ABSTRACT
Additive Manufacturing (AM) uses Cyber-Physical Systems (CPS) (e.g., 3D Printers) that are vulnerable to kinetic cyber-attacks. Kinetic cyber-attacks cause physical damage to the system from the cyber domain. In AM, kinetic cyber-attacks are realized by introducing flaws in the design of the 3D objects. These flaws may eventually compromise the structural integrity of the printed objects. In CPS, researchers have designed various attack detection method to detect the attacks on the integrity of the system. However, in AM, attack detection method is in its infancy. Moreover, analog emissions (such as acoustics, electromagnetic emissions, etc.) from the side-channels of AM have not been fully considered as a parameter for attack detection. To aid the security research in AM, this paper presents a novel attack detection method that is able to detect zero-day kinetic cyber-attacks on AM by identifying anomalous analog emissions which arise as an outcome of the attack. This is achieved by statistically estimating functions that map the relation between the analog emissions and the corresponding cyber domain data (such as G-code) to model the behavior of the system. Our method has been tested to detect potential zero-day kinetic cyber-attacks in fused deposition modeling based AM. These attacks can physically manifest to change various parameters of the 3D object, such as speed, dimension, and movement axis. Accuracy, defined as the capability of our method to detect the range of variations introduced to these parameters as a result of kinetic cyber-attacks, is 77.45%.
- [1]. , Additive manufacturing technologies. Springer, 2010.Google ScholarCross Ref
- [2].“Forecast: 3D Printers, Worldwide, 2015”., www.gartnercom, 2015.Google Scholar
- [3]. , “3D Printing, Now and Beyond”, Stratasys, www.stratasys.com, 2015.Google Scholar
- [4]. , “New Airbus A350 XWB aircraft contains over 1,000 3D printed parts”. 3Dprint, https://3dprint.com, 2015.Google Scholar
- [5]. , “The dawn of kinetic cyber”, in Cyber Conflict (CyCon), 2013 5th International Conference on, pp. 1–15, IEEE, 2013.Google Scholar
- [6]. , “W32. stuxnet dossier”, White paper, Symantec Corp., Security Response, vol. 5, 2011.Google Scholar
- [7]. , Lessons learned from the maroochy water breach. Springer 2007.Google Scholar
- [8]. , “German steel mill cyber attack”, Industrial Control Systems, vol. 30, 2014.Google Scholar
- [9]. , “Experimental security analysis of a modern automobile”, in Security and Privacy (SP), 2010 IEEE Symposium on, pp. 447–462, IEEE, 2010.Google Scholar
- [10]. , “Cyber-physical vunerabilities in additive manufacturing systems”, Context, 2014.Google Scholar
- [11]. , “Design methodologies for securing cyber-physical systems”, in Proceedings of the 10th International Conference on Hardware/Software Codesign and System Synthesis, 2015.Google Scholar
- [12]. , “Exploiting wireless channel randomness to generate keys for automotive cyber-physical system security”, in 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS), pp. 1–10, IEEE, 2016.Google Scholar
- [13]. , “A survey of intrusion detection techniques for cyber-physical systems”, ACM Computing Surveys (CSUR), 2014.Google Scholar
- [14]. , “Trojan detection and side-channel analyses for cyber-security in cyber-physical manufacturing systems”, Procedia Manufacturing, vol. 1, pp. 77–85, 2015.Google ScholarCross Ref
- [15]. , “Security challenges of additive manufacturing with metals and alloys”, in Critical Infrastructure Protection IX, Springer 2015.Google ScholarCross Ref
- [16]. , “A model-based design methodology for cyber-physical systems”, in Wireless Communications and Mobile Computing Conference (IWCMC), IEEE, 2011.Google Scholar
- [17]. , “System health monitoring and prognostics-a review of current paradigms and practices”, in Handbook of Maintenance Management and Engineering, pp. 337–362, Springer 2009.Google Scholar
- [18]. , Automation, production systems, and computer-integrated manufacturing. Prentice Hall Press, 2007.Google ScholarDigital Library
- [19]. , “Acoustic side-channel attacks on additive manufacturing systems”, in ACM, 2016.Google Scholar
- [20]. , “Towards a taxonomy of intrusion-detection systems”, Computer Networks, vol. 31, no. 8, pp. 805–822, 1999.Google ScholarCross Ref
- [21]. , “Challenges for securing cyber physical systems”, in Workshop on future directions in cyber-pliysical systems security, p. 5, 2009.Google Scholar
- [22]. , Practical 3D printers: The scienceand art of 3D printing. A press, 2012.Google Scholar
- [23]. , “Causes and sources of audible noise in electrical motors”, in Incremental Motion Control Systems and Devices Symposium, 1993.Google Scholar
- [24]. , Low-noise electrical motors, vol. 13. Oxford University Press, USA, 1981.Google Scholar
- [25]. , Noise and vibration of electrical machines, vol. 34. North Holland, 1989.Google Scholar
- [26]. , Noise of polyphase electric motors. CRC press, 2005.Google Scholar
- [27].“k-quad 5.1 250mm quadcopter frame”. thingiverse, http://www.thingiverse.com/thing:397036, 2014.Google Scholar
Index Terms
- KCAD: Kinetic Cyber-attack detection method for Cyber-physical additive manufacturing systems
Recommendations
Modeling and control of Cyber-Physical Systems subject to cyber attacks: A survey of recent advances and challenges
Highlights- In general, the cyber-attacks in the literature can be classified into three main types: denial of service (DoS) attacks, deception attacks, and replay ...
AbstractCyber Physical Systems (CPS) are almost everywhere; they can be accessed and controlled remotely. These features make them more vulnerable to cyber attacks. Since these systems provide critical services, having them under attack would ...
Security analysis for cyber-physical systems against stealthy cyber attacks
CERIAS '13: Proceedings of the 14th Annual Information Security SymposiumSecurity of Cyber-Physical Systems (CPS) against cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is difficult to describe them systematically. In this paper, instead of identifying a specific ...
dr0wned-cyber-physical attack with additive manufacturing
WOOT'17: Proceedings of the 11th USENIX Conference on Offensive TechnologiesAdditive Manufacturing (AM, or 3D printing) is an emerging manufacturing technology with far-reaching implications. AM is increasingly used to produce functional parts, including components for safety-critical systems. However, AM's unique capabilities ...
Comments