[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Taxonomy of Cross-Domain Attacks on CyberManufacturing System

Published: 01 November 2017 Publication History

Abstract

CyberManufacturing system (CMS) is a concept for next generation manufacturing system where manufacturing components are seamlessly integrated through technologies such as the internet of things, cloud computing, sensors network, machine learning, and new manufacturing processes. A key to realizing the CMS is its ability to handle cyber-attacks. For example, infill malicious defects can be created by cyber-attacks in additive manufacturing processes, resulting in changes in yield load and strain at failure as well as natural frequency. Cyber-attacks on CMS are not just limited to attacks on its computing sphere. Cross-domain attacks over both the physical and the computing spheres become critical. A taxonomy has been developed to specify the nature of the attacks, particularly when they are cross-domain. The taxonomy can help security professionals identify and detect cross-domain attacks in CMS. The taxonomy has been constructed in four dimensions: attack vector, attack impact, attack target, and attack consequence. To illustrate how the taxonomy can be utilized in detecting cross-domain attacks on CMS, infill malicious attacks on 3D printing processes are used as an example.

References

[1]
Z Song, YB Moon, Performance Analysis of CyberManufacturing Systems: A Simulation Study, 13th IFIP International Conference on Product Lifecycle Management (2016) 592-605.
[2]
Kim Zetter. A Cyberattack Has Caused Confirmed Physical Damage for the Second Time Ever. WIRED. https://www.wired.com/2015/01/german-steel-mill-hack-destruction/; 2015.
[3]
AA, ardenas. Challenges for Securing Cyber Physical Systems. In: Work Futur Dir cyber-physical Syst Secur; 2009.
[4]
Esposito R. Hackers Penetrate Water System Computers. ABC. http://blogs.abcnews.com/theblotter/2006/10/hackers_penetra; 2006.
[5]
Mcmillen D. Manufacturing Security: Managing Machines in Motion processes. IBM. https://securityintelligence.com/manufacturing-security-managing-machines-in-motion/; 2016.
[6]
Wu M, Song Z, Moon YB. Detecting Cyber-Physical Attacks in CyberManufacturing Systems with Machine Learning Methods. J Intell Manuf; 2017, (in press).
[7]
Yampolskiy M, Andel TR, McDonald JT, Glisson WB, Yasinsac A. Towards Security of Additive Layer Manufacturing. In: arXiv preprint.
[8]
The Repository of Industrial Security Incidents. http://www.risidata.com/; 2017.
[9]
R Langner, Stuxnet: Dissecting a cyberwarfare weapon, IEEE Security & Privacy., 9 (2011) 49-51.
[10]
Poulsen K. Slammer worm crashed Ohio nuke plant network. Security Focus; 2003.
[11]
LD Sturm, CB Williams, JA Camelio, J White, R Parker, Cyber-Physical Vunerabilities In Additive Manufacturing Systems, International Solid Freeform Fabrication Symposium Proceedings (2014) 951-963.
[12]
Wu M, Phoha V V., Moon YB, Belman AK. Detecting Malicious Defects in 3D Printing Process Using Machine Learning and Image Classification. In: Proceedings of the ASME 2016 International Mechanical Engineering Congress and Exposition; 2016. p.1-6.
[13]
Wu M, Zhou H, Lin LL, et al. Detecting Attacks in CyberManufacturing Systems: Additive Manufacturing Example. In: International Conference on Mechanical, Materials and Manufacturing; 2016. p.1-5.
[14]
Howard JD, Longstaff TA. A common language for computer security incidents. Sandia National Laboratories; 1998.
[15]
S Hansman, R Hunt, A taxonomy of network and computer attacks, Computers & Security, 24 (2005) 31-43.
[16]
Simmons C, Ellis C, Shiva S, Dasgupta D, Wu Q. AVOIDIT: A cyber attack taxonomy. In: 9th Annu Symp Inf Assur. 2014. p.12-22.
[17]
M Yampolskiy, P Horvath, XD Koutsoukos, Y Xue, J Sztipanovits, Taxonomy for description of cross-domain attacks on CPS, Proceedings of the 2nd ACM International Conference on High Confidence Networked Systems (2013) 135-142.
[18]
B Zhu, A Joseph, S Sastry, A Taxonomy of Cyber Attacks on SCADA Systems, Internet of things (iThings/CPSCom), 2011 international conference on and 4th international conference on cyber, physical and social computing. IEEE (2011) 380-388.
[19]
Beaumont M, Hopkins B, Newby T. Hardware Trojans - Prevention, Detection, Countermeasures (A Literature Review). In: Command Control Communications and Intelligence Div; 2011.
[20]
Song C, Lin F, Ba Z, Ren K, Zhou C, Xu W. My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers. In: ACM CCS; 2016. p.895-907.

Cited By

View all
  • (2024)SOKProceedings of the 18th USENIX Conference on Offensive Technologies10.5555/3696933.3696951(263-282)Online publication date: 12-Aug-2024
  • (2022)Cybersecurity of Industrial Cyber-Physical Systems: A ReviewACM Computing Surveys10.1145/351041054:11s(1-35)Online publication date: 9-Sep-2022
  • (2020)A systematic review of security threats and countermeasures in SaaSJournal of Computer Security10.3233/JCS-20000228:6(635-653)Online publication date: 27-Nov-2020
  • Show More Cited By
  1. Taxonomy of Cross-Domain Attacks on CyberManufacturing System

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Procedia Computer Science
    Procedia Computer Science  Volume 114, Issue C
    November 2017
    543 pages
    ISSN:1877-0509
    EISSN:1877-0509
    Issue’s Table of Contents

    Publisher

    Elsevier Science Publishers B. V.

    Netherlands

    Publication History

    Published: 01 November 2017

    Author Tags

    1. CyberManufacturing System
    2. Taxonomy
    3. cross-domain attacks

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 03 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)SOKProceedings of the 18th USENIX Conference on Offensive Technologies10.5555/3696933.3696951(263-282)Online publication date: 12-Aug-2024
    • (2022)Cybersecurity of Industrial Cyber-Physical Systems: A ReviewACM Computing Surveys10.1145/351041054:11s(1-35)Online publication date: 9-Sep-2022
    • (2020)A systematic review of security threats and countermeasures in SaaSJournal of Computer Security10.3233/JCS-20000228:6(635-653)Online publication date: 27-Nov-2020
    • (2020)A survey on security challenges in cloud computing: issues, threats, and solutionsThe Journal of Supercomputing10.1007/s11227-020-03213-176:12(9493-9532)Online publication date: 28-Feb-2020
    • (2019)A cyber-physical attack taxonomy for production systemsJournal of Intelligent Manufacturing10.1007/s10845-018-1408-930:6(2489-2504)Online publication date: 1-Aug-2019

    View Options

    View options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media