期刊论文详细信息
Cybersecurity
Deriving invariant checkers for critical infrastructure using axiomatic design principles
Rajib Ranjan Maiti1  Venkata Reddy Palleti2  Christopher M Poskitt3  Arlindo Silva4  Cheah Huei Yoong4 
[1] Birla Institute of Technology and Science, Pilani, Hyderabad Campus Jawahar Nagar, Kapra Mandal Medchal District, 500078, Telangana, India;Indian Institute of Petroleum and Energy, 2nd Floor, AU Engg College Main Block, Andhra University, 530003, Visakhapatnam, India;Singapore Management University, 80 Stamford Road, 178902, Singapore, Singapore;Singapore University of Technology and Design, 8 Somapah Road, 487372, Singapore, Singapore;
关键词: Cyber-physical systems;    Critical infrastructure;    Industrial control systems;    Systematic design framework;    Axiomatic design;    Invariants;    Anomaly detection;    Supervised machine learning;   
DOI  :  10.1186/s42400-021-00069-7
来源: Springer
PDF
【 摘 要 】

Cyber-physical systems (CPSs) in critical infrastructure face serious threats of attack, motivating research into a wide variety of defence mechanisms such as those that monitor for violations of invariants, i.e. logical properties over sensor and actuator states that should always be true. Many approaches for identifying invariants attempt to do so automatically, typically using data logs, but these can miss valid system properties if relevant behaviours are not well-represented in the data. Furthermore, as the CPS is already built, resolving any design flaws or weak points identified through this process is costly. In this paper, we propose a systematic method for deriving invariants from an analysis of a CPS design, based on principles of the axiomatic design methodology from design science. Our method iteratively decomposes a high-level CPS design to identify sets of dependent design parameters (i.e. sensors and actuators), allowing for invariants and invariant checkers to be derived in parallel to the implementation of the system. We apply our method to the designs of two CPS testbeds, SWaT and WADI, deriving a suite of invariant checkers that are able to detect a variety of single- and multi-stage attacks without any false positives. Finally, we reflect on the strengths and weaknesses of our approach, how it can be complemented by other defence mechanisms, and how it could help engineers to identify and resolve weak points in a design before the controllers of a CPS are implemented.

【 授权许可】

CC BY   

【 预 览 】
附件列表
Files Size Format View
RO202107021063262ZK.pdf 1857KB PDF download
  文献评价指标  
  下载次数:12次 浏览次数:19次