Cyber Security Analysis of CPSs

Analytical severity analysis of cyber attacks on CPSs

Cyber security has emerged as one of the most important issues in the operation of CPSs due to their heavy reliance on the automation and network communications. As the first step to implement a CPS that is robust to possible cyber attacks, we have conducted a study to identify potential cyber threats and vulnerabilities inherent in the given CPS. The main contribution of this research is the development of an analytical algorithm that can be used to quantify the severity of a cyber attack on a CPS. read more

Detectability analysis of cyber attacks on CPSs

Security of Cyber-Physical Systems (CPS) against cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is difficult to describe them systematically. In our research, instead of identifying a specific cyber attack model, we are focused on analyzing the system’s response during cyber attacks. read more

Real-time safety assessment against stealthy cyber attacks

As Unmanned Aircraft Systems (UASs) become an increasingly integral part of a wide range of applications, ensuring the security of these systems against malicious cyber attacks is a very important concern. To address this problem, this research considers a controls domain approach extending beyond the computing resources of the UAS to include the underlying physical behavior of the compromised system, successfully complementing the traditional computer security architecture. The objective of work is to diagnose UAS safety while considering the possibility of stealthy cyber attacks, and to develop a real-time safety assessment algorithm to help increase system safety in such cases. read more

Cyber attack mitigation for CPSs: hybrid system approach to controller

This research considers robust controller design for CPSs subject to cyber attacks. While previous studies have investigated secure control by assuming specific attack strategies, in this work we propose a robust hybrid control scheme containing multiple sub-controllers, each matched to a different type of cyber attack. A system using this control scheme is able to adapt its behavior to various cyber attacks (including those which have not been specifically addressed in the sub-controller designs) by switching sub-controllers to achieve the best performance. read more