TY - JOUR
T1 - Cybersecurity for Control Systems
T2 - A Process-Aware Perspective
AU - Khorrami, Farshad
AU - Krishnamurthy, Prashanth
AU - Karri, Ramesh
N1 - Publisher Copyright:
© 2013 IEEE.
PY - 2016/10
Y1 - 2016/10
N2 - Modern industrial control systems and other complex cyber-physical systems such as smart grid, unmanned vehicles, manufacturing plants, chemical plants, and nuclear reactors are complex interconnected systems with extensive cyber and physical components, necessitating robust cyber-security techniques. These systems are complex interconnected combinations of heterogeneous hardware and software components and include sensors, actuators, physical systems and processes being controlled or monitored, computational nodes, communication protocols, and controllers. Besides computing/communications/networking based cyber-Attacks, CPS are vulnerable to process-Aware attacks that aim to disrupt the proper functioning or hamper performance, efficiency, stability, and safety of the physical systems/processes of the CPS. By modifying the information flow or the computational behavior of the system, process-Aware attacks can disrupt the functioning the CPS to thereby hamper the performance or stability of the overall system or its components. Increasing network connectivity of the computational nodes of a CPS facilitates the maintenance and on-demand reprogrammability of computational nodes, greatly reducing the operator workload. However, this increasing connectivity raises the potential for cyber-Attacks that attempt unauthorized modifications of the run-Time parameters or control logic in the computational nodes. Hence, to improve the assurance of CPS, it is vital to develop effective real-Time attack monitoring and threat mitigation mechanisms.
AB - Modern industrial control systems and other complex cyber-physical systems such as smart grid, unmanned vehicles, manufacturing plants, chemical plants, and nuclear reactors are complex interconnected systems with extensive cyber and physical components, necessitating robust cyber-security techniques. These systems are complex interconnected combinations of heterogeneous hardware and software components and include sensors, actuators, physical systems and processes being controlled or monitored, computational nodes, communication protocols, and controllers. Besides computing/communications/networking based cyber-Attacks, CPS are vulnerable to process-Aware attacks that aim to disrupt the proper functioning or hamper performance, efficiency, stability, and safety of the physical systems/processes of the CPS. By modifying the information flow or the computational behavior of the system, process-Aware attacks can disrupt the functioning the CPS to thereby hamper the performance or stability of the overall system or its components. Increasing network connectivity of the computational nodes of a CPS facilitates the maintenance and on-demand reprogrammability of computational nodes, greatly reducing the operator workload. However, this increasing connectivity raises the potential for cyber-Attacks that attempt unauthorized modifications of the run-Time parameters or control logic in the computational nodes. Hence, to improve the assurance of CPS, it is vital to develop effective real-Time attack monitoring and threat mitigation mechanisms.
UR - http://www.scopus.com/inward/record.url?scp=84983783886&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84983783886&partnerID=8YFLogxK
U2 - 10.1109/MDAT.2016.2594178
DO - 10.1109/MDAT.2016.2594178
M3 - Review article
AN - SCOPUS:84983783886
SN - 2168-2356
VL - 33
SP - 75
EP - 83
JO - IEEE Design and Test
JF - IEEE Design and Test
IS - 5
M1 - 7523254
ER -