A comprehensive approach, and a case study, for conducting attack detection experiments in Cyber–Physical Systems

G. Sabaliauskaite, G.S. Ng, J. Ruths, A. Mathur

Research output: Contribution to journalArticlepeer-review

20 Citations (Scopus)
93 Downloads (Pure)

Abstract

Several methods have been proposed by researchers to detect cyber attacks in Cyber–Physical Systems (CPSs). This paper proposes a comprehensive approach for conducting experiments to assess the effectiveness of such methods in the context of a robot (Amigobot) that includes both cyber and physical components. The proposed approach includes a method for performing vulnerability analysis, several methods for attack detection, and guidelines for conducting experimental studies in the context of cyber security. The method for vulnerability analysis makes use of the Failure-Attack-CounTermeasure (FACT) graph. The experimental study to evaluate methods for attack detection comprises of three experiments. These methods have been implemented and evaluated, within and across all three experiments, with respect to their effectiveness, detection speed, and durability for injection, scaling, and stealthy attacks. The proposed guidelines define key phases and artifacts for conducting such experiments and are an adaptation of those used in Software Engineering.
Original languageEnglish
Pages (from-to)174-191
Number of pages18
JournalRobotics and Autonomous Systems
Volume98
Early online date7 Oct 2017
DOIs
Publication statusPublished - Dec 2017
Externally publishedYes

Bibliographical note

NOTICE: this is the author’s version of a work that was accepted for publication in Robotics and Autonomous Systems. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Robotics and Autonomous Systems, 98, (2017)
DOI: 10.1016/j.robot.2017.09.018

© 2017, Elsevier. Licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International http://creativecommons.org/licenses/by-nc-nd/4.0/

Keywords

  • Cyber-attacks
  • Cyber–physical systems
  • Robots
  • Security
  • CUSUM method
  • Intelligent checker
  • FACT graph

Fingerprint

Dive into the research topics of 'A comprehensive approach, and a case study, for conducting attack detection experiments in Cyber–Physical Systems'. Together they form a unique fingerprint.

Cite this