Welcome to the IKCEST

IEEE Design & Test | Vol.33, Issue.5 | | Pages 75-83

IEEE Design & Test

Cybersecurity for Control Systems: A Process-Aware Perspective

Prashanth Krishnamurthy   Ramesh Karri   Farshad Khorrami  
Abstract

Modern industrial control systems and other complex cyber-physical systems such as smart grid, unmanned vehicles, manufacturing plants, chemical plants, and nuclear reactors are complex interconnected systems with extensive cyber and physical components, necessitating robust cyber-security techniques. These systems are complex interconnected combinations of heterogeneous hardware and software components and include sensors, actuators, physical systems and processes being controlled or monitored, computational nodes, communication protocols, and controllers. Besides computing/communications/networking based cyber-attacks, CPS are vulnerable to process-aware attacks that aim to disrupt the proper functioning or hamper performance, efficiency, stability, and safety of the physical systems/processes of the CPS. By modifying the information flow or the computational behavior of the system, process-aware attacks can disrupt the functioning the CPS to thereby hamper the performance or stability of the overall system or its components. Increasing network connectivity of the computational nodes of a CPS facilitates the maintenance and on-demand reprogrammability of computational nodes, greatly reducing the operator workload. However, this increasing connectivity raises the potential for cyber-attacks that attempt unauthorized modifications of the run-time parameters or control logic in the computational nodes. Hence, to improve the assurance of CPS, it is vital to develop effective real-time attack monitoring and threat mitigation mechanisms.

Original Text (This is the original text for your reference.)

Cybersecurity for Control Systems: A Process-Aware Perspective

Modern industrial control systems and other complex cyber-physical systems such as smart grid, unmanned vehicles, manufacturing plants, chemical plants, and nuclear reactors are complex interconnected systems with extensive cyber and physical components, necessitating robust cyber-security techniques. These systems are complex interconnected combinations of heterogeneous hardware and software components and include sensors, actuators, physical systems and processes being controlled or monitored, computational nodes, communication protocols, and controllers. Besides computing/communications/networking based cyber-attacks, CPS are vulnerable to process-aware attacks that aim to disrupt the proper functioning or hamper performance, efficiency, stability, and safety of the physical systems/processes of the CPS. By modifying the information flow or the computational behavior of the system, process-aware attacks can disrupt the functioning the CPS to thereby hamper the performance or stability of the overall system or its components. Increasing network connectivity of the computational nodes of a CPS facilitates the maintenance and on-demand reprogrammability of computational nodes, greatly reducing the operator workload. However, this increasing connectivity raises the potential for cyber-attacks that attempt unauthorized modifications of the run-time parameters or control logic in the computational nodes. Hence, to improve the assurance of CPS, it is vital to develop effective real-time attack monitoring and threat mitigation mechanisms.

+More

Cite this article
APA

APA

MLA

Chicago

Prashanth Krishnamurthy, Ramesh Karri,Farshad Khorrami,.Cybersecurity for Control Systems: A Process-Aware Perspective. 33 (5),75-83.

Disclaimer: The translated content is provided by third-party translation service providers, and IKCEST shall not assume any responsibility for the accuracy and legality of the content.
Translate engine
Article's language
English
中文
Pусск
Français
Español
العربية
Português
Kikongo
Dutch
kiswahili
هَوُسَ
IsiZulu
Action
Recommended articles

Report

Select your report category*



Reason*



By pressing send, your feedback will be used to improve IKCEST. Your privacy will be protected.

Submit
Cancel