Abstract

This study proposes a stochastic Petri net model for evaluating the security and resilience of cyber-physical systems (CPSs) in the face of malicious attacks. The basic idea behind the proposed model is to evaluate the security of control loops equipped with intrusion detection systems (IDSs) faced with security attacks. The quantitative analysis is performed in terms of system-focused quantitative security measures, such as mean time-to-failure and availability. By using this model, one can investigate the effects of some attacks and defensive parameters, including the detection interval, the time to physical disruption, and the false-positive probability of IDSs. This evaluation results can help to improve the security countermeasures of CPSs.

Highlights

  • Cyber-physical systems (CPSs) are characterised by computational and communication elements monitoring and controlling physical entities [1]

  • An stochastic Petri nets (SPNs) [7] is a tuple: SPN = P, T, F, M0, R, H, where P is a set of places, T is a set of transitions, F is a set of arcs from places to transitions or from transitions to places, M0: P → N is the initial marking associating with each place a non-negative number, R is the set of firing rates associated with the transitions and H is a set of inhibitor arcs

  • This paper modelled the attacker and defender behaviours to analyse the security of CPSs

Read more

Summary

Introduction

Cyber-physical systems (CPSs) are characterised by computational and communication elements monitoring and controlling physical entities [1]. The outcome of the attack is very limited An attack on these systems may violate some safety limitations, damage or overstress equipment, damage products or may lead to environmental pollution [6]. For these reasons, security analysis of CPSs has a significant importance. The aim of this paper is to model CPSs equipped with intrusion detection systems (IDSs) to quantify their resilience to the adversarial attacks.

Related work
System model
Proposed model
Model description
Model parameterisation
Model evaluation
System specification
Attacks against the plant
Numerical results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.