Skip to main content
Top
Published in: Automatic Control and Computer Sciences 8/2022

01-12-2022

Systematization of Cyber Threats to Large-Scale Systems with Adaptive Network Topology

Author: E. Yu. Pavlenko

Published in: Automatic Control and Computer Sciences | Issue 8/2022

Login to get access

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This work is devoted to the study and systematization of cyber threats to large-scale cyber-physical systems (CPSs) with a dynamic network infrastructure. The proposed systematization provides a one-time view of the specifics of such systems in terms of security, attacker’s goals, and levels of the TCP/IP network stack. In general, the systematization is the basis for creating a new technology for protecting complex dynamic systems, allowing one to gain knowledge about what network interaction parameters need to be controlled to protect against certain cyber threats.
Literature
1.
go back to reference Narasimhan, V.L., Arvind, A.A., and Bever, K., Greenhouse asset management using wireless sensor-actuator networks, Int. Conf. on Mobile Ubiquitous Computing, Systems, Services and Technologies, Papeete, France, 2007, IEEE, 2007, pp. 9–14. https://doi.org/10.1109/UBICOMM.2007.43 Narasimhan, V.L., Arvind, A.A., and Bever, K., Greenhouse asset management using wireless sensor-actuator networks, Int. Conf. on Mobile Ubiquitous Computing, Systems, Services and Technologies, Papeete, France, 2007, IEEE, 2007, pp. 9–14.  https://​doi.​org/​10.​1109/​UBICOMM.​2007.​43
4.
go back to reference Kalinin, M., Krundyshev, V., Zegzhda, P., and Belenko, V., Network security architectures for VANET, SIN ’17: Proc. 10th Int. Conf. on Security of Information and Networks, Jaipur, India, 2017, New York: Association for Computing Machinery, 2017, pp. 73–79. https://doi.org/10.1145/3136825.3136890 Kalinin, M., Krundyshev, V., Zegzhda, P., and Belenko, V., Network security architectures for VANET, SIN ’17: Proc. 10th Int. Conf. on Security of Information and Networks, Jaipur, India, 2017, New York: Association for Computing Machinery, 2017, pp. 73–79.  https://​doi.​org/​10.​1145/​3136825.​3136890
9.
11.
go back to reference Thiagarajan, A., Ravindranath, L., LaCurts, K., Madden, S., Balakrishnan, H., Toledo, S., and Eriksson, J., VTrack: Accurate, energy-aware road traffic delay estimation using mobile phones, SenSys ’09: Proc. 7th ACM Conf. on Embedded Networked Sensor Systems, Berkeley, Calif.: 2009, New York: Association for Computing Machinery, 2009, pp. 85–98. https://doi.org/10.1145/1644038.1644048 Thiagarajan, A., Ravindranath, L., LaCurts, K., Madden, S., Balakrishnan, H., Toledo, S., and Eriksson, J., VTrack: Accurate, energy-aware road traffic delay estimation using mobile phones, SenSys ’09: Proc. 7th ACM Conf. on Embedded Networked Sensor Systems, Berkeley, Calif.: 2009, New York: Association for Computing Machinery, 2009, pp. 85–98.  https://​doi.​org/​10.​1145/​1644038.​1644048
12.
go back to reference Mathur, S., Jin. T., Kasturirangan, N., Chandrashekharan, J., Xue, W., Gruteser, M., and Trappe, W., ParkNet: Drive-by sensing of road-side parking statistics, MobiSys ’10: Proc. 8th Int. Conf. on Mobile Systems, Applications, and Services, San Francisco, 2010, New York: Association for Computing Machinery, 2010, pp. 123–136. https://doi.org/10.1145/1814433.1814448 Mathur, S., Jin. T., Kasturirangan, N., Chandrashekharan, J., Xue, W., Gruteser, M., and Trappe, W., ParkNet: Drive-by sensing of road-side parking statistics, MobiSys ’10: Proc. 8th Int. Conf. on Mobile Systems, Applications, and Services, San Francisco, 2010, New York: Association for Computing Machinery, 2010, pp. 123–136.  https://​doi.​org/​10.​1145/​1814433.​1814448
13.
go back to reference Rani, V. and Dhir, R., A study of ad-hoc network: A review, Int. J. Adv. Res. Comput. Sci. Software Eng., 2013, vol. 3, no. 3, pp. 135–138. Rani, V. and Dhir, R., A study of ad-hoc network: A review, Int. J. Adv. Res. Comput. Sci. Software Eng., 2013, vol. 3, no. 3, pp. 135–138.
14.
go back to reference Amulya, V.V., Cyber physical systems by using wireless sensor networks, 2018. Amulya, V.V., Cyber physical systems by using wireless sensor networks, 2018.
15.
16.
go back to reference Intanagonwiwat, C., Govindan, R., and Estrin, D., Directed diffusion: a scalable and robust communication paradigm for sensor networks, MobiCom ’00: Proc. 6th Annu. Int. Conf. on Mobile Computing and Networking, Boston, 2000, New York: Association for Computing Machinery, 2000, pp. 56–67. https://doi.org/10.1145/345910.345920 Intanagonwiwat, C., Govindan, R., and Estrin, D., Directed diffusion: a scalable and robust communication paradigm for sensor networks, MobiCom ’00: Proc. 6th Annu. Int. Conf. on Mobile Computing and Networking, Boston, 2000, New York: Association for Computing Machinery, 2000, pp. 56–67.  https://​doi.​org/​10.​1145/​345910.​345920
18.
go back to reference Wang, X., Xing, G., Zhang, Yu., Lu, Ch., Pless, R., and Gill, C., Integrated coverage and connectivity configuration in wireless sensor networks, SenSys ’03: Proc. 1st Int. Conf. on Embedded Networked Sensor Systems, 2003, New York: Association for Computing Machinery, Los Angeles, 2003, pp. 28–39. https://doi.org/10.1145/958491.958496 Wang, X., Xing, G., Zhang, Yu., Lu, Ch., Pless, R., and Gill, C., Integrated coverage and connectivity configuration in wireless sensor networks, SenSys ’03: Proc. 1st Int. Conf. on Embedded Networked Sensor Systems, 2003, New York: Association for Computing Machinery, Los Angeles, 2003, pp. 28–39.  https://​doi.​org/​10.​1145/​958491.​958496
21.
go back to reference Swetha, M.S., Thungamani, M. and Krishnan, K., A Survey on different types of MANET attacks in OSI model, Int. J. Innovative Res. Sci. Technol., 2018, vol. 4, no. 12, pp. 18–23. Swetha, M.S., Thungamani, M. and Krishnan, K., A Survey on different types of MANET attacks in OSI model, Int. J. Innovative Res. Sci. Technol., 2018, vol. 4, no. 12, pp. 18–23.
23.
go back to reference Wu, B., Chen, J., Wu, J., and Cardei, M., A survey of attacks and countermeasures in mobile ad hoc networks, Wireless Network Security, Xiao, Y., Shen, X.S., and Du, D.Z., Eds., Signals and Communication Technology, Boston: Springer, 2007, pp. 103–135. https://doi.org/10.1007/978-0-387-33112-6_5 Wu, B., Chen, J., Wu, J., and Cardei, M., A survey of attacks and countermeasures in mobile ad hoc networks, Wireless Network Security, Xiao, Y., Shen, X.S., and Du, D.Z., Eds., Signals and Communication Technology, Boston: Springer, 2007, pp. 103–135.  https://​doi.​org/​10.​1007/​978-0-387-33112-6_​5
25.
go back to reference Lacharité, Y., Wang, M., and Lamont, L., Findings on a semantically-based intrusion detection approach for olsr manet protocol, 3rd OLSR Interop Workshop, 2006, pp. 2–6. Lacharité, Y., Wang, M., and Lamont, L., Findings on a semantically-based intrusion detection approach for olsr manet protocol, 3rd OLSR Interop Workshop, 2006, pp. 2–6.
26.
go back to reference Jenniefer, A. and Jose, J., Techniques for identifying denial of service attack in wireless sensor network: A survey, Int. J. Adv. Res. Comput. Commun. Eng., 2014, vol. 3. Jenniefer, A. and Jose, J., Techniques for identifying denial of service attack in wireless sensor network: A survey, Int. J. Adv. Res. Comput. Commun. Eng., 2014, vol. 3.
27.
go back to reference Saluja, K.K. and Kakkar, P., The DDOS attacks in MANET-a review, J. Inf. Syst. Commun., 2012, vol. 3, no. 1, p. 310. Saluja, K.K. and Kakkar, P., The DDOS attacks in MANET-a review, J. Inf. Syst. Commun., 2012, vol. 3, no. 1, p. 310.
Metadata
Title
Systematization of Cyber Threats to Large-Scale Systems with Adaptive Network Topology
Author
E. Yu. Pavlenko
Publication date
01-12-2022
Publisher
Pleiades Publishing
Published in
Automatic Control and Computer Sciences / Issue 8/2022
Print ISSN: 0146-4116
Electronic ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411622080132

Other articles of this Issue 8/2022

Automatic Control and Computer Sciences 8/2022 Go to the issue