullStr |
Classification of and resilience to cyber-attacks on cyber-physical systems |
title_full_unstemmed |
Classification of and resilience to cyber-attacks on cyber-physical systems |
title_sort |
classification of and resilience to cyber-attacks on cyber-physical systems |
publisher |
Georgia Institute of Technology |
publishDate |
2015 |
url |
http://hdl.handle.net/1853/53926 |
genre |
taiga |
genre_facet |
taiga |
_version_ |
1766213860784603136 |