Skip to main content
Erschienen in: Automatic Control and Computer Sciences 8/2018

01.12.2018

Approaches to Modeling the Security of Cyberphysical Systems

verfasst von: D. P. Zegzhda, Yu. S. Vasil’ev, M. A. Poltavtseva

Erschienen in: Automatic Control and Computer Sciences | Ausgabe 8/2018

Einloggen, um Zugang zu erhalten

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper considers features of cyberphysical systems (CPSs) as complexes combining physical and information components. Approaches to modeling CPSs based on graphs and stochastic dynamics are analyzed. Common features and further directions in CPS modeling are identified. The development direction of the homeostasis-based CPS information security modeling is determined.
Literatur
1.
Zurück zum Zitat Yastreb, N.A., The Fourth Industrial Revolution: Global industrial networks and the Internet of Things, Innovatsion. Vestn. Reg., 2014, no. 4, pp. 22–26. Yastreb, N.A., The Fourth Industrial Revolution: Global industrial networks and the Internet of Things, Innovatsion. Vestn. Reg., 2014, no. 4, pp. 22–26.
2.
Zurück zum Zitat Threats for The Future: Be Are Ready. Special Report on Strategies to Deal with Complex Threats. https://media.kaspersky.com/pdf/APT_Report_ONLINE_AW_rus.pdf. Threats for The Future: Be Are Ready. Special Report on Strategies to Deal with Complex Threats. https://​media.​kaspersky.​com/​pdf/​APT_​Report_​ONLINE_​AW_​rus.​pdf.​
3.
Zurück zum Zitat Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., and Felten, E.W., Lest we remember: Cold boot attacks on encryption keys, Proceedings of the 17th USENIX Security Symposium, 2008, pp. 45–60. https://www.usenix.org/events/sec08/tech/full_papers/ halderman/halderman.pdf. Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., and Felten, E.W., Lest we remember: Cold boot attacks on encryption keys, Proceedings of the 17th USENIX Security Symposium, 2008, pp. 45–60. https://​www.​usenix.​org/​events/​sec08/​tech/​full_​papers/​ halderman/halderman.pdf.
4.
Zurück zum Zitat Lamport, L., Proving the correctness of multiprocess programs, IEEE Trans. Software Eng., 1977, vol. 3, no. 2, pp. 125–143. doi 10.1109/TSE.1977.229904MathSciNetCrossRefMATH Lamport, L., Proving the correctness of multiprocess programs, IEEE Trans. Software Eng., 1977, vol. 3, no. 2, pp. 125–143. doi 10.1109/TSE.1977.229904MathSciNetCrossRefMATH
5.
Zurück zum Zitat Schneider, F.B., Enforceable security policies, ACM Trans. Inf. Syst. Secur., 2000, vol. 3, no. 1, pp. 30–50. doi 10.1145/353323.353382CrossRef Schneider, F.B., Enforceable security policies, ACM Trans. Inf. Syst. Secur., 2000, vol. 3, no. 1, pp. 30–50. doi 10.1145/353323.353382CrossRef
6.
Zurück zum Zitat Mulligan, D.K. and Schneider, F.B., Doctrine for cybersecurity, Daedalus, 2011, vol. 140, no. 4, pp. 70–92.CrossRef Mulligan, D.K. and Schneider, F.B., Doctrine for cybersecurity, Daedalus, 2011, vol. 140, no. 4, pp. 70–92.CrossRef
7.
Zurück zum Zitat Ashibani, Y. and Mahmoud, Q.H., Cyber physical systems security: Analysis, challenges and solutions, Comput. Secur., 2017, vol. 68, pp. 81–97.CrossRef Ashibani, Y. and Mahmoud, Q.H., Cyber physical systems security: Analysis, challenges and solutions, Comput. Secur., 2017, vol. 68, pp. 81–97.CrossRef
8.
Zurück zum Zitat Zanero, S., Cyber-physical systems, Computer, 2017, vol. 50, no. 4, pp. 14–16.CrossRef Zanero, S., Cyber-physical systems, Computer, 2017, vol. 50, no. 4, pp. 14–16.CrossRef
9.
Zurück zum Zitat Zegzhda, D.P., Sustainability as a criterion for information security in cyber-physical systems, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 813–819.CrossRef Zegzhda, D.P., Sustainability as a criterion for information security in cyber-physical systems, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 813–819.CrossRef
10.
Zurück zum Zitat Dat Dac Hoang, Hye-Young Paik, and Chae-Kyu Kim, Service-oriented middleware architectures for cyber-physical systems, Int. J. Comput. Sci. Network Secur., 2012, vol. 12, no. 1, pp. 79–87. Dat Dac Hoang, Hye-Young Paik, and Chae-Kyu Kim, Service-oriented middleware architectures for cyber-physical systems, Int. J. Comput. Sci. Network Secur., 2012, vol. 12, no. 1, pp. 79–87.
11.
Zurück zum Zitat Seiger, R., Huber, S., Heisig, P., and Assmann, U., Enabling self-adaptive workflows for cyber-physical systems, Lect. Notes Bus. Inf. Process., 2016, vol. 248, pp. 3–17.CrossRef Seiger, R., Huber, S., Heisig, P., and Assmann, U., Enabling self-adaptive workflows for cyber-physical systems, Lect. Notes Bus. Inf. Process., 2016, vol. 248, pp. 3–17.CrossRef
12.
Zurück zum Zitat Zegzhda, P.D., Zegzhda, D.P., and Stepanova, T.V., Approach to the construction of the generalized functional-semantic cyber security model, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 627–633.CrossRef Zegzhda, P.D., Zegzhda, D.P., and Stepanova, T.V., Approach to the construction of the generalized functional-semantic cyber security model, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 627–633.CrossRef
13.
Zurück zum Zitat Zegzhda, P.D., Zegzhda, D.P., Pechenkin, A.I., and Poltavtseva, M.A., Modeling information systems for solving security control problems, Probl. Inf. Bezop., Komp’yut. Sist., 2016, no. 3, pp. 7–16. Zegzhda, P.D., Zegzhda, D.P., Pechenkin, A.I., and Poltavtseva, M.A., Modeling information systems for solving security control problems, Probl. Inf. Bezop., Komp’yut. Sist., 2016, no. 3, pp. 7–16.
14.
Zurück zum Zitat Lavrova, D.S., An approach to developing the SIEM system for the Internet of Things, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 673–681.CrossRef Lavrova, D.S., An approach to developing the SIEM system for the Internet of Things, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 673–681.CrossRef
15.
Zurück zum Zitat Trenogin, N.G. and Sokolov, D.E., Fractal properties of network traffic in a client-server information system, Materialy Mezhdunarodnoi nauchno-tekhnicheskoi konferentsii Informatika i problemy telekommunikatsii (Proc. Int. Sci.-Tech. Conf. Informatics and Problems of Telecommunications), Novosibirsk: Sib. Gos. Univ. Telekommun. Inf., 2001, pp. 34–35. Trenogin, N.G. and Sokolov, D.E., Fractal properties of network traffic in a client-server information system, Materialy Mezhdunarodnoi nauchno-tekhnicheskoi konferentsii Informatika i problemy telekommunikatsii (Proc. Int. Sci.-Tech. Conf. Informatics and Problems of Telecommunications), Novosibirsk: Sib. Gos. Univ. Telekommun. Inf., 2001, pp. 34–35.
16.
Zurück zum Zitat Nicolis, J.S., Dynamics of Hierarchical Systems: An Evolutionary Approach, Springer, 1986.CrossRefMATH Nicolis, J.S., Dynamics of Hierarchical Systems: An Evolutionary Approach, Springer, 1986.CrossRefMATH
17.
Zurück zum Zitat Pozdnyak, I.S. and Buranova, M.A., Metodicheskie ukazaniya Issledovanie setevogo trafika na stepen' samopodobiya (Methodical Instructions: Study of Network Traffic for the Degree of Self-Similarity), Samara: Povolzh. Gos. Univ. Telekommun. Inf., 2013. Pozdnyak, I.S. and Buranova, M.A., Metodicheskie ukazaniya Issledovanie setevogo trafika na stepen' samopodobiya (Methodical Instructions: Study of Network Traffic for the Degree of Self-Similarity), Samara: Povolzh. Gos. Univ. Telekommun. Inf., 2013.
18.
Zurück zum Zitat Zegzhda, D.P. and Stepanova, T.V., Applying large-scale adaptive graphs to modeling Internet of Things security, Proceedings of the 7th International Conference on Security of Information and Networks, SIN 2014, 2014, pp. 479–482. Zegzhda, D.P. and Stepanova, T.V., Applying large-scale adaptive graphs to modeling Internet of Things security, Proceedings of the 7th International Conference on Security of Information and Networks, SIN 2014, 2014, pp. 479–482.
19.
Zurück zum Zitat Bekish, O.-Ya.L., Meditsinskaya biologiya (Medical Biology), Minsk: Uradzhai, 2000. Bekish, O.-Ya.L., Meditsinskaya biologiya (Medical Biology), Minsk: Uradzhai, 2000.
20.
Zurück zum Zitat Gerostathopoulos, I., Skoda, D., Plasil, F., Bures, T., and Knauss, A., Architectural homeostasis in self-adaptive software-intensive cyber-physical systems, Lect. Notes Comput. Sci., 2016, vol. 9839, pp. 113–128.CrossRef Gerostathopoulos, I., Skoda, D., Plasil, F., Bures, T., and Knauss, A., Architectural homeostasis in self-adaptive software-intensive cyber-physical systems, Lect. Notes Comput. Sci., 2016, vol. 9839, pp. 113–128.CrossRef
Metadaten
Titel
Approaches to Modeling the Security of Cyberphysical Systems
verfasst von
D. P. Zegzhda
Yu. S. Vasil’ev
M. A. Poltavtseva
Publikationsdatum
01.12.2018
Verlag
Pleiades Publishing
Erschienen in
Automatic Control and Computer Sciences / Ausgabe 8/2018
Print ISSN: 0146-4116
Elektronische ISSN: 1558-108X
DOI
https://doi.org/10.3103/S014641161808031X

Weitere Artikel der Ausgabe 8/2018

Automatic Control and Computer Sciences 8/2018 Zur Ausgabe

Neuer Inhalt