Affiliation:
1. Cardiff University, Roath, Cardiff, UK
Abstract
Industrial cyber-physical systems
(
ICPSs
) manage critical infrastructures by controlling the processes based on the “physics” data gathered by edge sensor networks. Recent innovations in ubiquitous computing and communication technologies have prompted the rapid integration of highly interconnected systems to ICPSs. Hence, the “security by obscurity” principle provided by air-gapping is no longer followed. As the interconnectivity in ICPSs increases, so does the attack surface. Industrial vulnerability assessment reports have shown that a variety of new vulnerabilities have occurred due to this transition. Although there are existing surveys in this context, very little is mentioned regarding the outputs of these reports. While these reports show that the most exploited vulnerabilities occur due to weak boundary protection, these vulnerabilities also occur due to limited or ill-defined security policies. However, current literature focuses on
intrusion detection systems
(
IDSs
),
network traffic analysis
(
NTA
) methods, or anomaly detection techniques. Hence, finding a solution for the problems mentioned in these reports is relatively hard. We bridge this gap by defining and reviewing ICPSs from a cybersecurity perspective. In particular, multi-dimensional adaptive attack taxonomy is presented and utilized for evaluating real-life ICPS cyber incidents. Finally, we identify the general shortcomings and highlight the points that cause a gap in existing literature while defining future research directions.
Funder
EPSRC PETRAS
GCHQ National Resilience Fellowship
Republic of Turkey Ministry of National Education
Publisher
Association for Computing Machinery (ACM)
Subject
General Computer Science,Theoretical Computer Science
Reference189 articles.
1. Understanding the Limits of LoRaWAN
2. Jai Agaram John Andary Douglas Effenberger Kent Peterson Steven Strauss and Steve Taylor. 2018. Building Automation System Procurement Guide. Retrieved August 13 2020 from https://www2.calstate.edu/csu-system/doing-business-with-the-csu/capital-planning-design-construction/operations-center/Documents/guidelines/Controls-Procurement-Guide-12-Dec-2018%20.pdf.
3. A survey of network anomaly detection techniques
4. Wireless sensor networks: a survey
5. Industrial Internet of Things Driven by SDN Platform for Smart Grid Resiliency
Cited by
76 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献