Abstract
As the presence of Cyber-Physical Systems (CPS) becomes ubiquitous throughout all facets of modern society, malicious attacks by hostile actors have increased exponentially in recent years. Attacks on critical national infrastructure (CNI) such as oil pipelines or electrical power grids have become commonplace, as increased connectivity to the public internet increases the attack surface of CPS. This paper presents a study of the current academic literature describing the state of the art for anomaly detection of security threats to Cyber-Physical Systems, with a focus on life safety issues for industrial control networks (ICS), with the goal of improving the accuracy of anomaly detection. As a new contribution, this paper also identifies outstanding challenges in the field, and maps selected challenges to potential solutions and/or opportunities for further research.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Zanero, S.: Cyber-physical systems. Computer 50(4), 14–16 (2017). https://doi.org/10.1109/MC.2017.105
Radanliev, P., De Roure, D., Van Kleek, M., Santos, O., Ani, U.: Artificial intelligence in cyber physical systems. AI & Soc. 36(3), 783–796 (2020). https://doi.org/10.1007/s00146-020-01049-0
Rouzbahani, H.M., Karimipour, H., Rahimnejad, A., Dehghantanha, A., Srivastava, G.: Anomaly detection in cyber-physical systems using machine learning. In: Choo, K.-K.R., Dehghantanha, A. (eds.) Handbook of Big Data Privacy, pp. 219–235. Springer International Publishing, Cham (2020). https://doi.org/10.1007/978-3-030-38557-6_10
Wolf, M., Serpanos, D.: Safety and security in cyber-physical systems and internet-of-things systems. Proc. IEEE 106(1), 9–20 (2018). https://doi.org/10.1109/JPROC.2017.2781198
Langner, R.: To kill a centrifuge: a technical analysis of what stuxnet's creators tried to achieve. The Langner Group https://www.langner.com/to-kill-a-centrifuge/ (2011)
Tsochev, G., Sharabov, M.: Artificial intelligence methods used in industry 4.0 in particular industrial control systems. In: AIP Conference Proceedings, vol. 2333, p. 070017 (2021). https://doi.org/10.1063/5.0041610
Craggs, B., Rashid, A.: Smart cyber-physical systems: beyond usable security to security ergonomics by design. In: 2017 IEEE/ACM 3rd International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS), pp. 22–25 (2017). https://doi.org/10.1109/SEsCPS.2017.5
Stout, W.M.S.: Toward a multi-agent system architecture for insight & cybersecurity in cyber-physical networks. In: 2018 International Carnahan Conference on Security Technology (ICCST), pp. 1–5 (2018). https://doi.org/10.1109/CCST.2018.8585632
Das, R., Menon, V., Morris, T.H.: On the edge realtime intrusion prevention system for DoS attack. In: Proceedings of 5th International Symposium for ICS & SCADA Cyber Security Research 2018 (ICS-CSR 2018) (2018). https://doi.org/10.14236/ewic/ICS2018.10
Maloney, M., Reilly, E., Siegel, M., Falco, G.: Cyber physical iot device manage-ment using a lightweight agent. In: 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 1009–1014 (2019). https://doi.org/10.1109/iThings/GreenCom/CPSCom/SmartData.2019.00176
Rehman, S., Gruhn, V.: An effective security requirements engineering framework for cyber-physical systems. Technologies 2018(6), 65 (2018). https://doi.org/10.3390/technologies6030065
Qassim, Q.S., Jamil, N., Mahdi, M.N., Abdul Rahim, A.A.: Towards SCADA threat intelligence based on intrusion detection systems - a short review. In: 2020 8th International Conference on Information Technology and Multimedia (ICIMU), pp. 144–149 (2020). https://doi.org/10.1109/ICIMU49871.2020.9243337
Benbenishti, L.: SCADA MODBUS Protocol Vulnerabilities. Cyberbit (2017). https://www.cyberbit.com/blog/ot-security/scada-modbus-protocol-vulnerabilities/
Osborne, C.: Colonial pipeline attack: everything you need to know. Zdnet (2021). https://www.zdnet.com/article/colonial-pipeline-ransomware-attack-everything-you-need-to-know/
Rubio, J.E., Alcaraz, C., Roman, R., Lopez, J.: Current cyber-defense trends in industrial control systems. Comput. Secur. 87, 101561 (2019). https://doi.org/10.1016/j.cose.2019.06.015
Toshihiko, O.: Lightweight cryptography applicable to various IoT devices. NEC Technical J. 12(1), 67–71 (2017). https://www.nec.com/en/global/techrep/journal/g17/n01/170114.html
Adamsky, F., et al.: Integrated protection of industrial control systems from cyber-attacks: the ATENA approach. Int. J. Crit. Infrastruct. Prot. 21, 72–82 (2018). https://doi.org/10.1016/j.ijcip.2018.04.004
Nunes, D., Sá Silva, J., Boavida, F.: A Practical Introduction to Human‐in‐the‐Loop Cyber‐Physical Systems. Wiley Publishing (2018). https://doi.org/10.1002/9781119377795
Wu, M., Song, Z., Moon, Y.B.: Detecting cyber-physical attacks in CyberManufacturing systems with machine learning methods. J. Intell. Manuf. 30(3), 1111–1123 (2017). https://doi.org/10.1007/s10845-017-1315-5
Kabiri, P., Chavoshi, M.: Destructive attacks detection and response system for physical devices in cyber-physical systems. In: 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), pp. 1–6 (2019). https://doi.org/10.1109/CyberSecPODS.2019.8884999
Etalle, S.: Network monitoring of industrial control systems: the lessons of security matters. In: CPS-SPC'19: Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy (2019). https://doi.org/10.1145/3338499.3357354
Alhaidari, F.A., AL-Dahasi, E.M.: New approach to determine DDoS attack patterns on SCADA system using machine learning. In: 2019 International Conference on Computer and Information Sciences (ICCIS), pp. 1–6 (2019). https://doi.org/10.1109/ICCISci.2019.8716432
Ashibani, Y., Mahmoud, Q.H.: Cyber physical systems security: analysis, challenges and solutions. Comput. Secur. 68(2017), 81–97 (2017). https://doi.org/10.1016/j.cose.2017.04.005
Bostjancic Rakas, S.V., Stojanovic, M.D., Markovic-Petrovic, J.D.: A review of research work on network-based SCADA intrusion detection systems. IEEE Access 8, 93083–93108 (2020). https://doi.org/10.1109/ACCESS.2020.2994961
Sundararajan, A., Chavan, D., Saleem, A.I.S.: A survey of protocol-level challenges and solutions for distributed energy resource cyber-physical security. Energies 2018(11), 2360 (2018). https://doi.org/10.3390/en11092360
Bartusiak, R.D., et al.: Open Process Automation: A standards-based, open, secure, interoperable process control archi-tecture. Control Eng. Pract. 121, 105034 (2022). https://doi.org/10.1016/j.conengprac.2021.105034
Kabore, R., Kouassi, A., N’goran, R., Asseu, O., Kermarrec, Y., Lenca, P.: Review of anomaly detection systems in industrial control systems using deep feature learning approach. Engineering 13(01), 30–44 (2021). https://doi.org/10.4236/eng.2021.131003
Acknowledgement
This research has been funded by the SUDOE Interreg Program -grant INUNDATIO-, by the Spanish Ministry of Economics and Industry, grant PID2020-112726RB-I00, by the Spanish Research Agency (AEI, Spain) under grant agreement RED2018-102312-T (IA-Biomed), and by the Ministry of Science and Innovation under CERVERA Excellence Network project CER-20211003 (IBERUS) and Missions Science and Innovation project MIG-20211008 (INMERBOT). Also, by Principado de Asturias, grant SV-PA-21-AYUD/2021/50994.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Jeffrey, N., Tan, Q., Villar, J.R. (2023). Anomaly Detection of Security Threats to Cyber-Physical Systems: A Study. In: García Bringas, P., et al. 17th International Conference on Soft Computing Models in Industrial and Environmental Applications (SOCO 2022). SOCO 2022. Lecture Notes in Networks and Systems, vol 531. Springer, Cham. https://doi.org/10.1007/978-3-031-18050-7_1
Download citation
DOI: https://doi.org/10.1007/978-3-031-18050-7_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-18049-1
Online ISBN: 978-3-031-18050-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)