Skip to main content
Top

2020 | OriginalPaper | Chapter

Reflective Attenuation of Cyber-Physical Attacks

Authors : Mariana Segovia, Ana Rosa Cavalli, Nora Cuppens, Jose Rubio-Hernan, Joaquin Garcia-Alfaro

Published in: Computer Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cyber-physical systems (CPS) integrate computation and networking resources to control a physical process. The adoption of new communication capabilities comes at the cost of introducing new security threats that need to be handled properly. Threats must be addressed at cyber and physical domains at the same time in order to detect and automatically mitigate the threats. In this paper, we elaborate an approach to attenuate cyber-physical attacks driven by reflective programmable networking actions, in order to take control of adversarial actions against cyber-physical systems. The approach builds upon the concept of programmable reflection and programmable networking. We validate the approach using experimental work.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Albert, R., Jeong, H., Barabási, A.-L.: Error and attack tolerance of complex networks. Nature 406(6794), 378 (2000)CrossRef Albert, R., Jeong, H., Barabási, A.-L.: Error and attack tolerance of complex networks. Nature 406(6794), 378 (2000)CrossRef
2.
go back to reference Campbell, A.T., Katzela, I., Miki, K., Vicente, J.: Open signaling for ATM, internet and mobile networks (OPENSIG’98). SIGCOMM Comput. Commun. Rev. 29(1), 97–108 (1999)CrossRef Campbell, A.T., Katzela, I., Miki, K., Vicente, J.: Open signaling for ATM, internet and mobile networks (OPENSIG’98). SIGCOMM Comput. Commun. Rev. 29(1), 97–108 (1999)CrossRef
4.
go back to reference Coulson, G., et al.: Reflective middleware-based programmable networking. In: The 2nd International Workshop on Reflective and Adaptive Middleware, pp. 115–119 (2003) Coulson, G., et al.: Reflective middleware-based programmable networking. In: The 2nd International Workshop on Reflective and Adaptive Middleware, pp. 115–119 (2003)
5.
go back to reference Elteto, T., Molnar, S.: On the distribution of round-trip delays in TCP/IP networks, pp. 172–181, November 1999 Elteto, T., Molnar, S.: On the distribution of round-trip delays in TCP/IP networks, pp. 172–181, November 1999
8.
go back to reference Hachem, N., Debar, H., Garcia-Alfaro, J.: HADEGA: a novel MPLS-based mitigation solution to handle network attacks. In: 31st IEEE International Performance Computing and Communications Conference, IPCCC 2012, Austin, TX, USA, 1–3 December 2012, pp. 171–180 (2012) Hachem, N., Debar, H., Garcia-Alfaro, J.: HADEGA: a novel MPLS-based mitigation solution to handle network attacks. In: 31st IEEE International Performance Computing and Communications Conference, IPCCC 2012, Austin, TX, USA, 1–3 December 2012, pp. 171–180 (2012)
9.
go back to reference Jajodia, S., Ghosh, A.K., Swarup, V., Wang, C., Sean Wang, X.: Moving Target Defense: Creating Asymmetric Uncertainty For Cyber Threats, vol. 54. Springer, New York (2011)CrossRef Jajodia, S., Ghosh, A.K., Swarup, V., Wang, C., Sean Wang, X.: Moving Target Defense: Creating Asymmetric Uncertainty For Cyber Threats, vol. 54. Springer, New York (2011)CrossRef
10.
go back to reference Joolia, A., Coulson, G., Blair, G., Gomes, A.T., Lee, K., Ueyama, J.: Flexible programmable networking: a reflective, component-based approach (2003) Joolia, A., Coulson, G., Blair, G., Gomes, A.T., Lee, K., Ueyama, J.: Flexible programmable networking: a reflective, component-based approach (2003)
11.
go back to reference Kreutz, D., Ramos, F.M.V., Verissimo, P.E., Rothenberg, C.E., Azodolmolky, S., Uhlig, S.: Software-defined networking: a comprehensive survey. Proc. IEEE 103(1), 14–76 (2015)CrossRef Kreutz, D., Ramos, F.M.V., Verissimo, P.E., Rothenberg, C.E., Azodolmolky, S., Uhlig, S.: Software-defined networking: a comprehensive survey. Proc. IEEE 103(1), 14–76 (2015)CrossRef
12.
go back to reference Krotofil, M., Larsen, J.: Rocking the pocket book: hacking chemical plants for competition and extortion. DEF CON, 23 (2015) Krotofil, M., Larsen, J.: Rocking the pocket book: hacking chemical plants for competition and extortion. DEF CON, 23 (2015)
13.
go back to reference Kuipers, D., Fabro, M.: Control systems cyber security: defense in depth strategies. Technical report, Idaho National Laboratory (INL) (2006) Kuipers, D., Fabro, M.: Control systems cyber security: defense in depth strategies. Technical report, Idaho National Laboratory (INL) (2006)
14.
go back to reference Lagu, S.S., Deshmukh, S.B.: Raspberry Pi for automation of water treatment plant. In: 2015 International Conference on Computing Communication Control and Automation (ICCUBEA), pp. 532–536, February 2015 Lagu, S.S., Deshmukh, S.B.: Raspberry Pi for automation of water treatment plant. In: 2015 International Conference on Computing Communication Control and Automation (ICCUBEA), pp. 532–536, February 2015
16.
go back to reference Ogata, K., Yang, Y.: Modern Control Engineering, vol. 4. Prentice-Hall, Upper Saddle River (2002) Ogata, K., Yang, Y.: Modern Control Engineering, vol. 4. Prentice-Hall, Upper Saddle River (2002)
17.
go back to reference Piedrahita, A.F.M., Gaur, V., Giraldo, J., Cardenas, A.A., Rueda, S.J.: Virtual incident response functions in control systems. Comput. Netw. 135, 147–159 (2018)CrossRef Piedrahita, A.F.M., Gaur, V., Giraldo, J., Cardenas, A.A., Rueda, S.J.: Virtual incident response functions in control systems. Comput. Netw. 135, 147–159 (2018)CrossRef
18.
go back to reference Queiroz, C., Mahmood, A., Tari, Z.: SCADAsim–a framework for building SCADA simulations. IEEE Trans. Smart Grid 2(4), 589–597 (2011)CrossRef Queiroz, C., Mahmood, A., Tari, Z.: SCADAsim–a framework for building SCADA simulations. IEEE Trans. Smart Grid 2(4), 589–597 (2011)CrossRef
19.
21.
go back to reference Rubio-Hernan, J., De Cicco, L., Garcia-Alfaro, J.: Revisiting a watermark-based detection scheme to handle cyber-physical attacks. In: 2016 11th International Conference on Availability, Reliability and Security (ARES), pp. 21–28. IEEE, August 2016 Rubio-Hernan, J., De Cicco, L., Garcia-Alfaro, J.: Revisiting a watermark-based detection scheme to handle cyber-physical attacks. In: 2016 11th International Conference on Availability, Reliability and Security (ARES), pp. 21–28. IEEE, August 2016
23.
go back to reference Rubio-Hernan, J., Sahay, R., De Cicco, L., Garcia-Alfaro, J.: Cyber-physical architecture assisted by programmable networking. Internet Technol. Lett. 1, e44 (2018)CrossRef Rubio-Hernan, J., Sahay, R., De Cicco, L., Garcia-Alfaro, J.: Cyber-physical architecture assisted by programmable networking. Internet Technol. Lett. 1, e44 (2018)CrossRef
24.
go back to reference Sahay, R., Blanc, G., Zhang, Z., Debar, H.: Towards autonomic DDoS mitigation using software defined networking. In: SENT 2015: NDSS Workshop on Security of Emerging Networking Technologies, San Diego, CA, USA. Internet society, February 2015 Sahay, R., Blanc, G., Zhang, Z., Debar, H.: Towards autonomic DDoS mitigation using software defined networking. In: SENT 2015: NDSS Workshop on Security of Emerging Networking Technologies, San Diego, CA, USA. Internet society, February 2015
25.
go back to reference Segovia, M., Cavalli, A.R., Cuppens, N., Garcia-Alfaro, J.: A study on mitigation techniques for SCADA-driven cyber-physical systems (position paper). In: Zincir-Heywood, N., Bonfante, G., Debbabi, M., Garcia-Alfaro, J. (eds.) FPS 2018. LNCS, vol. 11358, pp. 257–264. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-18419-3_17CrossRef Segovia, M., Cavalli, A.R., Cuppens, N., Garcia-Alfaro, J.: A study on mitigation techniques for SCADA-driven cyber-physical systems (position paper). In: Zincir-Heywood, N., Bonfante, G., Debbabi, M., Garcia-Alfaro, J. (eds.) FPS 2018. LNCS, vol. 11358, pp. 257–264. Springer, Cham (2019). https://​doi.​org/​10.​1007/​978-3-030-18419-3_​17CrossRef
27.
go back to reference Teixeira, A., Shames, I., Sandberg, H., Johansson, K.H.: A secure control framework for resource-limited adversaries. Automatica 51, 135–148 (2015)MathSciNetCrossRef Teixeira, A., Shames, I., Sandberg, H., Johansson, K.H.: A secure control framework for resource-limited adversaries. Automatica 51, 135–148 (2015)MathSciNetCrossRef
28.
go back to reference Tennenhouse, D.L., Smith, J.M., Sincoskie, W.D., Wetherall, D.J., Minden, G.J.: A survey of active network research. Comm. Mag. 35(1), 80–86 (1997)CrossRef Tennenhouse, D.L., Smith, J.M., Sincoskie, W.D., Wetherall, D.J., Minden, G.J.: A survey of active network research. Comm. Mag. 35(1), 80–86 (1997)CrossRef
31.
go back to reference Varga, A., Hornig, R.: An overview of the OMNeT++ simulation environment. In: 1st International Conference on Simulation Tools and Techniques for Communications, Networks and Systems & Workshops (Simutools) (2008) Varga, A., Hornig, R.: An overview of the OMNeT++ simulation environment. In: 1st International Conference on Simulation Tools and Techniques for Communications, Networks and Systems & Workshops (Simutools) (2008)
Metadata
Title
Reflective Attenuation of Cyber-Physical Attacks
Authors
Mariana Segovia
Ana Rosa Cavalli
Nora Cuppens
Jose Rubio-Hernan
Joaquin Garcia-Alfaro
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-42048-2_2

Premium Partner