Abstract

A cyber-physical system (CPS) is the integration of a physical system into the real world and control applications in a computing system, interacting through a communications network. Network technology connecting physical systems and computing systems enables the simultaneous control of many physical systems and provides intelligent applications for them. However, enhancing connectivity leads to extended attack vectors in which attackers can trespass on the network and launch cyber-physical attacks, remotely disrupting the CPS. Therefore, extensive studies into cyber-physical security are being conducted in various domains, such as physical, network, and computing systems. Moreover, large-scale and complex CPSs make it difficult to analyze and detect cyber-physical attacks, and thus, machine learning (ML) techniques have recently been adopted for cyber-physical security. In this survey, we provide an extensive review of the threats and ML-based security designs for CPSs. First, we present a CPS structure that classifies the functions of the CPS into three layers: the physical system, the network, and software applications. Then, we discuss the taxonomy of cyber-physical attacks on each layer, and in particular, we analyze attacks based on the dynamics of the physical system. We review existing studies on detecting cyber-physical attacks with various ML techniques from the perspectives of the physical system, the network, and the computing system. Furthermore, we discuss future research directions for ML-based cyber-physical security research in the context of real-time constraints, resiliency, and dataset generation to learn about the possible attacks.

Highlights

  • Cyber-physical systems (CPSs) involve the integration of physical systems into the real world and control software in the cyber-world, where these two worlds are connected by networks that are responsible for the interchange of information between them [1,2]

  • For unmanned aerial vehicles (UAVs) control systems in IEEE 802.11-based wireless network environments, a ground control station (GCS) sends control messages to the UAV, the UAV under an internet control message protocol (ICMP) flooding attack hovers in place, because the control-related packets are not received by the pre-configured transmission deadline due to the delay induced by ICMP flooding [79]

  • Since networks combine the physical system and the computing system, a CPS becomes vulnerable to cyber-physical attacks, which may disrupt and cause malfunctions in a physical system in the real world

Read more

Summary

Introduction

Cyber-physical systems (CPSs) involve the integration of physical systems into the real world and control software in the cyber-world, where these two worlds are connected by networks that are responsible for the interchange of information between them [1,2]. ML techniques enable a model to be generated for the massive and complex relationships of each component of the CPS, including various physical systems in the real world, heterogeneous network protocols, and the complicated application software in the cyber-world, where the generated model can enhance the security level of the CPS.

Hierarchical Structure of Cyber-Physical Systems
Physical System Layer
Network Layer
Application Layer
Taxonomy of Cyber-Physical Attacks
Sensor Attack
Controller Attack
Combined Attack
Denial of Service Attack
Flooding Attack
Packet Manipulation
Application Software Attack
Computing Hardware Attack
ML-Based Cyber-Physical Attack Detection
Potential Research Directions
Real-Time Attack Detection in ML
Resilient Cyber-Physical System Design
Dataset Generation for Learning Malicious Behavior
Findings
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call