• Title/Summary/Keyword: Cyber Physical System (CPS)

Search Result 85, Processing Time 0.03 seconds

Feasibility Analysis on the Attack Graph Applicability in Selected Domains

  • Junho Jang;Saehee Jun;Huiju Lee;Jaegwan Yu;SungJin Park;Su-Youn Hong;Huy Kang Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.5
    • /
    • pp.57-66
    • /
    • 2023
  • In this paper, a research trend of attack graph studies for Cyber-Physical System (CPS) environments is surveyed, and we analyse the limitations of previous works and prospect the future directions. 35 among around 150 attack graph studies conducted within 5 years target CPS, and we inspect key features of CPS environment in the security aspect. Also, we categorize and analyze target studies in the aspect of modelling physical systems and considering air gaps, which are derived as key features of the security aspects of CPS. Half of 20 research that we surveyed do not reflect those two features, and other studies only consider one of the two features. In this circumstance, we examine challenges that attack graph studies on CPS environment face. Finally, we expect state-led studies or studies targeting open-spec commercial CPS will dominate.

SWaT 테스트베드 데이터 셋 및 비정상행위 탐지 동향

  • Kwon, Sungmoon;Shon, Taeshik
    • Review of KIISC
    • /
    • v.29 no.2
    • /
    • pp.29-35
    • /
    • 2019
  • CPS(Cyber Physical System)에 대한 사이버 공격이 다양해지고 고도화됨에 따라 시그니쳐에 기반한 악성행위 탐지는 한계가 있어 기계학습 기반의 정상행위 학습을 통한 비정상행위 탐지 기법이 많이 연구되고 있다. 그러나 CPS 보안 연구는 보안상의 이유로 CPS 데이터가 주로 외부에 공개되지 않으며 또한 실제 비정상행위를 가동 중인 CPS에 실험하는 것이 불가능하여 개발 기법의 검증이 어려운 문제가 있다. 이를 해결하기 위해 2015년 SUTD(Singapore University of Technology and Design)의 iTrust 연구소에서 SWaT(Secure Water Treatment) 테스트베드를 구성하고 36가지의 공격을 수행한 데이터셋을 공개하였다. 이후 국 내외에서 SWaT 테스트베드 데이터를 사용하여 다양한 보안 기법을 검증한 연구결과가 발표되고 있으며 CPS 보안에 기여하고 있다. 따라서 본 논문에서는 SWaT 테스트베드 데이터 및 SWaT 테스트베드 데이터에 기반한 비정상행위 탐지 연구를 분석한 내용을 설명하고, 이를 통해 CPS 비정상행위 탐지 설계의 주요 요소를 분석하여 제시하고자 한다.

Analysis on Presidential Security Threat of Cyber Physical System by Cyber Attack Focusing Intelligent Building System (사이버물리시스템에 대한 사이버공격 경호위협 분석 - 지능형건물관리시스템을 중심으로 -)

  • Choi, Junesung;Lee, Sam Youl
    • Journal of IKEEE
    • /
    • v.24 no.2
    • /
    • pp.669-672
    • /
    • 2020
  • In this paper, we analyzed the characteristics of cyber attacks and major threat scenarios that could occur around intelligent building management Systems(IBS) by cyber attack security threats against cyber physics systems. Generally determined that lowering the likelihood of aggression against predictable threats would be a more realistic approach to attack response. The countermeasures against this need to be applied to multi-layered defense systems, and three alternatives were proposed: preliminary cyber safety diagnosis for protection targets and the establishment of mobile security control systems.

A Study on Application of Systems Engineering Approach to Design of Smart Manufacturing Execution System (스마트 제조 실행 시스템 기본설계를 위한 시스템 엔지니어링 적용 방법에 대한 연구)

  • Jeon, Byeong-woo;Shin, Kee-Young;Hong, Dae-Geun;Suh, Suk-Hwan
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.11 no.2
    • /
    • pp.95-105
    • /
    • 2015
  • Manufacturing Execution System(MES) is in charge of manufacturing execution in the shop floor based on the inputs given by high level information such as ERP, etc. The typical MES implemented is not tightly interconnected with shop floor control system including real (or near real) time monitoring and control devices such as PLC. The lack of real-time interfaces is one of the major obstacles to achieve accurate and optimization of the total performance index of the shop floor system. Smart factory system in the paradigm of Industry 4.0 tries to solve the problems via CPS (Cyber Physical System) technology and FILS (Factory In-the-Loop System). In this paper, we conducted Systems Engineering Approach to design an advanced MES (namely Smart MES) that can accommodate CPS and FILS concept. Specifically, we tailored Systems Engineering Process (SEP) based on an International Standard formalized as ISO/IEC 15288 to develop Stakeholders' Requirements (StR), System Requirements (SyR). The deliverables of each process are modeled and represented by the SysML, UML customized to Systems Engineering. The results of the research can provide a conceptual framework for future MES that can play a crucial role in the Smart Factory.

5G Cyber Physical System-based Smart City Service Policy (5G CPS 기반 스마트시티 서비스 정책)

  • Kim, Byung-Woon
    • Informatization Policy
    • /
    • v.27 no.4
    • /
    • pp.67-84
    • /
    • 2020
  • This study proposes a smart city service revitalization policy based on communication facility infrastructure in 5G CPS - the core of the 4th industrial revolution, R&D, and related legislations. The 5G CPS is a converged form of ICT technologies, communications facilities, and physical systems. In this study, we propose methods of creating new services for the smart city domain based on communication facilities and the cloud platform in 5G CPS - first, by improving the communication methods classification system based on the facility scale; second, by establishing the national telecommunication facility infrastructure and making long-term investment; third, by reorganizing the Smart City Act aimed at activating new services; and lastly, by expanding the national data analytics R&D and policy support.

A Study on ICT Security Change and CPS Security System in the 4th Industry Age (4차 산업 시대의 ICT 보안 변화와 CPS 보안 시스템에 관한 연구)

  • Joo, Heon-Sik
    • Journal of Digital Contents Society
    • /
    • v.19 no.2
    • /
    • pp.293-300
    • /
    • 2018
  • This study explored the security of Industry 4.0 such as security trends and security threats in Industry 4.0, and security system in Industry 4.0. The threat elements in Industry 4.0 are changing from ICT to IoT and to CPS security, so security paradigm and security System should change accordingly. In particular, environmental and administrative security are more important to solve CPS security. The fourth industry-age security should change to customized security for individual systems, suggesting that the security technology that combines hardware and software in product production design should change from the beginning of development. The security system of the fourth industry proposes design and implementation as a CPS security system as a security system that can accommodate various devices and platforms from a security system in a single system such as a network to an individual system.

Development of web-based collaborative framework for the simulation of embedded systems

  • Yang, Woong;Lee, Soo-Hong;Jin, Yong Zhu;Hwang, Hyun-Tae
    • Journal of Computational Design and Engineering
    • /
    • v.3 no.4
    • /
    • pp.363-369
    • /
    • 2016
  • Cyber Physical System (CPS) and Internet of Things (IoT) are hot objects of interest as an extension of the embedded system. These interactive products and systems contain Mobile Devices which are most popular and used most frequently. Also these have been widely used from the control of the Nuclear Power Control System (NPCS) to IoT Home Service. Information & Communication Technology (ICT) topics of trend fused-complex current Information Technology (IT) and Communication Technology (CT) are closely linked to real space and virtual space. This immediately means the arrival of the ultra-connected society. It refers to a society in which various objects surrounding the human innovation and change in the social sector are expected through the connection between the data which are to be generated. In addition, studies of Tool-kit for the design of such systems are also actively pursued. However, only increased cooperation and information sharing between the physical object consists of a variety of machinery and equipment. We have taken into consideration a number of design variables of the high barriers to entry about the product. In this study, It has been developed a Web-based collaboration framework which can be a flexible connection between macroscopically virtual environment and the physical environment. This framework is able to verifiy and manage physical environments. Also it can resolve the bottlenecks encountered during the base expansion and development process of IoT (Internet of Things) environment.

A Study on CPS-based Mold Life-cycle Management System for Smart Factory (스마트 공장을 위한 CPS 기반 금형 수명 관리 시스템에 관한 연구)

  • Shin, Hyun-Jun;Kim, Sung-Jin;Oh, Chang-Heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.816-818
    • /
    • 2016
  • The Industry 4.0 should decide work operation of manufacture facilities by itself. But small and medium sized enterprises(SMEs) still not prepared these work operations. In this paper, we had research that work operation manufacture facilities of a management system of mold life-cycle based on CPS. The management system of mold manages life-cycle using by shot, this information offers users by cloud system. This system will help SMEs products quality improve and business operation more efficiency.

  • PDF

Structure of Cyber Physical System in Dance Performances with Real Time Interactive Media System (실시간 인터렉티브 미디어 시스템을 활용한 무용공연의 사이버 물리 시스템 구조)

  • Kim, Eun Jung;Cho, Sunghee
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2018.05a
    • /
    • pp.279-280
    • /
    • 2018
  • 본 연구는 무용공연에서 사용되는 실시간 인터렉티브 미디어 시스템(interative media system)을 사이버물리시스템(CPS, Cyber-Physical System)의 관점으로 분석한 것이다. 4차 산업혁명시대에서 극대화된 가상공간과 현실공간의 연결성과 자동화가 무용예술에서 어떤 양상으로 일어나고 있는지 알아보기 위해 실시간 인터렉티브 미디어시스템을 활용한 무용공연들을 대상으로 연구한 결과, 사이버물리시스템의 연산, 통신, 조작의 과정들은 모션트레킹시스템(motion tracking system)을 통해 물리개체인 무용수들의 움직임, 근육 내부의 반응 등의 정보에 따라 조작되어 소프트웨어의 연산을 거쳐 프로젝션 맵핑(projection mapping)으로 영상으로 출력되는 과정을 거치는 것으로 나타났다. 추후, 다양한 사례연구를 통해 무용공연에서의 4차 산업혁명 요소들을 구체화하여야한다.

  • PDF

Securing a Cyber Physical System in Nuclear Power Plants Using Least Square Approximation and Computational Geometric Approach

  • Gawand, Hemangi Laxman;Bhattacharjee, A.K.;Roy, Kallol
    • Nuclear Engineering and Technology
    • /
    • v.49 no.3
    • /
    • pp.484-494
    • /
    • 2017
  • In industrial plants such as nuclear power plants, system operations are performed by embedded controllers orchestrated by Supervisory Control and Data Acquisition (SCADA) software. A targeted attack (also termed a control aware attack) on the controller/SCADA software can lead a control system to operate in an unsafe mode or sometimes to complete shutdown of the plant. Such malware attacks can result in tremendous cost to the organization for recovery, cleanup, and maintenance activity. SCADA systems in operational mode generate huge log files. These files are useful in analysis of the plant behavior and diagnostics during an ongoing attack. However, they are bulky and difficult for manual inspection. Data mining techniques such as least squares approximation and computational methods can be used in the analysis of logs and to take proactive actions when required. This paper explores methodologies and algorithms so as to develop an effective monitoring scheme against control aware cyber attacks. It also explains soft computation techniques such as the computational geometric method and least squares approximation that can be effective in monitor design. This paper provides insights into diagnostic monitoring of its effectiveness by attack simulations on a four-tank model and using computation techniques to diagnose it. Cyber security of instrumentation and control systems used in nuclear power plants is of paramount importance and hence could be a possible target of such applications.