https://www.mdu.se/

mdu.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Monitoring Cyber-Physical Systems Using a Tiny Twin to Prevent Cyber-Attacks
Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
Tehran Institute for Advanced Studies, Khatam University, Tehran, Iran.
University of Tehran, Tehran, Iran.
Chavoosh ICT, Isfahan, Iran.
Show others and affiliations
2022 (English)In: Lecture Notes in Computer Science, vol. 13255, Springer Science and Business Media Deutschland GmbH , 2022, p. 24-43Conference paper, Published paper (Refereed)
Abstract [en]

We propose a method to detect attacks on sensors and controllers in cyber-physical systems. We develop a monitor that uses an abstract digital twin, Tiny Twin, to detect false sensor data and faulty control commands. The Tiny Twin is a state transition system that represents the observable behavior of the system from the monitor point of view. At runtime, the monitor observes the sensor data and the control commands, and checks whether the observed data and commands are consistent with the state transitions in the Tiny Twin. The monitor produces an alarm when an inconsistency is detected. We model the components of the system and the physical processes in the Rebeca modeling language and use its model checker to generate the state space. The Tiny Twin is built automatically by reducing the state space, keeping the observable behavior of the system, and preserving the trace equivalence. We demonstrate the method and evaluate it in detecting attacks using a temperature control system. 

Place, publisher, year, edition, pages
Springer Science and Business Media Deutschland GmbH , 2022. p. 24-43
Series
Lecture Notes in Computer Science, ISSN 0302-9743 ; 13255 LNCS
Keywords [en]
Abstraction, Attack detection and prevention, Cyber-physical systems, Cyber-security, Model checking, Monitoring, Cyber Physical System, Cybersecurity, Embedded systems, Modeling languages, Network security, Attack detection, Attack prevention, Control command, Cybe-physical systems, Cyber security, Models checking, Observable behavior, Sensors data
National Category
Robotics
Identifiers
URN: urn:nbn:se:mdh:diva-59941DOI: 10.1007/978-3-031-15077-7_2ISI: 000874749700002Scopus ID: 2-s2.0-85137039734ISBN: 9783031150760 (print)OAI: oai:DiVA.org:mdh-59941DiVA, id: diva2:1695591
Conference
28th International Symposium on Model Checking Software, SPIN 2022, Virtual, Online, 21 May, 2022
Available from: 2022-09-14 Created: 2022-09-14 Last updated: 2024-04-14Bibliographically approved
In thesis
1. Automated Vulnerability Discovery and Attack Detection Framework for Cyber-Physical Systems
Open this publication in new window or tab >>Automated Vulnerability Discovery and Attack Detection Framework for Cyber-Physical Systems
2024 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

The combination of physical assets with cyber computational entities, known as Cyber-Physical Systems (CPS), is becoming more common. These systems are used in various sectors such as manufacturing, energy production, and transportation. However, they may contain vulnerabilities that can be exploited and compromise the proper functioning of the systems. Formal methods can provide confidence in the correctness of the system. These methods can help system designers to discover vulnerabilities and ensure the system meets its intended behavior and properties.

This thesis presents a framework called CRYSTAL for analyzing the security of CPS both at the design and runtime with the following contributions: 1) We build a Timed Rebeca model augmented with attack scenarios to identify potential vulnerabilities during the design phase. We identify CPS-related attacks reported in the literature and use STRIDE threat modeling as a guideline to put them into two categories: attacks on communication and attacks on components. We augment our model with actors representing attackers that jeopardize the communication and compromised components with possible malfunctions. Subsequently, we analyze the security of the CPS design (i.e., a model augmented with attacks) using model checking and identifying the trace of events leading to a security failure (i.e., counterexamples). 2) We propose a model-based methodology for detecting attacks at runtime. We develop a monitor and an algorithm that checks whether the behavior of the system at runtime is consistent with a reference model. We call the reference model as Tiny Digital Twin and it is employed within the monitor. We create Tiny Digital Twin by automatically reducing the state space of the Timed Rebeca model while preserving the trace equivalence. 3) We provide a formal foundation for our abstraction method and present a theory to map the state space of a Timed Rebeca model into a Labeled Transition System (LTS). This is achieved by defining a Concise Rebeca Timed Transition System (CRTTS) and implementing a function to convert CRTTS into an LTS. We use mCRL2 ltsconvert tool to abstract away non-observable actions from LTS while preserving trace equivalence between the original model and its abstracted version. 4) To validate the effectiveness of our attack detection method we simulate various attacks. Subsequently, we systematically model and check complex coordinated attacks. The applicability of CRYSTAL is demonstrated in revealing malicious behavior within different case studies including Pneumatic Control System (PCS), Temperature Control System (TCS), and Secure Water Treatment System (SWaT).

Abstract [sv]

Kombinationen av fysiska tillgångar med cyberberäkningsentiteter, kända som cyber-fysiska system (CPS), blir allt vanligare. Dessa system används inom olika sektorer som tillverkning, energiproduktion och transport. Dock kan de innehålla sårbarheter som kan utnyttjas och negativt påverka systemens korrekta funktion. Formella metoder kan ge förtroende för korrektheten hos system. Dessa metoder kan hjälpa systemdesigners att upptäcka sårbarheter och säkerställa att systemet uppfyller sina avsedda beteenden och egenskaper. Denna avhandling presenterar ett ramverk kallat CRYSTAL för att analysera säkerheten hos CPS både vid design och drift med följande bidrag: 1) Vi bygger en Tidsberoende Rebeca-modell med attackerade scenarier för att identifiera potentiella sårbarheter under designfasen. Vi identifierar CPS-relaterade attacker rapporterade i litteraturen och använder STRIDE-hotmodellering som riktlinje för att placera dem i två kategorier: attacker på kommunikation och attacker på komponenter. Vi utökar vår modell med aktörer, en angripare som hotar kommunikationen och systemets komprometterade komponenter med möjliga fel. Därefter analyserar vi säkerheten hos CPS-designen (dvs en modell utökad med attacker) genom att använda model-checking och identifierar händelseförlopp som leder till säkerhetsfel (d.v.s. kontraexempel). 2) Vi föreslår en modellbaserad metod för att upptäcka attacker vid drifttid. Vi utvecklar en övervakare och en algoritm som kontrollerar om systemets beteende vid drifttid är förenligt med en referensmodell. Vi kallar en referensmodell för Tiny Digital Twin och den används inom övervakaren. Vi skapar en Tiny Digital Twin genom att automatiskt minska tillståndsutrymmet för den tidsberoende Rebeca-modellen medan vi bevarar exekveringslikhet. 3) Vi tillhandahåller en formell grund för vår abstraktionsmetod och presenterar en teori för att kartlägga tillståndsutrymmet för en Tidsberoende Rebeca-modell till ett Labeled Transition System (LTS). Detta uppnås genom att definiera ett Concise Rebeca Timed Transition System (CRTTS) och genomföra en funktion för att konvertera CRTTS till ett LTS. Vi använder mCRL2 ltsconvert-verktyget för att abstrahera bort icke-observerbara åtgärder från LTS medan vi bevarar exekveringslikhet mellan den ursprungliga modellen och dess abstrakta version. 4) För att validera effektiviteten hos vår attackdetektionsmetod simulerar vi olika attacker. Därefter modellerar och kontrollerar vi systematiskt komplexa samordnade attacker. CRYSTAL:s användbarhet demonstreras genom att avslöja skadligt beteende inom olika fallstudier inklusive ett Pneumatiskt Kontrollsystem (PCS), Temperaturkontrollsystem (TCS) och Säker Vattenbehandlingsanläggning (SWaT). 

Place, publisher, year, edition, pages
Västerås: Mälardalens universitet, 2024
Series
Mälardalen University Press Dissertations, ISSN 1651-4238 ; 407
National Category
Computer Systems
Research subject
Computer Science
Identifiers
urn:nbn:se:mdh:diva-66422 (URN)978-91-7485-646-0 (ISBN)
Public defence
2024-06-07, Omega, Mälardalens universitet, Västerås, 13:15 (English)
Opponent
Supervisors
Funder
Swedish Foundation for Strategic Research
Available from: 2024-04-15 Created: 2024-04-14 Last updated: 2024-05-17Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Moradi, FereidounAbbaspour Asadollah, SaraSirjani, Marjan

Search in DiVA

By author/editor
Moradi, FereidounAbbaspour Asadollah, SaraSirjani, Marjan
By organisation
Embedded Systems
Robotics

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 125 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf