Skip to main content
Erschienen in: The International Journal of Advanced Manufacturing Technology 9/2019

24.05.2019 | ORIGINAL ARTICLE

Defending against product-oriented cyber-physical attacks on machining systems

verfasst von: Mohammed S. Shafae, Lee J. Wells, Gregory T. Purdy

Erschienen in: The International Journal of Advanced Manufacturing Technology | Ausgabe 9/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Industry 4.0 and its related technologies (e.g., embedded sensing, internet-of-things, and cyber-physical systems) are promising a paradigm shift in manufacturing automation. However, with a continual increase in device interconnectivity, securing these systems becomes crucial. As these systems evolve, opportunities for cyberattacks extend to include attacks that can physically alter parts (Product-Oriented C2P attacks). Fortunately, since these cyber-physical attacks affect the physical world, there exists potential to detect an attack through its physical manifestation. Typically, in manufacturing, quality control (QC) systems are used to detect quality losses or deviations from nominal. This paper proposes that QC tools can be adapted to act as physical detection layers as part of a defense-in-depth strategy (common IT security strategy) that increases the difficulty/cost required for a successful attack. However, effectively designing physical detection layers requires understanding the extent to which attacks can (and cannot) be designed to avoid detection. In response, this paper proposes a machining specific attack design scheme and an attack design designation system (ADDS) that provides the structure to populate a wide variety of potential attacks. To illustrate the importance of applying a defense-in-depth strategy for machining, a case study is conducted with several realistic attacks against an example machining process that collects in-situ process data. Within this case study, the proposed ADDS is employed to systematically describe how these attacks could be designed to avoid detection. Finally, through this exploration, this paper shows how employing process-domain knowledge to understand the effects of Product-Oriented attacks on process physics can further aid in detection layer designs.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Jazdi N (2014) Cyber physical systems in the context of Industry 4.0. In: IEEE International Conference on Automation, Quality and Testing, Robotics. IEEE, pp 1–4 Jazdi N (2014) Cyber physical systems in the context of Industry 4.0. In: IEEE International Conference on Automation, Quality and Testing, Robotics. IEEE, pp 1–4
2.
Zurück zum Zitat Ren L, Zhang L, Tao F, Zhao C, Chai X, Zhao X (2015) Cloud manufacturing: from concept to practice. Enterp Inf Syst 9(2):186–209CrossRef Ren L, Zhang L, Tao F, Zhao C, Chai X, Zhao X (2015) Cloud manufacturing: from concept to practice. Enterp Inf Syst 9(2):186–209CrossRef
4.
Zurück zum Zitat Lee RM, Assante MJ, Conway T (2014) German steel mill cyber attack. Industrial Control Systems. SANS Institute Lee RM, Assante MJ, Conway T (2014) German steel mill cyber attack. Industrial Control Systems. SANS Institute
5.
Zurück zum Zitat Sturm LD, Williams CB, Camelio JA, White J, Parker R (2014) Cyber-physical vulnerabilities in additive manufacturing systems. In: 25th Annual Solid Freeform Fabrication Symposium, Austin, TX Sturm LD, Williams CB, Camelio JA, White J, Parker R (2014) Cyber-physical vulnerabilities in additive manufacturing systems. In: 25th Annual Solid Freeform Fabrication Symposium, Austin, TX
6.
Zurück zum Zitat Yampolskiy M, Horvath P, Koutsoukos XD, Xue Y (2012) Sztipanovits J Systematic analysis of cyber-attacks on CPS-evaluating applicability of DFD-based approach. In: the 5th International Symposium on Resilient Control Systems (ISRCS). IEEE, pp 55–62 Yampolskiy M, Horvath P, Koutsoukos XD, Xue Y (2012) Sztipanovits J Systematic analysis of cyber-attacks on CPS-evaluating applicability of DFD-based approach. In: the 5th International Symposium on Resilient Control Systems (ISRCS). IEEE, pp 55–62
7.
Zurück zum Zitat Yampolskiy M, Horvath P, Koutsoukos XD, Xue Y (2013) Sztipanovits J Taxonomy for description of cross-domain attacks on CPS. In: Proceedings of the 2nd ACM international conference on High confidence networked systems. ACM, pp 135–142 Yampolskiy M, Horvath P, Koutsoukos XD, Xue Y (2013) Sztipanovits J Taxonomy for description of cross-domain attacks on CPS. In: Proceedings of the 2nd ACM international conference on High confidence networked systems. ACM, pp 135–142
8.
Zurück zum Zitat Elhabashy AE, Wells LJ, Woodall WH, Camelio JA (2018) A cyber-physical attack taxonomy for production systems: a quality control perspective. J Intell Manuf:1–16 Elhabashy AE, Wells LJ, Woodall WH, Camelio JA (2018) A cyber-physical attack taxonomy for production systems: a quality control perspective. J Intell Manuf:1–16
9.
Zurück zum Zitat Sturm LD, Williams CB, Camelio JA, White J, Parker R (2017) Cyber-physical vulnerabilities in additive manufacturing systems: a case study attack on the. STL file with human subjects. J Manuf Syst 44:154–164CrossRef Sturm LD, Williams CB, Camelio JA, White J, Parker R (2017) Cyber-physical vulnerabilities in additive manufacturing systems: a case study attack on the. STL file with human subjects. J Manuf Syst 44:154–164CrossRef
10.
Zurück zum Zitat Fabro M, Gorski E, Spiers N (2016) Recommended practice: improving industrial control system cybersecurity with defense-in-depth strategies. DHS Industrial Control Systems Cyber Emergency Response Team Fabro M, Gorski E, Spiers N (2016) Recommended practice: improving industrial control system cybersecurity with defense-in-depth strategies. DHS Industrial Control Systems Cyber Emergency Response Team
11.
Zurück zum Zitat Blackwell C, Zhu H (2014) Cyberpatterns: unifying design patterns with security and attack patterns. Springer Blackwell C, Zhu H (2014) Cyberpatterns: unifying design patterns with security and attack patterns. Springer
14.
Zurück zum Zitat Mell P (2005) The national vulnerability database. NIST Presentation Mell P (2005) The national vulnerability database. NIST Presentation
16.
Zurück zum Zitat NIST (2018) Framework for improving critical infrastructure cybersecurity, Version 1.1. 1.1 edn. National Institute of Standards and Technology NIST (2018) Framework for improving critical infrastructure cybersecurity, Version 1.1. 1.1 edn. National Institute of Standards and Technology
18.
Zurück zum Zitat Huang Y, Leu MC, Mazumder J, Donmez A (2015) Additive manufacturing: current state, future potential, gaps and needs, and recommendations. J Manuf Sci Eng 137(1):014001CrossRef Huang Y, Leu MC, Mazumder J, Donmez A (2015) Additive manufacturing: current state, future potential, gaps and needs, and recommendations. J Manuf Sci Eng 137(1):014001CrossRef
19.
Zurück zum Zitat Kline S, Guckes ACM, Schafer J (2017) Machine tools. 2018 Capital Spending Survey Results Kline S, Guckes ACM, Schafer J (2017) Machine tools. 2018 Capital Spending Survey Results
20.
Zurück zum Zitat Hutchins MJ, Bhinge R, Micali MK, Robinson SL, Sutherland JW, Dornfeld D (2015) Framework for identifying cybersecurity risks in manufacturing. Procedia Manufactur 1:47–63CrossRef Hutchins MJ, Bhinge R, Micali MK, Robinson SL, Sutherland JW, Dornfeld D (2015) Framework for identifying cybersecurity risks in manufacturing. Procedia Manufactur 1:47–63CrossRef
21.
Zurück zum Zitat Chhetri SR, Wan J, Al Faruque MA (2017) Cross-domain security of cyber-physical systems. Design Automation Conference (ASP-DAC), 2017 22nd Asia and South Pacific, IEEE:200–205 Chhetri SR, Wan J, Al Faruque MA (2017) Cross-domain security of cyber-physical systems. Design Automation Conference (ASP-DAC), 2017 22nd Asia and South Pacific, IEEE:200–205
22.
Zurück zum Zitat DeSmit Z, Elhabashy AE, Wells LJ, Camelio JA (2017) An approach to cyber-physical vulnerability assessment for intelligent manufacturing systems. J Manuf Syst 43:339–351CrossRef DeSmit Z, Elhabashy AE, Wells LJ, Camelio JA (2017) An approach to cyber-physical vulnerability assessment for intelligent manufacturing systems. J Manuf Syst 43:339–351CrossRef
23.
Zurück zum Zitat Yampolskiy M, Skjellum A, Kretzschmar M, Overfelt RA, Sloan KR, Yasinsac A (2016) Using 3D printers as weapons. Int J Crit Infrastruct Prot 14:58–71CrossRef Yampolskiy M, Skjellum A, Kretzschmar M, Overfelt RA, Sloan KR, Yasinsac A (2016) Using 3D printers as weapons. Int J Crit Infrastruct Prot 14:58–71CrossRef
24.
Zurück zum Zitat Pan Y, White J, Schmidt DC, Elhabashy A, Sturm L, Camelio J, Williams C (2017) Taxonomies for reasoning about cyber-physical attacks in IoT-based manufacturing systems. Int J Interact Multimed Artific Intel 4(3) Pan Y, White J, Schmidt DC, Elhabashy A, Sturm L, Camelio J, Williams C (2017) Taxonomies for reasoning about cyber-physical attacks in IoT-based manufacturing systems. Int J Interact Multimed Artific Intel 4(3)
25.
Zurück zum Zitat DeSmit Z (2017) Cyber-physical security in advanced manufacturing Doctoral Dissertation, Virginia Tech DeSmit Z (2017) Cyber-physical security in advanced manufacturing Doctoral Dissertation, Virginia Tech
26.
Zurück zum Zitat Sturm LD, Albakri M, Williams CB, Tarazaga P (2016) In-situ detection of build defects in additive manufacturing via impedance-based monitoring. In: Paper presented at the Proceedings of the 27th Annual International Solid Freeform Fabrication Symposium. An Additive Manufacturing Conference, Austin, pp 8–10 Sturm LD, Albakri M, Williams CB, Tarazaga P (2016) In-situ detection of build defects in additive manufacturing via impedance-based monitoring. In: Paper presented at the Proceedings of the 27th Annual International Solid Freeform Fabrication Symposium. An Additive Manufacturing Conference, Austin, pp 8–10
27.
Zurück zum Zitat Chhetri SR, Canedo A, Al Faruque MA (2016) KCAD: kinetic cyber-attack detection method for cyber-physical additive manufacturing systems. Paper presented at the International Conference On Computer Aided Design (ICCAD '16), Austin, 7-10 Chhetri SR, Canedo A, Al Faruque MA (2016) KCAD: kinetic cyber-attack detection method for cyber-physical additive manufacturing systems. Paper presented at the International Conference On Computer Aided Design (ICCAD '16), Austin, 7-10
28.
Zurück zum Zitat Belikovetsky S, Solewicz Y, Yampolskiy M, Toh J, Elovici Y (2017) Detecting cyber-physical attacks in additive manufacturing using digital audio signing arXiv preprint arXiv:170506454 Belikovetsky S, Solewicz Y, Yampolskiy M, Toh J, Elovici Y (2017) Detecting cyber-physical attacks in additive manufacturing using digital audio signing arXiv preprint arXiv:170506454
30.
Zurück zum Zitat Turner H, White J, Camelio JA, Williams C, Amos B, Parker R (2015) Bad parts: are our manufacturing systems at risk of silent cyberattacks? IEEE Secur Priv 13(3):40–47CrossRef Turner H, White J, Camelio JA, Williams C, Amos B, Parker R (2015) Bad parts: are our manufacturing systems at risk of silent cyberattacks? IEEE Secur Priv 13(3):40–47CrossRef
32.
Zurück zum Zitat Belikovetsky S, Yampolskiy M, Toh J, Elovici Y (2016) Dr0wned-cyber-physical attack with additive manufacturing arXiv preprint arXiv:160900133 Belikovetsky S, Yampolskiy M, Toh J, Elovici Y (2016) Dr0wned-cyber-physical attack with additive manufacturing arXiv preprint arXiv:160900133
33.
Zurück zum Zitat Moore SB, Glisson WB, Yampolskiy M Implications of malicious 3D printer firmware. In: Proceedings of the 50th Hawaii International Conference on System Sciences. HICSS, Waikoloa Village, pp 6089–6098 Moore SB, Glisson WB, Yampolskiy M Implications of malicious 3D printer firmware. In: Proceedings of the 50th Hawaii International Conference on System Sciences. HICSS, Waikoloa Village, pp 6089–6098
34.
Zurück zum Zitat Slaughter A, Yampolskiy M, Matthews M, King WE, Guss G, Elovici Y (2017) How to ensure bad quality in metal additive manufacturing: in-situ infrared thermography from the security perspective. In: Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, p 78 Slaughter A, Yampolskiy M, Matthews M, King WE, Guss G, Elovici Y (2017) How to ensure bad quality in metal additive manufacturing: in-situ infrared thermography from the security perspective. In: Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, p 78
35.
Zurück zum Zitat Wu SX, Banzhaf W (2010) The use of computational intelligence in intrusion detection systems: a review. Appl Soft Comput 10(1):1–35CrossRef Wu SX, Banzhaf W (2010) The use of computational intelligence in intrusion detection systems: a review. Appl Soft Comput 10(1):1–35CrossRef
36.
Zurück zum Zitat Evans JR, Lindsay WM (2013) Managing for quality and performance excellence. Cengage Learn Evans JR, Lindsay WM (2013) Managing for quality and performance excellence. Cengage Learn
37.
Zurück zum Zitat Teti R, Jemielniak K, O’Donnell G, Dornfeld D (2010) Advanced monitoring of machining operations. CIRP Annals-Manufactur Technol 59(2):717–739CrossRef Teti R, Jemielniak K, O’Donnell G, Dornfeld D (2010) Advanced monitoring of machining operations. CIRP Annals-Manufactur Technol 59(2):717–739CrossRef
38.
Zurück zum Zitat Tang C (2017) Key performance indicators for process control system cybersecurity performance analysis. US Department of Commerce, National Institute of Standards and Technology Tang C (2017) Key performance indicators for process control system cybersecurity performance analysis. US Department of Commerce, National Institute of Standards and Technology
39.
Zurück zum Zitat Urbina DI, Urbina DI, Giraldo J, Cardenas AA, Valente J, Faisal M, Tippenhauer NO, Ruths J, Candell R, Sandberg H (2016) Survey and new directions for physics-based attack detection in control systems. US Department of Commerce, National Institute of Standards and Technology Urbina DI, Urbina DI, Giraldo J, Cardenas AA, Valente J, Faisal M, Tippenhauer NO, Ruths J, Candell R, Sandberg H (2016) Survey and new directions for physics-based attack detection in control systems. US Department of Commerce, National Institute of Standards and Technology
41.
Zurück zum Zitat Kuttolamadom MA, Mears ML, Kurfess TR (2012) On the volumetric assessment of tool wear in machining inserts with complex geometries—part 1: need, methodology, and standardization. J Manuf Sci Eng 134(5):051002CrossRef Kuttolamadom MA, Mears ML, Kurfess TR (2012) On the volumetric assessment of tool wear in machining inserts with complex geometries—part 1: need, methodology, and standardization. J Manuf Sci Eng 134(5):051002CrossRef
42.
Zurück zum Zitat ASME (2009) Dimensioning and tolerancing, p Y145 ASME (2009) Dimensioning and tolerancing, p Y145
43.
Zurück zum Zitat Federal-Aviation-Administration (2012) Aircraft landing gear systems. In: Aviation maintenance technician handbook - airframe, vol 1. U.S. Department of Transportation, Flight Standards Service Federal-Aviation-Administration (2012) Aircraft landing gear systems. In: Aviation maintenance technician handbook - airframe, vol 1. U.S. Department of Transportation, Flight Standards Service
44.
Zurück zum Zitat Caldwell T (2011) Ethical hackers: putting on the white hat. Netw Secur 2011(7):10–13CrossRef Caldwell T (2011) Ethical hackers: putting on the white hat. Netw Secur 2011(7):10–13CrossRef
Metadaten
Titel
Defending against product-oriented cyber-physical attacks on machining systems
verfasst von
Mohammed S. Shafae
Lee J. Wells
Gregory T. Purdy
Publikationsdatum
24.05.2019
Verlag
Springer London
Erschienen in
The International Journal of Advanced Manufacturing Technology / Ausgabe 9/2019
Print ISSN: 0268-3768
Elektronische ISSN: 1433-3015
DOI
https://doi.org/10.1007/s00170-019-03805-z

Weitere Artikel der Ausgabe 9/2019

The International Journal of Advanced Manufacturing Technology 9/2019 Zur Ausgabe

    Marktübersichten

    Die im Laufe eines Jahres in der „adhäsion“ veröffentlichten Marktübersichten helfen Anwendern verschiedenster Branchen, sich einen gezielten Überblick über Lieferantenangebote zu verschaffen.