Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3302509.3311041acmconferencesArticle/Chapter ViewAbstractPublication PagesiccpsConference Proceedingsconference-collections
research-article
Public Access

Availability attacks on computing systems through alteration of environmental control: smart malware approach

Published: 16 April 2019 Publication History
  • Get Citation Alerts
  • Abstract

    In this paper, we demonstrate the feasibility of smart malware that advances state-of-the-art attacks by (i) indirectly attacking a computing infrastructure through a cyber-physical system (CPS) that manages the environment in which the computing enterprise operates, (ii) disguising its malicious actions as accidental failures, and (iii) self-learning attack strategies from cyber-physical system measurement data. We address all aspects of the malware, including the construction of the self-learning malware and the launch of a failure injection attack. We validate the attacks in a data-driven CPS simulation environment developed as part of this study.

    References

    [1]
    Homa Alemzadeh, Daniel Chen, Xiao Li, Thenkurussi Kesavadas, Zbigniew T. Kalbarczyk, and Ravishankar K. Iyer. 2016. Targeted Attacks on Teleoperated Surgical Robots: Dynamic Model-based Detection and Mitigation. In Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks. 395--406.
    [2]
    Zahid Anwar and Asad Waqar Malik. 2014. Can a DDoS Attack Meltdown My Data Center? A Simulation Study and Defense Strategies. IEEE Communications Letters 18, 7 (July 2014), 1175--1178.
    [3]
    Phuong Cao, Eric Badger, Zbigniew Kalbarczyk, Ravishankar Iyer, and Adam Slagell. 2015. Preemptive Intrusion Detection: Theoretical Framework and Real-world Measurements. In Proceedings of the 2015 Symposium and Bootcamp on the Science of Security. 1--12.
    [4]
    Alvaro A Cárdenas, Saurabh Amin, and Shankar Sastry. 2008. Research Challenges for the Security of Control Systems. In 3rd USENIX Workshop on Hot Topics in Security.
    [5]
    Keywhan Chung, Valerio Formicola, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, Alexander Withers, and Adam J. Slagell. 2016. Attacking Supercomputers Through Targeted Alteration of Environmental Control: A Data Driven Case Study. In Proceedings of the IEEE Conference on Communications and Network Security. 406--410.
    [6]
    Catello Di Martino, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Fabio Baccanico, Joseph Fullop, and William Kramer. 2014. Lessons Learned from the Analysis of System Failures at Petascale: The Case of Blue Waters. In Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks. 610--621.
    [7]
    Xing Gao, Dachuan Liu, Daiping Liu, and Haining Wang. 2016. On Energy Security of Smartphones. In Proceedings of the ACM Conference on Data and Application Security and Privacy. 148--150.
    [8]
    Xing Gao, Zhang Xu, Haining Wang, Li Li, and Xiaorui Wang. 2017. Why Some Like It Hot Too: Thermal Attack on Data Centers. In Proceedings of the ACM International Conference on Measurement and Modeling of Computer Systems. 23--24.
    [9]
    Xing Gao, Zhang Xu, Haining Wang, Li Li, and Xiaorui Wang. 2018. Reduced Cooling Redundancy: A New Security Vulnerability in a Hot Data Center. In Proceedings of the Network and Distributed System Security Symposium.
    [10]
    Luis Garcia, Ferdinand Brasser, Mehmet Hazar Cintuglu, Ahmad-Reza Sadeghi, Osama A. Mohammed, and Saman A. Zonouz. 2017. Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit. In Proceedings of the Annual Network and Distributed System Security Symposium.
    [11]
    John A. Hartigan and Manchek A. Wong. 1979. Algorithm AS 136: A K-Means Clustering Algorithm. Journal of the Royal Statistical Society. Series C (Applied Statistics) 28, 1 (1979), 100--108.
    [12]
    Wade W. Huebsch, Bruce R. Munson, Theodore H. Okiishi, and Donald F. Young. 2009. Fundamentals of Fluid Mechanics. John Wiley & Sons.
    [13]
    Ralph Langner. 2011. Stuxnet: Dissecting a Cyberwarfare Weapon. IEEE Security & Privacy 9,3 (2011), 49--51.
    [14]
    Robert M. Lee, Michael J. Assante, and Tim Conway. 2016. Analysis of the Cyber Attack on the Ukrainian Power Grid. Technical Report. Electricity Information Sharing and Analysis Center (E-ISAC).
    [15]
    Chao Li, Zhenhua Wang, Xiaofeng Hou, Haopeng Chen, Xiaoyao Liang, and Minyi Guo. 2016. Power Attack Defense: Securing Battery-Backed Data Centers. In Proceedings of the ACM/IEEE 43rd Annual International Symposium on Computer Architecture. 493--505.
    [16]
    Bernard Lim, Daniel Chen, Yongkyu An, Zbigniew Kalbarczyk, and Ravishankar Iyer. 2017. Attack Induced Common-Mode Failures on PLC-Based Safety System in a Nuclear Power Plant: Practical Experience Report. In Proceedings of the IEEE Pacific Rim International Symposium on Dependable Computing. 205--210.
    [17]
    Hui Lin, Adam Slagell, Catello Di Martino, Zbigniew Kalbarczyk, and Ravishankar K. Iyer. 2013. Adapting Bro into SCADA: Building a Specification-based Intrusion Detection System for the DNP3 Protocol. In Proceedings of the Annual Cyber Security and Information Intelligence Research Workshop. 5:1--5:4.
    [18]
    S. McLaughlin, B. Holbert, A. Fawaz, R. Berthier, and S. Zonouz. 2013. A Multi-Sensor Energy Theft Detection Framework for Advanced Metering Infrastructures. IEEE Journal on Selected Areas in Communications 31, 7 (July 2013), 1319--1330.
    [19]
    The Bro Project. 2012. The Bro Network Security Monitor. (2012). http://www.bro.org/
    [20]
    Aashish Sharma, Zbigniew Kalbarczyk, James Barlow, and Ravishankar Iyer. 2011. Analysis of Security Data from a Large Computing Organization. In Proceedings of the 41st Annual IEEE/IFIP International Conference on Dependable Systems and Networks. 506--517.
    [21]
    Shawn Shields. 2009. Dynamic Thermal Response of the Data Center to Cooling Loss During Facility Power Failure. Ph.D. Dissertation. Georgia Institute of Technology.
    [22]
    Siemens. 2008. SIMATIC S7 - OPENMODBUS / TCP Communication via the Integrated PN Interface of the PLC. Siemens.
    [23]
    Siemens Building Technologies. 2000. APOGEE Powers Process Control Language (PPCL) User's Manual. Siemens.
    [24]
    André Teixeira, Daniel Pérez, Henrik Sandberg, and Karl Henrik Johansson. 2012. Attack Models and Scenarios for Networked Control Systems. In Proceedings of the 1st International Conference on High Confidence Networked Systems (HiCoNS '12). 55--64.
    [25]
    André Teixeira, Henrik Sandberg, and Karl H Johansson. 2010. Networked Control Systems under Cyber Attacks with Applications to Power Networks. In Proceedings of the American Control Conference (ACC). IEEE, 3690--3696.
    [26]
    U.S. Senate, Committee on Commerce, Science and Transportaion. 2014. A 'Kill Chain' Analysis of the 2013 Target Data Breach. Technical Report.
    [27]
    Zhenyu Wu, Mengjun Xie, and Haining Wang. 2011. Energy Attack on Server Systems. In Proceedings of the 5th USENIX Workshop on Offensive Technologies.
    [28]
    Heng Zhang, Peng Cheng, Ling Shi, and Jiming Chen. 2016. Optimal DoS attack scheduling in wireless networked control system. IEEE Transactions on Control Systems Technology 24, 3 (2016), 843--852.
    [29]
    Rongliang Zhou, Zhikui Wang, Cullen E. Bash, Tahir Cade, and Alan McReynolds. 2012. Failure Resistant Data Center Cooling Control through Model-based Thermal Zone Mapping. In Proceedings of the ASME Summer Heat Transfer Conference. 751--757.

    Cited By

    View all
    • (2024)AI-Driven Solutions for Social Engineering Attacks: Detection, Prevention, and Response2024 2nd International Conference on Cyber Resilience (ICCR)10.1109/ICCR61006.2024.10533010(1-8)Online publication date: 26-Feb-2024
    • (2023)Security-Informed Safety Analysis of Autonomous Transport Systems Considering AI-Powered Cyberattacks and ProtectionEntropy10.3390/e2508112325:8(1123)Online publication date: 26-Jul-2023
    • (2023)Neural Network: Predator, Victim, and Information Security ToolOptical Memory and Neural Networks10.3103/S1060992X2204002631:4(323-332)Online publication date: 10-Jan-2023
    • Show More Cited By

    Index Terms

    1. Availability attacks on computing systems through alteration of environmental control: smart malware approach

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image ACM Conferences
          ICCPS '19: Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems
          April 2019
          367 pages
          ISBN:9781450362856
          DOI:10.1145/3302509
          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Sponsors

          In-Cooperation

          • IEEE-CS\TCRT: TC on Real-Time Systems

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          Published: 16 April 2019

          Permissions

          Request permissions for this article.

          Check for updates

          Author Tags

          1. CPS
          2. cyber physical systems
          3. cyber security
          4. malware

          Qualifiers

          • Research-article

          Funding Sources

          Conference

          ICCPS '19
          Sponsor:

          Acceptance Rates

          Overall Acceptance Rate 25 of 91 submissions, 27%

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)158
          • Downloads (Last 6 weeks)8
          Reflects downloads up to 09 Aug 2024

          Other Metrics

          Citations

          Cited By

          View all
          • (2024)AI-Driven Solutions for Social Engineering Attacks: Detection, Prevention, and Response2024 2nd International Conference on Cyber Resilience (ICCR)10.1109/ICCR61006.2024.10533010(1-8)Online publication date: 26-Feb-2024
          • (2023)Security-Informed Safety Analysis of Autonomous Transport Systems Considering AI-Powered Cyberattacks and ProtectionEntropy10.3390/e2508112325:8(1123)Online publication date: 26-Jul-2023
          • (2023)Neural Network: Predator, Victim, and Information Security ToolOptical Memory and Neural Networks10.3103/S1060992X2204002631:4(323-332)Online publication date: 10-Jan-2023
          • (2023)Deep Note: Can Acoustic Interference Damage the Availability of Hard Disk Storage in Underwater Data Centers?Proceedings of the 15th ACM Workshop on Hot Topics in Storage and File Systems10.1145/3599691.3603403(51-57)Online publication date: 9-Jul-2023
          • (2023)RansomAI: AI-Powered Ransomware for Stealthy EncryptionGLOBECOM 2023 - 2023 IEEE Global Communications Conference10.1109/GLOBECOM54140.2023.10437393(2578-2583)Online publication date: 4-Dec-2023
          • (2023)stealthML: Data-driven Malware for Stealthy Data Exfiltration2023 IEEE International Conference on Cyber Security and Resilience (CSR)10.1109/CSR57506.2023.10224946(16-21)Online publication date: 31-Jul-2023
          • (2023)An Overview of Artificial Intelligence Used in MalwareNordic Artificial Intelligence Research and Development10.1007/978-3-031-17030-0_4(41-51)Online publication date: 2-Feb-2023
          • (2022)The Emerging Threat of Ai-driven Cyber Attacks: A ReviewApplied Artificial Intelligence10.1080/08839514.2022.203725436:1Online publication date: 4-Mar-2022
          • (2022)Offensive Machine Learning Methods and the Cyber Kill ChainArtificial Intelligence and Cybersecurity10.1007/978-3-031-15030-2_6(125-145)Online publication date: 1-Aug-2022
          • (2022)Security for Software on Tiny DevicesSystem Dependability and Analytics10.1007/978-3-031-02063-6_7(141-160)Online publication date: 26-Jul-2022
          • Show More Cited By

          View Options

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          Get Access

          Login options

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media