Abstract
Monitoring the security of cyber-physical systems (CPS), including IoTh components, is an important task for modern information security. Modern approaches to the protection of cyber-physical systems are based on the theory of control and sustainability, but the CPS is not considered from this point of view as an object of evaluation and analysis (monitoring). The novelty of the work is that the cyber-physical system is considered as an object of management (control) of information security based on the approaches of the theory of automatic control. The article presents the concept of a cyber-physical system as an object of protection, formalizes the characteristics of controllability, observability and identifiability of the system in relation to security management. An approach to the evaluation of these characteristics is given. A practical example is the characteristics of a monitoring system based on the work of Peter the Great St. Petersburg Polytechnic University. The proposed approach develops the theory of protection of cyber-physical systems on the basis of stability.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sanfelice, R.G.: Analysis and design of cyber-physical systems. A hybrid control systems approach. In: Cyber-Physical Systems: From Theory to Practice, pp. 3–31. CRC Press (2016)
Zegzhda, D.P.: Problems of cyber stability of digital production. In: Proceedings 26th Scientific and Technical Conference “Methods and Technical Means of Ensuring Information Security”, St. Petersburg, Russia, pp. 85–86. Polytechnic publishing House, St. Petersburg (2017)
Zegzhda, D.P., Poltavtseva, M.A., Lavrova, D.S.: Systematization and security assessment of cyber-physical systems. Aut. Control Comp. Sci. 51, 835–843 (2017). https://doi.org/10.3103/S0146411617080272
Aleksandrova, E.B., Shtyrkina, A.A., Iarmak, A.V.: Post-quantum primitives in information security. Nonlinear Phenom. Complex Syst. 22(3), 269–276 (2019)
Aleksandrova, E.B., Shtyrkina, A.A., Yarmak, A.V.: Post-quantum group-oriented authentication in IoT. Nonlinear Phenom. Complex Syst. 23(4), 405–413 (2020). https://doi.org/10.33581/1561-4085-2020-23-4-405-413
Zegzhda, D.P.: Sustainability as a criterion for information security in cyber-physical systems. Aut. Control Comp. Sci. 50, 813–819 (2016). https://doi.org/10.3103/S0146411616080253
Petrenko, S.A.: Management of cyber stability: problem statement. Inf. Prot. Inside 3(87), 16–24 (2019)
Luckham, D.: The power of events: an introduction to complex event processing in distributed enterprise systems. In: Rule Representation, Interchange and Reasoning on the Web. RuleML. LNCS, vol. 5321, pp. 3–3. Springer (2008)
Barker, G.T., Alexander, B., Talley, P.: US6542075B2. System and method for providing configurable security monitoring utilizing an integrated information portal (2000). https://patents.google.com/patent/US6542075B2/en?oq=US6542075B2
Andersen, C., Alexander, B., Bahneman, L.: US7627665B2. System and method for providing configurable security monitoring utilizing an integrated information system (2015). https://patents.google.com/patent/US7627665B2/en
Klasa, T., Fray, I.: El Load-balanced integrated information security monitoring system. In: Communication Papers of the 2017 Federated Conference on Computer Science and Information Systems, Prague, Czech Republic, ACSIS, 2017, vol. 13, pp. 213–221 (2017)
Gertner, Y., Herz, F.S.M., Labys, W.P.: US9503470B2 Distributed agent based model for security monitoring and response (2002). https://patents.google.com/patent/US9503470B2/en
Farrand, T.E.: US9633547B2. Security monitoring and control (2014). https://patents.google.com/patent/US9633547B2/en
Saenko, I.B., Kushnerevich, A.G., Kotenko, I.V.: Implementation of a distributed parallel computing platform for collecting and preprocessing big monitoring data in cyber-physical systems. In: Materials of the International Scientific Congress. International Congress on Informatics: Information Systems and Technologies (CSIST-2016). Republic of Belarus, Minsk, 24–27 October 2016–2016, pp. 641–645 (2016)
Sajid, A., Abbas, H., Saleem, K.: Cloud-assisted IoT-based SCADA systems security: a review of the state of the art and future challenges. IEEE Access 4, 1375–1384 (2016). https://doi.org/10.1109/ACCESS.2016.2549047
Knapp, E., Langill, J.: Security Monitoring of Industrial Control Systems. Industrial Network Security. 2nd ed. Syngress Publishing (2014)
Marchal, S., Jiang, X., State, R., Engel, T.: A big data architecture for large scale security monitoring. In: 2014 IEEE International Congress on Big Data, Anchorage, USA, 2014, pp. 56–63. IEEE (2014)
Manogaran, G., et al.: A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system. Future Gener. Comput. Syst. 82, 375–387 (2018). https://doi.org/10.1016/j.future.2017.10.045
Coletta, A., Armando, A.: Security monitoring for industrial control systems. In: Security of Industrial Control Systems and Cyber Physical Systems. CyberICS 2015, WOS-CPS 2015. LNCS, vol. 9588, pp. 48–62. Springer (2015)
Trihinas, D., Pallis, G., Dikaiakos, M.: Low-cost adaptive monitoring techniques for the internet of things. IEEE Trans. Serv. Comput. (2018)
Lv, F., Wen, C., Liu, M.: Representation learning based adaptive multimode process monitoring. Chemom. Intell. Lab. Syst. 181, 95–104 (2018). https://doi.org/10.1109/TSC.2018.2808956
Shang, C., Yang, F., Huang, B., Huang, D.: Recursive slow feature analysis for adaptive monitoring of industrial processes. IEEE Trans. Industr. Electr. 65, 8895–8905 (2018). https://doi.org/10.1109/TIE.2018.2811358
Hansch, G., Schneider, P., Brost, G.S.: Deriving impact-driven security requirements and monitoring measures for industrial IoT. In: Proceedings of the 5th on Cyber-Physical System Security Workshop (CPSS ’19). Association for Computing Machinery, New York, NY, USA, pp. 37–45 (2019). https://doi.org/10.1145/3327961.3329528
Wolf, J., et al.: Adaptive modelling for security analysis of networked control systems. In: 4th International Symposium for ICS & SCADA Cyber Security Research 2016, Electronic Workshops in Computing, pp. 64–73 (2016). https://doi.org/10.14236/ewic/ICS2016.8
Brost, G.S., et al.: An ecosystem and IoT device architecture for building trust in the industrial data space. In: Proceedings of the 4th ACM Workshop on Cyber-Physical System Security (CPSS ’18). Association for Computing Machinery, New York, NY, USA, pp. 39–50 (2018). https://doi.org/10.1145/3198458.3198459
Vasil’ev, Y.S., Zegzhda, D.P., Poltavtseva, M.A.: Problems of security in digital production and its resistance to cyber threats. Aut. Control Comp. Sci. 52, 1090–1100 (2018). https://doi.org/10.3103/S0146411618080254
Zegzhda, D.P., Pavlenko, E.Y.: Digital manufacturing security indicators. Aut. Control Comp. Sci. 52, 1150–1159 (2018). https://doi.org/10.3103/S0146411618080333
Gorbachev, I.E., Glukhov, A.P.: Modeling of information security violations of critical infrastructure. In: Proceedings of SPIIRAN, vol. 38, pp. 112–135 (2015)
Emelyanov, S.V.: Mathematical Methods of Control Theory. Problems of Sustainability, Controllability and observability, 200 p. FIZMATLIT, Moscow (2014)
Pavlenko, E.Y., Yarmak, A.V., Moskvin, D.A.: Hierarchical approach to analyzing security breaches in information systems. Aut. Control Comp. Sci. 51, 829–834 (2017). https://doi.org/10.3103/S0146411617080144
Pavlenko, E., Zegzhda, D., Shtyrkina, A.: Criterion of cyber-physical systems sustainability In: 10th Anniversary International Scientific and Technical Conference on Secure Information Technologies, BIT 2019; Moscow, vol. 2603, pp. 60–64 (2019)
Zegzhda, D.P., Pavlenko, E.Y.: Cyber-physical system homeostatic security management. Aut. Control Comp. Sci. 51, 805–816 (2017). https://doi.org/10.3103/S0146411617080260
Zegzhda, D.P., Usov, E.S., Nikol’skii, A.V., et al.: Use of Intel SGX to ensure the confidentiality of data of cloud users. Aut. Control Comp. Sci. 51, 848–854 (2017). https://doi.org/10.3103/S0146411617080284
Lavrova, D.S.: An approach to developing the SIEM system for the internet of things. Aut. Control Comp. Sci. 50, 673–681 (2016). https://doi.org/10.3103/S0146411616080125
Zegzhda, D., Zegzhda, P., Pechenkin, A., et al.: Modeling of information systems to their security evaluation. In: Proceedings of the 10th International Conference on Security of Information and Networks (SIN’17). Association for Computing Machinery, New York, NY, USA, pp. 295–298 (2017). https://doi.org/10.1145/3136825.3136857
Lavrova, D.S., Zaitseva, E.A., Zegzhda, D.P.: Approach to presenting network infrastructure of cyberphysical systems to minimize the cyberattack neutralization time. Aut. Control Comp. Sci. 53, 387–392 (2019). https://doi.org/10.3103/S0146411619050067
Lavrova, D., Zegzhda, D., Yarmak, A.: Using GRU neural network for cyber-attack detection in automated process control systems. In: 2019 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), Sochi, Russia, pp. 1–3 (2019). https://doi.org/10.1109/BlackSeaCom.2019.8812818
Poltavtseva, M.A., Zegzhda, D.P., Pavlenko, E.Y.: High-performance NIDS architecture for enterprise networking. In: 2019 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), Sochi, Russia, pp. 1–3 (2019). https://doi.org/10.1109/BlackSeaCom.2019.8812808
Lavrova, D., Zegzhda, D., Yarmak, A.: Predicting cyber attacks on industrial systems using the Kalman filter. In: 2019 Third World Conference on Smart Trends in Systems Security and Sustainablity (WorldS4), London, United Kingdom, pp. 317–321 (2019). https://doi.org/10.1109/WorldS4.2019.8904038
Zegzhda, D., Lavrova, D., Poltavtseva, M.: Multifractal security analysis of cyberphysical systems. Nonlinear Phenom. Complex Syst. 22, 196–204 (2019)
Stepanova, T., Pechenkin, A., Lavrova, D.: Ontology-based big data approach to automated penetration testing of large-scale heterogeneous systems. In: Proceedings of the 8th International Conference on Security of Information and Networks (SIN ’15). Association for Computing Machinery, New York, NY, USA, pp. 142–149 (2015). https://doi.org/10.1145/2799979.2799995
Zegzhda, P.D., Poltavtseva, M.A., Pechenkin, A.I., et al.: A use case analysis of heterogeneous semistructured objects in information security problems. Aut. Control Comp. Sci. 52, 918–930 (2018). https://doi.org/10.3103/S0146411618080278
Zaitseva, E.A., Zegzhda, D.P., Poltavtseva, M.A.: Use of graph representation and case analysis to assess the security of computer systems. Aut. Control Comp. Sci. 53, 937–947 (2019). https://doi.org/10.3103/S0146411619080327
Neusypin, K.A., Proletarsky, A.V., Kuznetsov, I.A.: Investigation of the degree of identifiability of parameters of dynamic systems. Bulletin of the Moscow state technical University named after G. I. Nosov., vol. 2, no. 50 (2015)
Humayed, A., et al.: Cyber-physical systems security—a survey. IEEE Internet Things J. 4(6), 1802–1831 (2017). https://doi.org/10.1109/JIOT.2017.2703172
Giraldo, J., et al.: A survey of physics-based attack detection in cyber-physical systems. ACM Comput. Surv. 51, 1–36 (2018). https://doi.org/10.1145/3203245
Acknowledgements
The reported study was funded by Russian Ministry of Science (information security), project number 2/2020.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Poltavtseva, M., Tick, A. (2022). Automatic Control Approach to the Cyber-Physical Systems Security Monitoring. In: Jahn, C., Ungvári, L., Ilin, I. (eds) Algorithms and Solutions Based on Computer Technology. Lecture Notes in Networks and Systems, vol 387. Springer, Cham. https://doi.org/10.1007/978-3-030-93872-7_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-93872-7_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-93871-0
Online ISBN: 978-3-030-93872-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)