Skip to main content

Automatic Control Approach to the Cyber-Physical Systems Security Monitoring

  • Conference paper
  • First Online:
Algorithms and Solutions Based on Computer Technology

Abstract

Monitoring the security of cyber-physical systems (CPS), including IoTh components, is an important task for modern information security. Modern approaches to the protection of cyber-physical systems are based on the theory of control and sustainability, but the CPS is not considered from this point of view as an object of evaluation and analysis (monitoring). The novelty of the work is that the cyber-physical system is considered as an object of management (control) of information security based on the approaches of the theory of automatic control. The article presents the concept of a cyber-physical system as an object of protection, formalizes the characteristics of controllability, observability and identifiability of the system in relation to security management. An approach to the evaluation of these characteristics is given. A practical example is the characteristics of a monitoring system based on the work of Peter the Great St. Petersburg Polytechnic University. The proposed approach develops the theory of protection of cyber-physical systems on the basis of stability.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sanfelice, R.G.: Analysis and design of cyber-physical systems. A hybrid control systems approach. In: Cyber-Physical Systems: From Theory to Practice, pp. 3–31. CRC Press (2016)

    Google Scholar 

  2. Zegzhda, D.P.: Problems of cyber stability of digital production. In: Proceedings 26th Scientific and Technical Conference “Methods and Technical Means of Ensuring Information Security”, St. Petersburg, Russia, pp. 85–86. Polytechnic publishing House, St. Petersburg (2017)

    Google Scholar 

  3. Zegzhda, D.P., Poltavtseva, M.A., Lavrova, D.S.: Systematization and security assessment of cyber-physical systems. Aut. Control Comp. Sci. 51, 835–843 (2017). https://doi.org/10.3103/S0146411617080272

    Article  Google Scholar 

  4. Aleksandrova, E.B., Shtyrkina, A.A., Iarmak, A.V.: Post-quantum primitives in information security. Nonlinear Phenom. Complex Syst. 22(3), 269–276 (2019)

    MATH  Google Scholar 

  5. Aleksandrova, E.B., Shtyrkina, A.A., Yarmak, A.V.: Post-quantum group-oriented authentication in IoT. Nonlinear Phenom. Complex Syst. 23(4), 405–413 (2020). https://doi.org/10.33581/1561-4085-2020-23-4-405-413

    Article  Google Scholar 

  6. Zegzhda, D.P.: Sustainability as a criterion for information security in cyber-physical systems. Aut. Control Comp. Sci. 50, 813–819 (2016). https://doi.org/10.3103/S0146411616080253

    Article  Google Scholar 

  7. Petrenko, S.A.: Management of cyber stability: problem statement. Inf. Prot. Inside 3(87), 16–24 (2019)

    Google Scholar 

  8. Luckham, D.: The power of events: an introduction to complex event processing in distributed enterprise systems. In: Rule Representation, Interchange and Reasoning on the Web. RuleML. LNCS, vol. 5321, pp. 3–3. Springer (2008)

    Google Scholar 

  9. Barker, G.T., Alexander, B., Talley, P.: US6542075B2. System and method for providing configurable security monitoring utilizing an integrated information portal (2000). https://patents.google.com/patent/US6542075B2/en?oq=US6542075B2

  10. Andersen, C., Alexander, B., Bahneman, L.: US7627665B2. System and method for providing configurable security monitoring utilizing an integrated information system (2015). https://patents.google.com/patent/US7627665B2/en

  11. Klasa, T., Fray, I.: El Load-balanced integrated information security monitoring system. In: Communication Papers of the 2017 Federated Conference on Computer Science and Information Systems, Prague, Czech Republic, ACSIS, 2017, vol. 13, pp. 213–221 (2017)

    Google Scholar 

  12. Gertner, Y., Herz, F.S.M., Labys, W.P.: US9503470B2 Distributed agent based model for security monitoring and response (2002). https://patents.google.com/patent/US9503470B2/en

  13. Farrand, T.E.: US9633547B2. Security monitoring and control (2014). https://patents.google.com/patent/US9633547B2/en

  14. Saenko, I.B., Kushnerevich, A.G., Kotenko, I.V.: Implementation of a distributed parallel computing platform for collecting and preprocessing big monitoring data in cyber-physical systems. In: Materials of the International Scientific Congress. International Congress on Informatics: Information Systems and Technologies (CSIST-2016). Republic of Belarus, Minsk, 24–27 October 2016–2016, pp. 641–645 (2016)

    Google Scholar 

  15. Sajid, A., Abbas, H., Saleem, K.: Cloud-assisted IoT-based SCADA systems security: a review of the state of the art and future challenges. IEEE Access 4, 1375–1384 (2016). https://doi.org/10.1109/ACCESS.2016.2549047

  16. Knapp, E., Langill, J.: Security Monitoring of Industrial Control Systems. Industrial Network Security. 2nd ed. Syngress Publishing (2014)

    Google Scholar 

  17. Marchal, S., Jiang, X., State, R., Engel, T.: A big data architecture for large scale security monitoring. In: 2014 IEEE International Congress on Big Data, Anchorage, USA, 2014, pp. 56–63. IEEE (2014)

    Google Scholar 

  18. Manogaran, G., et al.: A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system. Future Gener. Comput. Syst. 82, 375–387 (2018). https://doi.org/10.1016/j.future.2017.10.045

  19. Coletta, A., Armando, A.: Security monitoring for industrial control systems. In: Security of Industrial Control Systems and Cyber Physical Systems. CyberICS 2015, WOS-CPS 2015. LNCS, vol. 9588, pp. 48–62. Springer (2015)

    Google Scholar 

  20. Trihinas, D., Pallis, G., Dikaiakos, M.: Low-cost adaptive monitoring techniques for the internet of things. IEEE Trans. Serv. Comput. (2018)

    Google Scholar 

  21. Lv, F., Wen, C., Liu, M.: Representation learning based adaptive multimode process monitoring. Chemom. Intell. Lab. Syst. 181, 95–104 (2018). https://doi.org/10.1109/TSC.2018.2808956

  22. Shang, C., Yang, F., Huang, B., Huang, D.: Recursive slow feature analysis for adaptive monitoring of industrial processes. IEEE Trans. Industr. Electr. 65, 8895–8905 (2018). https://doi.org/10.1109/TIE.2018.2811358

    Article  Google Scholar 

  23. Hansch, G., Schneider, P., Brost, G.S.: Deriving impact-driven security requirements and monitoring measures for industrial IoT. In: Proceedings of the 5th on Cyber-Physical System Security Workshop (CPSS ’19). Association for Computing Machinery, New York, NY, USA, pp. 37–45 (2019). https://doi.org/10.1145/3327961.3329528

  24. Wolf, J., et al.: Adaptive modelling for security analysis of networked control systems. In: 4th International Symposium for ICS & SCADA Cyber Security Research 2016, Electronic Workshops in Computing, pp. 64–73 (2016). https://doi.org/10.14236/ewic/ICS2016.8

  25. Brost, G.S., et al.: An ecosystem and IoT device architecture for building trust in the industrial data space. In: Proceedings of the 4th ACM Workshop on Cyber-Physical System Security (CPSS ’18). Association for Computing Machinery, New York, NY, USA, pp. 39–50 (2018). https://doi.org/10.1145/3198458.3198459

  26. Vasil’ev, Y.S., Zegzhda, D.P., Poltavtseva, M.A.: Problems of security in digital production and its resistance to cyber threats. Aut. Control Comp. Sci. 52, 1090–1100 (2018). https://doi.org/10.3103/S0146411618080254

  27. Zegzhda, D.P., Pavlenko, E.Y.: Digital manufacturing security indicators. Aut. Control Comp. Sci. 52, 1150–1159 (2018). https://doi.org/10.3103/S0146411618080333

    Article  Google Scholar 

  28. Gorbachev, I.E., Glukhov, A.P.: Modeling of information security violations of critical infrastructure. In: Proceedings of SPIIRAN, vol. 38, pp. 112–135 (2015)

    Google Scholar 

  29. Emelyanov, S.V.: Mathematical Methods of Control Theory. Problems of Sustainability, Controllability and observability, 200 p. FIZMATLIT, Moscow (2014)

    Google Scholar 

  30. Pavlenko, E.Y., Yarmak, A.V., Moskvin, D.A.: Hierarchical approach to analyzing security breaches in information systems. Aut. Control Comp. Sci. 51, 829–834 (2017). https://doi.org/10.3103/S0146411617080144

    Article  Google Scholar 

  31. Pavlenko, E., Zegzhda, D., Shtyrkina, A.: Criterion of cyber-physical systems sustainability In: 10th Anniversary International Scientific and Technical Conference on Secure Information Technologies, BIT 2019; Moscow, vol. 2603, pp. 60–64 (2019)

    Google Scholar 

  32. Zegzhda, D.P., Pavlenko, E.Y.: Cyber-physical system homeostatic security management. Aut. Control Comp. Sci. 51, 805–816 (2017). https://doi.org/10.3103/S0146411617080260

    Article  Google Scholar 

  33. Zegzhda, D.P., Usov, E.S., Nikol’skii, A.V., et al.: Use of Intel SGX to ensure the confidentiality of data of cloud users. Aut. Control Comp. Sci. 51, 848–854 (2017). https://doi.org/10.3103/S0146411617080284

  34. Lavrova, D.S.: An approach to developing the SIEM system for the internet of things. Aut. Control Comp. Sci. 50, 673–681 (2016). https://doi.org/10.3103/S0146411616080125

    Article  Google Scholar 

  35. Zegzhda, D., Zegzhda, P., Pechenkin, A., et al.: Modeling of information systems to their security evaluation. In: Proceedings of the 10th International Conference on Security of Information and Networks (SIN’17). Association for Computing Machinery, New York, NY, USA, pp. 295–298 (2017). https://doi.org/10.1145/3136825.3136857

  36. Lavrova, D.S., Zaitseva, E.A., Zegzhda, D.P.: Approach to presenting network infrastructure of cyberphysical systems to minimize the cyberattack neutralization time. Aut. Control Comp. Sci. 53, 387–392 (2019). https://doi.org/10.3103/S0146411619050067

    Article  Google Scholar 

  37. Lavrova, D., Zegzhda, D., Yarmak, A.: Using GRU neural network for cyber-attack detection in automated process control systems. In: 2019 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), Sochi, Russia, pp. 1–3 (2019). https://doi.org/10.1109/BlackSeaCom.2019.8812818

  38. Poltavtseva, M.A., Zegzhda, D.P., Pavlenko, E.Y.: High-performance NIDS architecture for enterprise networking. In: 2019 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), Sochi, Russia, pp. 1–3 (2019). https://doi.org/10.1109/BlackSeaCom.2019.8812808

  39. Lavrova, D., Zegzhda, D., Yarmak, A.: Predicting cyber attacks on industrial systems using the Kalman filter. In: 2019 Third World Conference on Smart Trends in Systems Security and Sustainablity (WorldS4), London, United Kingdom, pp. 317–321 (2019). https://doi.org/10.1109/WorldS4.2019.8904038

  40. Zegzhda, D., Lavrova, D., Poltavtseva, M.: Multifractal security analysis of cyberphysical systems. Nonlinear Phenom. Complex Syst. 22, 196–204 (2019)

    Google Scholar 

  41. Stepanova, T., Pechenkin, A., Lavrova, D.: Ontology-based big data approach to automated penetration testing of large-scale heterogeneous systems. In: Proceedings of the 8th International Conference on Security of Information and Networks (SIN ’15). Association for Computing Machinery, New York, NY, USA, pp. 142–149 (2015). https://doi.org/10.1145/2799979.2799995

  42. Zegzhda, P.D., Poltavtseva, M.A., Pechenkin, A.I., et al.: A use case analysis of heterogeneous semistructured objects in information security problems. Aut. Control Comp. Sci. 52, 918–930 (2018). https://doi.org/10.3103/S0146411618080278

    Article  Google Scholar 

  43. Zaitseva, E.A., Zegzhda, D.P., Poltavtseva, M.A.: Use of graph representation and case analysis to assess the security of computer systems. Aut. Control Comp. Sci. 53, 937–947 (2019). https://doi.org/10.3103/S0146411619080327

    Article  Google Scholar 

  44. Neusypin, K.A., Proletarsky, A.V., Kuznetsov, I.A.: Investigation of the degree of identifiability of parameters of dynamic systems. Bulletin of the Moscow state technical University named after G. I. Nosov., vol. 2, no. 50 (2015)

    Google Scholar 

  45. Humayed, A., et al.: Cyber-physical systems security—a survey. IEEE Internet Things J. 4(6), 1802–1831 (2017). https://doi.org/10.1109/JIOT.2017.2703172

    Article  Google Scholar 

  46. Giraldo, J., et al.: A survey of physics-based attack detection in cyber-physical systems. ACM Comput. Surv. 51, 1–36 (2018). https://doi.org/10.1145/3203245

Download references

Acknowledgements

The reported study was funded by Russian Ministry of Science (information security), project number 2/2020.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Maria Poltavtseva .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Poltavtseva, M., Tick, A. (2022). Automatic Control Approach to the Cyber-Physical Systems Security Monitoring. In: Jahn, C., Ungvári, L., Ilin, I. (eds) Algorithms and Solutions Based on Computer Technology. Lecture Notes in Networks and Systems, vol 387. Springer, Cham. https://doi.org/10.1007/978-3-030-93872-7_2

Download citation

Publish with us

Policies and ethics