skip to main content
10.1145/2966986.2967050guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
research-article

KCAD: Kinetic Cyber-attack detection method for Cyber-physical additive manufacturing systems

Authors Info & Claims
Published:07 November 2016Publication History

ABSTRACT

Additive Manufacturing (AM) uses Cyber-Physical Systems (CPS) (e.g., 3D Printers) that are vulnerable to kinetic cyber-attacks. Kinetic cyber-attacks cause physical damage to the system from the cyber domain. In AM, kinetic cyber-attacks are realized by introducing flaws in the design of the 3D objects. These flaws may eventually compromise the structural integrity of the printed objects. In CPS, researchers have designed various attack detection method to detect the attacks on the integrity of the system. However, in AM, attack detection method is in its infancy. Moreover, analog emissions (such as acoustics, electromagnetic emissions, etc.) from the side-channels of AM have not been fully considered as a parameter for attack detection. To aid the security research in AM, this paper presents a novel attack detection method that is able to detect zero-day kinetic cyber-attacks on AM by identifying anomalous analog emissions which arise as an outcome of the attack. This is achieved by statistically estimating functions that map the relation between the analog emissions and the corresponding cyber domain data (such as G-code) to model the behavior of the system. Our method has been tested to detect potential zero-day kinetic cyber-attacks in fused deposition modeling based AM. These attacks can physically manifest to change various parameters of the 3D object, such as speed, dimension, and movement axis. Accuracy, defined as the capability of our method to detect the range of variations introduced to these parameters as a result of kinetic cyber-attacks, is 77.45%.

References

  1. [1].Gibson I., Rosen D. W., Stucker B. et al., Additive manufacturing technologies. Springer, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  2. [2].Forecast: 3D Printers, Worldwide, 2015”., www.gartnercom, 2015.Google ScholarGoogle Scholar
  3. [3].Lipson H., “3D Printing, Now and Beyond”, Stratasys, www.stratasys.com, 2015.Google ScholarGoogle Scholar
  4. [4].Krassenstein B., “New Airbus A350 XWB aircraft contains over 1,000 3D printed parts”. 3Dprint, https://3dprint.com, 2015.Google ScholarGoogle Scholar
  5. [5].Applegate S. D., “The dawn of kinetic cyber”, in Cyber Conflict (CyCon), 2013 5th International Conference on, pp. 115, IEEE, 2013.Google ScholarGoogle Scholar
  6. [6].Falliere N. et al., “W32. stuxnet dossier”, White paper, Symantec Corp., Security Response, vol. 5, 2011.Google ScholarGoogle Scholar
  7. [7].Slay J. and Miller M., Lessons learned from the maroochy water breach. Springer 2007.Google ScholarGoogle Scholar
  8. [8].Lee R. M. et al., “German steel mill cyber attack”, Industrial Control Systems, vol. 30, 2014.Google ScholarGoogle Scholar
  9. [9].Koscher K. et al., “Experimental security analysis of a modern automobile”, in Security and Privacy (SP), 2010 IEEE Symposium on, pp. 447462, IEEE, 2010.Google ScholarGoogle Scholar
  10. [10].Sturm L. et al., “Cyber-physical vunerabilities in additive manufacturing systems”, Context, 2014.Google ScholarGoogle Scholar
  11. [11].Al Faruque M. et al., “Design methodologies for securing cyber-physical systems”, in Proceedings of the 10th International Conference on Hardware/Software Codesign and System Synthesis, 2015.Google ScholarGoogle Scholar
  12. [12].Wan J. et al., “Exploiting wireless channel randomness to generate keys for automotive cyber-physical system security”, in 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS), pp. 110, IEEE, 2016.Google ScholarGoogle Scholar
  13. [13].Mitchell R. and Chen I.- R., “A survey of intrusion detection techniques for cyber-physical systems”, ACM Computing Surveys (CSUR), 2014.Google ScholarGoogle Scholar
  14. [14].Vincent H. et al., “Trojan detection and side-channel analyses for cyber-security in cyber-physical manufacturing systems”, Procedia Manufacturing, vol. 1, pp. 7785, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  15. [15].Yampolskiy M. et al., “Security challenges of additive manufacturing with metals and alloys”, in Critical Infrastructure Protection IX, Springer 2015.Google ScholarGoogle ScholarCross RefCross Ref
  16. [16].Jensen J. C. et al., “A model-based design methodology for cyber-physical systems”, in Wireless Communications and Mobile Computing Conference (IWCMC), IEEE, 2011.Google ScholarGoogle Scholar
  17. [17].Kothamasu R. et al., “System health monitoring and prognostics-a review of current paradigms and practices”, in Handbook of Maintenance Management and Engineering, pp. 337362, Springer 2009.Google ScholarGoogle Scholar
  18. [18].Groover M. P., Automation, production systems, and computer-integrated manufacturing. Prentice Hall Press, 2007.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. [19].Al Faruque M. et al., “Acoustic side-channel attacks on additive manufacturing systems”, in ACM, 2016.Google ScholarGoogle Scholar
  20. [20].Debar H., Dacier M. and Wespi A., “Towards a taxonomy of intrusion-detection systems”, Computer Networks, vol. 31, no. 8, pp. 805822, 1999.Google ScholarGoogle ScholarCross RefCross Ref
  21. [21].Cardenas A. et al., “Challenges for securing cyber physical systems”, in Workshop on future directions in cyber-pliysical systems security, p. 5, 2009.Google ScholarGoogle Scholar
  22. [22].Evans B., Practical 3D printers: The scienceand art of 3D printing. A press, 2012.Google ScholarGoogle Scholar
  23. [23].Hendershot J., “Causes and sources of audible noise in electrical motors”, in Incremental Motion Control Systems and Devices Symposium, 1993.Google ScholarGoogle Scholar
  24. [24].Yang S., Low-noise electrical motors, vol. 13. Oxford University Press, USA, 1981.Google ScholarGoogle Scholar
  25. [25].Timár-P L. T.- P. and Tímár P., Noise and vibration of electrical machines, vol. 34. North Holland, 1989.Google ScholarGoogle Scholar
  26. [26].Gieras J. F. et al., Noise of polyphase electric motors. CRC press, 2005.Google ScholarGoogle Scholar
  27. [27].k-quad 5.1 250mm quadcopter frame”. thingiverse, http://www.thingiverse.com/thing:397036, 2014.Google ScholarGoogle Scholar

Index Terms

  1. KCAD: Kinetic Cyber-attack detection method for Cyber-physical additive manufacturing systems
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image Guide Proceedings
              2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)
              Nov 2016
              946 pages

              Copyright © 2016

              Publisher

              IEEE Press

              Publication History

              • Published: 7 November 2016

              Permissions

              Request permissions about this article.

              Request Permissions

              Qualifiers

              • research-article