Modeling Cyberattack Propagation and Impacts on Cyber-Physical System Safety: An Experiment
Abstract
:1. Introduction
2. Related Works
2.1. Threat Models
2.2. Formalisms
3. Illustrative Example: Autonomous Vessel
3.1. Architecture
- ANS: Autonomous Navigation System, which ensures the navigational functions of the vessel;
- GPS: Global Positioning System receiver, which receives the coordinates of the vessel;
- ECDIS: Electronic Chart Display and Information System, which transmits maps and other useful information;
- AIS: Autonomous Identification System, which provides information which, together with other systems, helps authorities and other ships to monitor sea traffic;
- RADAR: provides the bearing and distance of objects in the vessel’s vicinity for collision avoidance and navigation at sea;
- SAT: satellite emitter/receiver, which allows a ship to communicate with other vessels and on-ground infrastructures;
- SCC: Shore Control Center, which communicates information about traffic with the ship.
3.2. Security Measures
3.3. Threats
3.4. Top Events
3.5. Scenarios
4. Formal Representation of Attack Propagation on CPS
4.1. Definitions
- V is a finite set of variables;
- E is a set of events;
- T is a set of transitions, i.e., of triples , where:
- –
- e is an event from E;
- –
- g is a Boolean condition on variables of V, called the guard of the transition;
- –
- i is an instruction, i.e., a mechanism that modifies the current values of variables.
- is the initial state of the system, where a state is a valuation of all variables of V. Thus, is the initial valuation of all variables of V;
- is a set of critical states characterized by a Boolean condition on the values of the variables of V.
- The access privilege of the attacker on a component, e.g., none, user or root;
- The capacity of the attacker to harm the confidentiality, integrity, and availability of an asset (a component or function that is critical from a functional or cybersecurity point of view);
- The security measures present on components and communication links and their status with respect to the ongoing attack, e.g., activated, deactivated, or bypassed;
- The presence of security breaches;
- More generally, any information of interest regarding an ongoing cyberattack.
- is an execution (where the attacker does nothing);
- If is an execution, , and is a transition that is enabled in the state , then is an execution.
- 1.
- Executing a transition with an unmarked event and its guard satisfied;
- 2.
- Changing the values of the variables involved in the transition’s instruction;
- 3.
- Marking the event and storing it in an active sequence, then proceeding to step one unless:
- A critical state is reached; then, it must store the sequence and return to the last iteration to execute another transition;
- No transitions are left; then, it must return go to the last iteration to execute another one.
4.2. Approach Specificities
4.2.1. Costs of Events
4.2.2. Threat Model
5. Modeling the Illustrative Example
5.1. Modeling via DES
5.1.1. Modeling the System
- The set V contains the variable referring to component SCC; this variable is {role} with
- –
- domain(role) = {none; user; root}.
- The variables of the component AIS are {role, integrity, and availability}, with:
- –
- domain(integrity) = domain(availability) = {nominal; loss; undetected_loss}.
V also contains the variables of the communication link scc_to_ais, whose variables are {attacker and data}, with:- –
- domain(attacker) = {presence; absence};
- –
- domain(data) = {nominal, infected, erroneous, or none}.
- The set of events E is composed of ATT&CK (sub)techniques: “attacker compromise scc” (T1584 Compromise Infrastructure), “attacker send infected update to ais” (T0843 Program Download), “malware deploys on ais” and “privilege escalation on AIS” (T1068 Exploitation for Privilege Escalation).
- The set of transitions T is then:
- –
- e: attacker_compromise_sccg:i:
- –
- e: attacker_send_infected_packet_to_aisg:i:
- –
- e: malware_deploys_on_aisg:i:
- –
- e: privilege_escalation_on_AISg:i: .
- The initial state is the following:; ; ; ; ; .
- Finally, the critical state cs could be:
- –
- .
5.1.2. Modeling the Top Events
5.1.3. Modeling Attacks
5.2. Remark on Confidentiality and Scalability
Generation of Attack Sequences
5.3. Implementation in AltaRica
5.3.1. Modeling of the Vessel
5.3.2. Generation of Sequences
Listing 1. Fragment of the Case Study in AltaRica 3.0: AIS and link ais_to_ecdis. |
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
IoT | Internet of Things |
CPS | Cyber-Physical Systems |
ICS | Industrial Control System |
SRA | Security Risk Analysis |
MBS | Model-Based Security |
DES | Discrete Event Systems |
ICT | Information and Communication Technologies |
ANS | Autonomous Navigation System |
GPS | Global Positioning System |
ECDIS | Electronic Chart Display and Information System |
AIS | Autonomous Identification System |
SAT | Satellite |
SCC | Shore Control Center |
TE | Top Event |
CVE | Common Vulnerability and Exposure |
TM | Threat Modeling |
MB | Model-Based |
DFD | Dataflow Diagram |
SG-TMT | Smart Grid Threat Modeling Tool |
DLS | Domain-specific Language |
CWE | Common Weakness Enumeration |
AT | Attack Tree |
AG | Attack Graph |
SysML | System Modeling Language |
C-ES | Cyber-enabled Ships |
NMEA | National Marine Electronics Association |
FHA | Functional Hazard Analysis |
FMEA | Failure Mode and Effect Analysis |
References
- Geismann, J.; Bodden, E. A Systematic Literature Review of Model-Driven Security Engineering for Cyber–Physical Systems. J. Syst. Softw. 2020, 169, 17. [Google Scholar] [CrossRef]
- Nguyen, P.; Wang, S.; Yue, T. Model-Based Security Engineering for Cyber-Physical Systems: A Systematic Mapping Study. Inf. Softw. Technol. 2016, 83, 116–135. [Google Scholar] [CrossRef]
- MITRE. MITRE ATT&CK®. 2021. Available online: https://attack.mitre.org/ (accessed on 12 May 2021).
- Kavallieratos, G.; Katsikas, S.; Gkioulos, V. Cyber-Attacks Against the Autonomous Ship. In Computer Security; Springer International Publishing: Cham, Switzerland, 2019; Volume 11387, pp. 20–36. [Google Scholar] [CrossRef]
- Kavallieratos, G.; Spathoulas, G.; Katsikas, S. Cyber Risk Propagation and Optimal Selection of Cybersecurity Controls for Complex Cyberphysical Systems. Sensors 2021, 21, 1691. [Google Scholar] [CrossRef]
- Kavallieratos, G.; Katsikas, S. Managing Cyber Security Risks of the Cyber-Enabled Ship. J. Mar. Sci. Eng. 2020, 8, 768. [Google Scholar] [CrossRef]
- Kavallieratos, G.; Katsikas, S.; Gkioulos, V. Modelling Shipping 4.0: A Reference Architecture for the Cyber-Enabled Ship. In Intelligent Information and Database Systems; Lecture Notes in Computer Science; Springer International Publishing: Cham, Switzerland, 2020; pp. 202–217. [Google Scholar] [CrossRef]
- Myagmar, S.; Lee, A.; Yurcik, W. Threat Modeling as a Basis for Security Requirements. 2005; 9p. Available online: https://people.cs.pitt.edu/~adamlee/pubs/2005/sreis-05.pdf (accessed on 25 October 2022).
- Xiong, W.; Lagerström, R. Threat modeling–A systematic literature review. Comput. Secur. 2019, 84, 53–69. [Google Scholar] [CrossRef]
- Zacchia Lun, Y.; D’Innocenzo, A.; Smarra, F.; Malavolta, I.; Di Benedetto, M.D. State of the Art of Cyber-Physical Systems Security: An Automatic Control Perspective. J. Syst. Softw. 2019, 149, 174–216. [Google Scholar] [CrossRef] [Green Version]
- Cherdantseva, Y.; Burnap, P.; Blyth, A.; Eden, P.; Jones, K.; Soulsby, H.; Stoddart, K. A Review of Cyber Security Risk Assessment Methods for SCADA Systems. Comput. Secur. 2016, 56, 1–27. [Google Scholar] [CrossRef] [Green Version]
- Microsoft. The STRIDE Threat Model. 2009. Available online: https://learn.microsoft.com/en-us/previous-versions/commerce-server/ee823878(v=cs.20) (accessed on 20 April 2021).
- Khan, R.; McLaughlin, K.; Laverty, D.; Sezer, S. STRIDE-based threat modeling for cyber-physical systems. In Proceedings of the 2017 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe), Torino, Italy, 26–29 September 2017; pp. 1–6. [Google Scholar] [CrossRef]
- Khalil, S.M.; Bahsi, H.; Dola, H.O.; Korõtko, T.; McLaughlin, K.; Kotkas, V. Threat Modeling of Cyber-Physical Systems—A Case Study of a Microgrid System. Comput. Secur. 2022, 124, 102950. [Google Scholar] [CrossRef]
- Holik, F.; Flå, L.H.; Jaatun, M.G.; Yayilgan, S.Y.; Foros, J. Threat Modeling of a Smart Grid Secondary Substation. Electronics 2022, 11, 850. [Google Scholar] [CrossRef]
- Strom, B.E.; Applebaum, A.; Miller, D.P.; Nickels, K.C.; Pennington, A.G.; Thomas, C.B. MITRE ATT&CK™: Design and Philosophy. 2018. Available online: https://www.mitre.org/publications/technical-papers/mitre-attack-design-and-philosophy (accessed on 14 July 2021).
- CAPEC—Common Attack Pattern Enumeration and Classification (CAPEC™). Available online: https://capec.mitre.org/index.html (accessed on 14 July 2021).
- Xiong, W.; Legrand, E.; Åberg, O.; Lagerström, R. Cyber security threat modeling based on the MITRE Enterprise ATT&CK Matrix. Softw. Syst. Model. 2022, 21, 157–177. [Google Scholar] [CrossRef]
- Choi, S.; Yun, J.H.; Min, B.G. Probabilistic Attack Sequence Generation and Execution Based on MITRE ATT&CK for ICS Datasets. In Proceedings of the CSET’21, Cyber Security Experimentation and Test Workshop, Virtual, CA, USA, 9 September 2021; Association for Computing Machinery: New York, NY, USA, 2021; pp. 41–48. [Google Scholar] [CrossRef]
- Ullah, S.; Shetty, S.; Nayak, A.; Hassanzadeh, A.; Hasan, K. Cyber Threat Analysis Based on Characterizing Adversarial Behavior for Energy Delivery System. In Security and Privacy in Communication Networks; Springer International Publishing: Cham, Switzerland, 2019; Volume 305, pp. 146–160. [Google Scholar] [CrossRef]
- Brazhuk, A. Towards automation of threat modeling based on a semantic model of attack patterns and weaknesses. arXiv 2021. [Google Scholar] [CrossRef]
- Välja, M.; Heiding, F.; Franke, U.; Lagerström, R. Automating threat modeling using an ontology framework. Cybersecurity 2020, 3, 19. [Google Scholar] [CrossRef]
- Weiss, J.D. A System Security Engineering Process. In Proceedings of the 14th National Computer Security Conference, Washington, DC, USA, 1–4 October 1991; Volume 249, pp. 572–581. [Google Scholar]
- Slater, C.; Saydjari, O.; Schneier, B.; Wallner, J. Toward a Secure System Engineering Methodolgy. In Proceedings of the 1998 Workshopo of New Security Paradigms, Charlottsville, VA, USA, 22–26 September 1998; pp. 2–10. [Google Scholar] [CrossRef]
- Dacier, M. Vers une Évaluation Quantitative de la Sécurité Informatique. Ph.D. Thesis, Institut National Polytechnique de Toulouse—INPT, Toulouse, France, 1994. Available online: https://tel.archives-ouvertes.fr/tel-00012022 (accessed on 28 December 2020).
- Wideł, W.; Audinot, M.; Fila, B.; Pinchinat, S. Beyond 2014: Formal Methods for Attack Tree–based Security Modeling. ACM Comput. Surv. 2019, 52, 75:1–75:36. [Google Scholar] [CrossRef] [Green Version]
- Jhawar, R.; Kordy, B.; Mauw, S.; Radomirović, S.; Trujillo-Rasua, R. Attack Trees with Sequential Conjunction. In ICT Systems Security and Privacy Protection; Federrath, H., Gollmann, D., Eds.; IFIP Advances in Information and Communication Technology; Springer International Publishing: Cham, Switzerland, 2015; pp. 339–353. [Google Scholar] [CrossRef]
- Horne, R.; Mauw, S.; Tiu, A. Semantics for Specialising Attack Trees based on Linear Logic. Fundam. Informaticae 2017, 153, 57–86. [Google Scholar] [CrossRef] [Green Version]
- André, E.; Lime, D.; Ramparison, M.; Stoelinga, M. Parametric Analyses of Attack-fault Trees. Fundam. Informaticae 2021, 182, 69–94. [Google Scholar] [CrossRef]
- Tantawy, A.; Abdelwahed, S.; Erradi, A.; Shaban, K. Model-based risk assessment for cyber physical systems security. Comput. Secur. 2020, 96, 101864. [Google Scholar] [CrossRef]
- Sheyner, O.; Haines, J.; Jha, S.; Lippmann, R.; Wing, J. Automated generation and analysis of attack graphs. In Proceedings of the 2002 IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 12–15 May 2002; pp. 273–284, ISSN: 1081-6011. [Google Scholar] [CrossRef]
- Ammann, P.; Wijesekera, D.; Kaushik, S. Scalable, graph-based network vulnerability analysis. In Proceedings of the CCS’02, 9th ACM Conference on Computer and Communications Security, Washington, DC, USA, 18–22 November 2002; Association for Computing Machinery: New York, NY, USA, 2002; pp. 217–224. [Google Scholar] [CrossRef]
- Noel, S.; Jajodia, S. Managing attack graph complexity through visual hierarchical aggregation. In Proceedings of the VizSEC/DMSEC’04, 2004 ACM Workshop on Visualization and Data Mining for Computer Security, Washington, DC, USA, 29 October 2004; Association forComputing Machinery: New York, NY, USA, 2004; pp. 109–118. [Google Scholar] [CrossRef] [Green Version]
- Man, D.; Zhang, B.; Yang, W.; Jin, W.; Yang, Y. A Method for Global Attack Graph Generation. In Proceedings of the 2008 IEEE International Conference on Networking, Sensing and Control, Hainan, China, 6–8 April 2008; pp. 236–241. [Google Scholar] [CrossRef]
- Yichao, Z.; Tianyang, Z.; Xiaoyue, G.; Qingxian, W. An Improved Attack Path Discovery Algorithm Through Compact Graph Planning. IEEE Access 2019, 7, 59346–59356. [Google Scholar] [CrossRef]
- Bi, K.; Han, D.; Zhang, G.; Li, K.C.; Castiglione, A. K maximum probability attack paths generation algorithm for target nodes in networked systems. Int. J. Inf. Secur. 2021, 20, 535–551. [Google Scholar] [CrossRef]
- Ye, Z.; Guo, Y.; Ju, A. Zero-Day Vulnerability Risk Assessment and Attack Path Analysis Using Security Metric. In Artificial Intelligence and Security; Springer International Publishing: Cham, Switzerland, 2019; Volume 11635, pp. 266–278. [Google Scholar] [CrossRef]
- Stan, O.; Bitton, R.; Ezrets, M.; Dadon, M.; Inokuchi, M.; Ohta, Y.; Yamada, Y.; Yagyu, T.; Elovici, Y.; Shabtai, A. Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks. arxiv 2019. [Google Scholar] [CrossRef]
- LeMay, E.; Ford, M.; Keefe, K.; Sanders, W.; Muehrcke, C. Model-Based Security Metrics Using ADversary VIew Security Evaluation (ADVISE). In Proceedings of the Eighth International Conference on Quantitative Evaluation of SysTems, Aachen, Germany, 5–8 September 2011; pp. 191–200. [Google Scholar] [CrossRef]
- Ou, X.; Boyer, W.F.; McQueen, M.A. A scalable approach to attack graph generation. In Proceedings of the CCS ’06, 13th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 30 October–3 November 2006; Association for Computing Machinery: New York, NY, USA, 2006; pp. 336–345. [Google Scholar] [CrossRef] [Green Version]
- Lallie, H.S.; Debattista, K.; Bal, J. A review of attack graph and attack tree visual syntax in cyber security. Comput. Sci. Rev. 2020, 35, 47. [Google Scholar] [CrossRef]
- Kaynar, K. A taxonomy for attack graph generation and usage in network security. J. Inf. Secur. Appl. 2016, 29, 27–56. [Google Scholar] [CrossRef]
- Aissa, A.B.; Abdalla, I.; Hussein, L.F.; Elhadad, A. A Novel Stochastic Model For Cybersecurity Metric Inspired By Markov Chain Model And Attack Graphs. IJSTR Int. J. Sci. Technol. Res. 2020, 9, 7. [Google Scholar]
- Al-Karaki, J.N.; Gawanmeh, A.; Almalkawi, I.T.; Alfandi, O. Probabilistic analysis of security attacks in cloud environment using hidden Markov models. Trans. Emerg. Telecommun. Technol. 2022, 33, 1–19. [Google Scholar] [CrossRef]
- Phiri, L.; Tembo, S. Petri Net-Based (PN) Cyber Risk Assessment and Modeling for Zambian Smart Grid (SG) ICS and SCADA Systems. Comput. Sci. Eng. 2022, 12, 1–14. [Google Scholar]
- Fritz, R.; Zhang, P. Modeling and detection of cyber attacks on discrete event systems. IFAC-PapersOnLine 2018, 51, 285–290. [Google Scholar] [CrossRef]
- Ryan, P.Y.A. Mathematical Models of Computer Security. In Proceedings of the Foundations of Security Analysis and Design; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2001; pp. 1–62. [Google Scholar] [CrossRef] [Green Version]
- Gruska, D.P. Process Algebra Contexts and Security Properties. Fundam. Informaticae 2010, 102, 63–76. [Google Scholar] [CrossRef] [Green Version]
- Lanotte, R.; Merro, M.; Munteanu, A.; Viganò, L. A Formal Approach to Physics-based Attacks in Cyber-physical Systems. ACM Trans. Priv. Secur. 2020, 23, 1–41. [Google Scholar] [CrossRef]
- Nweke, L.O.; Weldehawaryat, G.K.; Wolthusen, S.D. Threat Modeling of Cyber–Physical Systems Using an Applied PI-Calculus. Int. J. Crit. Infrastruct. Prot. 2021, 35, 100466. [Google Scholar] [CrossRef]
- Cheah, M.; Nguyen, H.N.; Bryans, J.; Shaikh, S.A. Formalising Systematic Security Evaluations Using Attack Trees for Automotive Applications. In Information Security Theory and Practice; Springer International Publishing: Cham, Switzerland, 2018; pp. 113–129. [Google Scholar] [CrossRef]
- Kang, E.; Adepu, S.; Jackson, D.; Mathur, A.P. Model-Based Security Analysis of a Water Treatment System. In Proceedings of the 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systems, Austin, TX, USA, 14–22 May 2016; ACM Press: Austin, TX, USA, 2016; pp. 22–28. [Google Scholar] [CrossRef]
- Li, L. Safe and Secure Model-Driven Design for Embedded Systems. Ph.D. Thesis, Université Paris-Saclay, Gif-sur-Yvette, France, 2018. Available online: https://pastel.archives-ouvertes.fr/tel-01894734/file/77782_LI_2018_archivage.pdf (accessed on 20 October 2020).
- Zografopoulos, I.; Ospina, J.; Liu, X.; Konstantinou, C. Cyber-Physical Energy Systems Security: Threat Modeling, Risk Assessment, Resources, Metrics, and Case Studies. IEEE Access 2021, 9, 29775–29818. [Google Scholar] [CrossRef]
- ICS; INTERCARGO; INTERTANKO; OCIMF; BIMCO; CLIA; IUMI. The Guidelines on Cyber Security Onboard Ships. 2020. Available online: https://www.ics-shipping.org/wp-content/uploads/2020/08/guidelines-on-cyber-security-onboard-ships-min.pdf (accessed on 25 November 2021).
- Tusher, H.M.; Munim, Z.H.; Notteboom, T.E.; Kim, T.E.; Nazir, S. Cyber security risk assessment in autonomous shipping. Marit. Econ. Logist. 2022. [Google Scholar] [CrossRef]
- Jones, M. Spoofing in the Black Sea: What Really Happened? GPS World, 11 October 2017. Available online: https://www.gpsworld.com/spoofing-in-the-black-sea-what-really-happened/ (accessed on 21 October 2021).
- Bolbot, V.; Theotokatos, G.; Boulougouris, E.; Vassalos, D. Safety related cyber-attacks identification and assessment for autonomous inland ships. In Proceedings of the International Seminar on Safety and Security of Autonomous Vessels (ISSAV) and European STAMP Workshop and Conference (ESWC), Helsinki, Finland, 17–18 December 2019; pp. 95–109. [Google Scholar] [CrossRef]
- Svilicic, B.; Kamahara, J.; Celic, J.; Bolmsten, J. Assessing ship cyber risks: A framework and case study of ECDIS security. WMU J. Marit. Aff. 2019, 18, 509–520. [Google Scholar] [CrossRef]
- Wingrove, M. ‘Impregnable’ radar breached in simulated cyber attack. Riviera, 10 April 2018. Available online: https://www.rivieramm.com/news-content-hub/news-content-hub/impregnable-radar-breached-in-simulated-cyber-attack-25158 (accessed on 21 October 2021).
- Bolbot, V.; Theotokatos, G.; Boulougouris, E.; Vassalos, D. A novel cyber-risk assessment method for ship systems. Saf. Sci. 2020, 131, 104908. [Google Scholar] [CrossRef]
- El-Rewini, Z.; Sadatsharan, K.; Selvaraj, D.F.; Plathottam, S.J.; Ranganathan, P. Cybersecurity challenges in vehicular communications. Veh. Commun. 2020, 23, 100214. [Google Scholar] [CrossRef]
- Wang, P.; Wu, X.; He, X. Modeling and analyzing cyberattack effects on connected automated vehicular platoons. Transp. Res. Part C Emerg. Technol. 2020, 115, 102625. [Google Scholar] [CrossRef]
- MITRE. Denial of View T0815. 2021. Available online: https://attack.mitre.org/techniques/T0815/ (accessed on 31 August 2022).
- Borio, D.; O’Driscoll, C.; Fortuny, J. GNSS Jammers: Effects and countermeasures. In Proceedings of the 2012 6th ESA Workshop on Satellite Navigation Technologies (Navitec 2012) European Workshop on GNSS Signals and Signal Processing, Noordwijk, The Netherland, 5–7 December 2012; pp. 1–7. [Google Scholar] [CrossRef]
- Omitola, T.; Downes, J.; Wills, G.; Zwolinski, M.; Butler, M. Securing navigation of unmanned maritime systems. In Proceedings of the International Robotic Sailing Conference 2018, Southampton, UK, 31 August 2018; Available online: http://ceur-ws.org/Vol-2331/paper5.pdf (accessed on 29 November 2021).
- Intertanko. Jamming and Spoofing of Global Navigation Satellite Systems (GNSS). 2019. Available online: https://www.maritimeglobalsecurity.org/media/1043/2019-jamming-spoofing-of-gnss.pdf (accessed on 22 October 2021).
- Common Vulnerability and Exposure. Available online: https://cve.mitre.org/index.html (accessed on 17 November 2021).
- Hernan, S.; Ostwald, T.; Lambert, S.; Shostack, A. Uncover Security Design Flaws Using The STRIDE Approach. 2019. Available online: https://docs.microsoft.com/en-us/archive/msdn-magazine/2006/november/uncover-security-design-flaws-using-the-stride-approach (accessed on 9 October 2020).
- Batteux, M.; Prosvirnova, T.; Rauzy, A. AltaRica 3.0 in 10 Modeling Patterns. Int. J. Crit.-Comput.-Based Syst. 2019, 9, 133–165. [Google Scholar] [CrossRef]
- Serru, T.; Nguyen, N.; Batteux, M.; Rauzy, A.; Blaize, R.; Sagaspe, L.; Arbaretier, E. Generation of Cyberattacks Leading to Safety Top Event Using AltaRica: An Automotive Case Study. In Proceedings of the Congrès Lambda Mu 23 “ Innovations et Maîtrise des Risques Pour un Avenir Durable ”–23e Congrès de Maîtrise des Risques et de Sûreté de Fonctionnement, Institut Pour la Maîtrise des Risques, Angers, France, 10–13 October 2022; Available online: https://hal.archives-ouvertes.fr/hal-03875775 (accessed on 29 October 2022).
Component | Security Measures |
---|---|
AIS | Authentication, monitoring physical access |
ECDIS | Authentication, monitoring physical access |
ANS | Firewall, authentication, monitoring physical access, fail-safe procedures |
Radar | Authentication, monitoring physical access |
GPS | Monitoring physical access |
SAT | Monitoring physical access |
Component | Threats |
---|---|
AIS | Eavesdropping, illusion, bogus information, sybil, impersonation, alteration/replay, masquerade, collusion, delay, timing attack [62,63], privilege escalation, identity spoofing, signal jamming [58] |
ECDIS ANS | Exploitation of Apache vulnerabilities [59], malware installation during updates [60], denial of service (DoS), logic bombs, backdoors, SQL injection, data tempering, sensor freezing, obtaining control, erasing information [61] |
RADAR | Denial of view [64], spoofing [60], dazzling |
GPS | Jamming [65], spoofing [58], delay [66] |
SAT | Penetration via satcom [58], malicious payload received via satellite |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Serru, T.; Nguyen, N.; Batteux, M.; Rauzy, A. Modeling Cyberattack Propagation and Impacts on Cyber-Physical System Safety: An Experiment. Electronics 2023, 12, 77. https://doi.org/10.3390/electronics12010077
Serru T, Nguyen N, Batteux M, Rauzy A. Modeling Cyberattack Propagation and Impacts on Cyber-Physical System Safety: An Experiment. Electronics. 2023; 12(1):77. https://doi.org/10.3390/electronics12010077
Chicago/Turabian StyleSerru, Théo, Nga Nguyen, Michel Batteux, and Antoine Rauzy. 2023. "Modeling Cyberattack Propagation and Impacts on Cyber-Physical System Safety: An Experiment" Electronics 12, no. 1: 77. https://doi.org/10.3390/electronics12010077
APA StyleSerru, T., Nguyen, N., Batteux, M., & Rauzy, A. (2023). Modeling Cyberattack Propagation and Impacts on Cyber-Physical System Safety: An Experiment. Electronics, 12(1), 77. https://doi.org/10.3390/electronics12010077