VERCASM-CPS: Vulnerability Analysis and Cyber Risk Assessment for Cyber-Physical Systems

被引:7
|
作者
Northern, Bradley [1 ]
Burks, Trey [1 ]
Hatcher, Marlana [1 ]
Rogers, Michael [1 ]
Ulybyshev, Denis [1 ]
机构
[1] Tennessee Technol Univ, Dept Comp Sci, Cookeville, TN 38505 USA
关键词
cyber-physical systems; industrial control systems; data privacy; moving target defense; cyber-risk score;
D O I
10.3390/info12100408
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since Cyber-Physical Systems (CPS) are widely used in critical infrastructures, it is essential to protect their assets from cyber attacks to increase the level of security, safety and trustworthiness, prevent failure developments, and minimize losses. It is necessary to analyze the CPS configuration in an automatic mode to detect the most vulnerable CPS components and reconfigure or replace them promptly. In this paper, we present a methodology to determine the most secure CPS configuration by using a public database of cyber vulnerabilities to identify the most secure CPS components. We also integrate the CPS cyber risk analysis with a Controlled Moving Target Defense, which either replaces the vulnerable CPS components or re-configures the CPS to harden it, while the vulnerable components are being replaced. Our solution helps to design a more secure CPS by updating the configuration of existing CPS to make them more resilient against cyber attacks. In this paper, we will compare cyber risk scores for different CPS configurations and show that the Windows(R) 10 build 20H2 operating system is more secure than Linux Ubuntu(R) 20.04, while Red Hat(R) Enterprise(R) Linux is the most secure in some system configurations.
引用
收藏
页数:23
相关论文
共 50 条
  • [31] Cyber-Physical IT Assessment Tool and Vulnerability Assessment for Semiconductor Companies
    Anne Cayetano, Trisha
    Dogao, Averyl
    Guipoc, Cristopher
    Palaoag, Thelma
    ICCSP 2018: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, 2018, : 67 - 71
  • [32] Cybersecurity for Safety: Risk Assessment of Autonomous Cyber-Physical Systems
    Perone, Stefano
    Faramondi, Luca
    Guarino, Simone
    Setola, Roberto
    Nobili, Martina
    Flammini, Francesco
    Corradini, Franca
    2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2024, : 652 - 657
  • [33] Risk Assessment for Cyber-Physical Systems: An Approach for Smart Grid
    Al Zadjali, Amira
    Ali, Saqib
    Al Balushi, Taiseera
    INNOVATION MANAGEMENT AND EDUCATION EXCELLENCE VISION 2020: FROM REGIONAL DEVELOPMENT SUSTAINABILITY TO GLOBAL ECONOMIC GROWTH, VOLS I - VI, 2016, : 3204 - 3213
  • [34] Behavior Prediction of Cyber-Physical Systems for Dynamic Risk Assessment
    Grobelna, Marta
    DEPENDABLE COMPUTING, EDCC 2021 WORKSHOPS, 2021, 1462 : 30 - 38
  • [35] On Vulnerability and Resilience of Cyber-Physical Power Systems: A Review
    Paul, Shuva
    Ding, Fei
    Utkarsh, Kumar
    Liu, Weijia
    O'Malley, Mark J.
    Barnett, John
    IEEE SYSTEMS JOURNAL, 2022, 16 (02): : 2367 - 2378
  • [36] Vulnerability Characterization and Privacy Quantification for Cyber-Physical Systems
    Bhattacharjee, Arpan
    Badsha, Shahriar
    Hossain, Md Tamjid
    Konstantinou, Charalambos
    Liang, Xueping
    IEEE CONGRESS ON CYBERMATICS / 2021 IEEE INTERNATIONAL CONFERENCES ON INTERNET OF THINGS (ITHINGS) / IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) / IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) / IEEE SMART DATA (SMARTDATA), 2021, : 217 - 223
  • [37] Cyber-physical Systems
    Wolf, Wayne
    COMPUTER, 2009, 42 (03) : 88 - 89
  • [38] Cyber-Physical System (CPS): State of the Art
    Jamaludin, Juliza
    Rohani, Jemmy Mohd
    2018 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONIC AND ELECTRICAL ENGINEERING (ICE CUBE), 2018,
  • [39] Cyber-Physical Systems
    Letichevsky A.A.
    Letychevskyi O.O.
    Skobelev V.G.
    Volkov V.A.
    Letichevsky, A.A. (aaletichevsky78@gmail.com), 2017, Springer Science and Business Media, LLC (53) : 821 - 834
  • [40] CYBER-PHYSICAL SYSTEMS
    Zanero, Stefano
    COMPUTER, 2017, 50 (04) : 15 - 16