Abstract

Modern cyber-physical systems (CPS) use digital control of physical processes. This allows attackers to conduct various cyberattacks on these systems. According to the current trends, an information security monitoring system (ISMS) becomes part of a security management system of CPS. It provides information to make a decision and generate a response. A large number of new methods are aimed at CPS security, including security assessment, intrusion detection, and ensuring sustainability. However, as a cyber-physical system operates over time, its structure and requirements may change. The datasets available for the protection object (CPS) and the security requirements have become dynamic. This dynamic effect causes asymmetry between the monitoring data collection and processing subsystem and the presented security tasks. The problem herein is the choice of the most appropriate set of methods in order to solve the security problems of a particular CPS configuration from a particular bank of the available methods. To solve this problem, the authors present a method for the management of an adaptive information security monitoring system. The method consists of solving a multicriteria discrete optimization problem under Pareto-optimality conditions when the available data, methods or external requirements change. The experimental study was performed on an example of smart home intrusion detection. In the study, the introduction of a constraint (a change in requirements) led to the revision of the monitoring scheme and a different recommendation of the monitoring method. As a result, the information security monitoring system gains the property of adaptability to changes in tasks and the available data. An important result from the study is the fact that the monitoring scheme obtained using the proposed management method has a proven optimality under the given conditions. Therefore, the asymmetry between the information security monitoring data collection and processing subsystem and the set of security requirements in cyber-physical systems can be overcome.

Highlights

  • The development of digital technologies has led to the emergence of a new system class, known as cyber-physical systems (CPS)

  • For industrial cyber-physical systems, we propose the prioritization of the monitoring scheme parameters, since this approach will allow the following: 1. Reflect the peculiarities of a particular industrial CPS from the point of view of decision-makers and combine the automatic and automated selection of the optimal monitoring scheme

  • Reliability indicates the ability to reflect the real processes of the protected object or the provision of methods for solving security problems with non-obsolete data reflecting the state of the CPS

Read more

Summary

Introduction

The development of digital technologies has led to the emergence of a new system class, known as cyber-physical systems (CPS). These systems combine digital and physical process controls. The implementation of digital technologies has led to an increase in the number of cyberattacks on various spheres: From medical science to industry related systems, etc. Researchers are developing new approaches for the security of cyber-physical systems [2,3], including authentication methods, encryption, etc. A wide variety of CPS, their heterogeneity both structurally and technologically, and the features of operation complicate the task of creating effective protection systems. Due to the continuous changes in the legal framework, the expansion of security objectives in relation to CPS require continuous changes in systems that ensure their security

Objectives
Methods
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call