https://www.mdu.se/

mdu.sePublications
Planned maintenance
A system upgrade is planned for 10/12-2024, at 12:00-13:00. During this time DiVA will be unavailable.
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Tiny Twins for detecting cyber-attacks at runtime using concise Rebeca time transition system
Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
Mälardalen University, School of Business, Society and Engineering.
Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.ORCID iD: 0000-0002-5058-7351
Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
2024 (English)In: Journal of Parallel and Distributed Computing, ISSN 0743-7315, E-ISSN 1096-0848, Vol. 184, article id 104780Article in journal (Refereed) Published
Abstract [en]

This paper presents a method for detecting cyber-attacks in cyber-physical systems using a monitor. The method employs an abstract model called Tiny Twin, which is built at design time and is used at runtime to detect inconsistencies. Tiny Twin is a state transition system that represents the observable behavior of the system from the monitor point of view. We model the behavior of the system in the Rebeca modeling language and use Afra model checker to generate the state space. The Tiny Twin is built automatically, by abstracting the state space while keeping the observable actions and preserving the trace equivalence. For doing that we had to solve the complexities in the state space introduced by time-shifts, nondeterministic assignments and abstraction of internal actions. We formally define the state space as Concise Rebeca Timed Transition System (CRTTS), and then map CRTTS to an LTS. The LTS is then fed to a tool to abstract away the non-observable actions.

Place, publisher, year, edition, pages
Academic Press Inc. , 2024. Vol. 184, article id 104780
Keywords [en]
Cyber-security, Intrusion detection systems, Model abstraction, Model checking, Runtime monitoring, Abstracting, Computer crime, Crime, Cyber attacks, Cyber Physical System, Embedded systems, Intrusion detection, Modeling languages, Network security, Cyber security, Cyber-attacks, Models checking, Runtimes, State-space, Time transition, Timed transition systems
National Category
Computer Systems
Identifiers
URN: urn:nbn:se:mdh:diva-64590DOI: 10.1016/j.jpdc.2023.104780ISI: 001099111600001Scopus ID: 2-s2.0-85173631477OAI: oai:DiVA.org:mdh-64590DiVA, id: diva2:1808061
Available from: 2023-10-30 Created: 2023-10-30 Last updated: 2024-04-14Bibliographically approved
In thesis
1. Automated Vulnerability Discovery and Attack Detection Framework for Cyber-Physical Systems
Open this publication in new window or tab >>Automated Vulnerability Discovery and Attack Detection Framework for Cyber-Physical Systems
2024 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

The combination of physical assets with cyber computational entities, known as Cyber-Physical Systems (CPS), is becoming more common. These systems are used in various sectors such as manufacturing, energy production, and transportation. However, they may contain vulnerabilities that can be exploited and compromise the proper functioning of the systems. Formal methods can provide confidence in the correctness of the system. These methods can help system designers to discover vulnerabilities and ensure the system meets its intended behavior and properties.

This thesis presents a framework called CRYSTAL for analyzing the security of CPS both at the design and runtime with the following contributions: 1) We build a Timed Rebeca model augmented with attack scenarios to identify potential vulnerabilities during the design phase. We identify CPS-related attacks reported in the literature and use STRIDE threat modeling as a guideline to put them into two categories: attacks on communication and attacks on components. We augment our model with actors representing attackers that jeopardize the communication and compromised components with possible malfunctions. Subsequently, we analyze the security of the CPS design (i.e., a model augmented with attacks) using model checking and identifying the trace of events leading to a security failure (i.e., counterexamples). 2) We propose a model-based methodology for detecting attacks at runtime. We develop a monitor and an algorithm that checks whether the behavior of the system at runtime is consistent with a reference model. We call the reference model as Tiny Digital Twin and it is employed within the monitor. We create Tiny Digital Twin by automatically reducing the state space of the Timed Rebeca model while preserving the trace equivalence. 3) We provide a formal foundation for our abstraction method and present a theory to map the state space of a Timed Rebeca model into a Labeled Transition System (LTS). This is achieved by defining a Concise Rebeca Timed Transition System (CRTTS) and implementing a function to convert CRTTS into an LTS. We use mCRL2 ltsconvert tool to abstract away non-observable actions from LTS while preserving trace equivalence between the original model and its abstracted version. 4) To validate the effectiveness of our attack detection method we simulate various attacks. Subsequently, we systematically model and check complex coordinated attacks. The applicability of CRYSTAL is demonstrated in revealing malicious behavior within different case studies including Pneumatic Control System (PCS), Temperature Control System (TCS), and Secure Water Treatment System (SWaT).

Abstract [sv]

Kombinationen av fysiska tillgångar med cyberberäkningsentiteter, kända som cyber-fysiska system (CPS), blir allt vanligare. Dessa system används inom olika sektorer som tillverkning, energiproduktion och transport. Dock kan de innehålla sårbarheter som kan utnyttjas och negativt påverka systemens korrekta funktion. Formella metoder kan ge förtroende för korrektheten hos system. Dessa metoder kan hjälpa systemdesigners att upptäcka sårbarheter och säkerställa att systemet uppfyller sina avsedda beteenden och egenskaper. Denna avhandling presenterar ett ramverk kallat CRYSTAL för att analysera säkerheten hos CPS både vid design och drift med följande bidrag: 1) Vi bygger en Tidsberoende Rebeca-modell med attackerade scenarier för att identifiera potentiella sårbarheter under designfasen. Vi identifierar CPS-relaterade attacker rapporterade i litteraturen och använder STRIDE-hotmodellering som riktlinje för att placera dem i två kategorier: attacker på kommunikation och attacker på komponenter. Vi utökar vår modell med aktörer, en angripare som hotar kommunikationen och systemets komprometterade komponenter med möjliga fel. Därefter analyserar vi säkerheten hos CPS-designen (dvs en modell utökad med attacker) genom att använda model-checking och identifierar händelseförlopp som leder till säkerhetsfel (d.v.s. kontraexempel). 2) Vi föreslår en modellbaserad metod för att upptäcka attacker vid drifttid. Vi utvecklar en övervakare och en algoritm som kontrollerar om systemets beteende vid drifttid är förenligt med en referensmodell. Vi kallar en referensmodell för Tiny Digital Twin och den används inom övervakaren. Vi skapar en Tiny Digital Twin genom att automatiskt minska tillståndsutrymmet för den tidsberoende Rebeca-modellen medan vi bevarar exekveringslikhet. 3) Vi tillhandahåller en formell grund för vår abstraktionsmetod och presenterar en teori för att kartlägga tillståndsutrymmet för en Tidsberoende Rebeca-modell till ett Labeled Transition System (LTS). Detta uppnås genom att definiera ett Concise Rebeca Timed Transition System (CRTTS) och genomföra en funktion för att konvertera CRTTS till ett LTS. Vi använder mCRL2 ltsconvert-verktyget för att abstrahera bort icke-observerbara åtgärder från LTS medan vi bevarar exekveringslikhet mellan den ursprungliga modellen och dess abstrakta version. 4) För att validera effektiviteten hos vår attackdetektionsmetod simulerar vi olika attacker. Därefter modellerar och kontrollerar vi systematiskt komplexa samordnade attacker. CRYSTAL:s användbarhet demonstreras genom att avslöja skadligt beteende inom olika fallstudier inklusive ett Pneumatiskt Kontrollsystem (PCS), Temperaturkontrollsystem (TCS) och Säker Vattenbehandlingsanläggning (SWaT). 

Place, publisher, year, edition, pages
Västerås: Mälardalens universitet, 2024
Series
Mälardalen University Press Dissertations, ISSN 1651-4238 ; 407
National Category
Computer Systems
Research subject
Computer Science
Identifiers
urn:nbn:se:mdh:diva-66422 (URN)978-91-7485-646-0 (ISBN)
Public defence
2024-06-07, Omega, Mälardalens universitet, Västerås, 13:15 (English)
Opponent
Supervisors
Funder
Swedish Foundation for Strategic Research
Available from: 2024-04-15 Created: 2024-04-14 Last updated: 2024-05-17Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Moradi, FereidounPourvatan, BahmanAbbaspour Asadollah, SaraSirjani, Marjan

Search in DiVA

By author/editor
Moradi, FereidounPourvatan, BahmanAbbaspour Asadollah, SaraSirjani, Marjan
By organisation
Embedded SystemsSchool of Business, Society and Engineering
In the same journal
Journal of Parallel and Distributed Computing
Computer Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 121 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf