[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3264888.3264892acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

A Specification-based State Replication Approach for Digital Twins

Published: 15 January 2018 Publication History

Abstract

Digital twins play a key role in realizing the vision of a smart factory. While this concept is often associated with maintenance, optimization, and simulation, digital twins can also be leveraged to enhance the security and safety of cyber-physical systems (CPSs). In particular, digital twins can run in parallel to a CPS, allowing to perform a security and safety analysis during operation without the risk of disrupting live systems. However, replicating states of physical devices within a CPS in functionally equivalent virtual replicas, so that they precisely mirror the internal behavior of their counterparts, is an open research topic. In this paper, we propose a novel state replication approach that first identifies stimuli based on the system's specification and then replicates them in a virtual environment. We believe that replicating states of CPSs is a prerequisite for a multitude of security and safety enhancing features that can be implemented on the basis of digital twins. To demonstrate the feasibility of the specification-based state replication approach, we provide a prototypical implementation and evaluate it in an experimental CPS test bed. The results of this paper show that attacks against CPSs can be successfully detected by leveraging the proposed state replication approach.

References

[1]
AutomationML. 2014. Whitepaper: Communication . Technical Report V_1.0.0. AutomationML consortium.
[2]
Radhakisan Baheti and Helen Gill. 2011. Cyber-physical systems. The impact of control technology, Vol. 12 (2011), 161--166.
[3]
A. Carcano, A. Coletta, M. Guglielmi, M. Masera, I. Nai Fovino, and A. Trombetta. 2011. A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems. IEEE Transactions on Industrial Informatics, Vol. 7, 2 (May 2011), 179--186.
[4]
Justyna Joanna Chromik, Anne Katharina Ingrid Remke, and Boudewijn R.H.M. Haverkort. 2016. What's under the hood? Improving SCADA security with process awareness .IEEE.
[5]
R. Drath, A. Luder, J. Peschke, and L. Hundt. 2008. AutomationML - the glue for seamless automation engineering. In 2008 IEEE International Conference on Emerging Technologies and Factory Automation. 616--623.
[6]
David Duggan, Michael Berg, John Dillinger, and Jason Stamp. 2005. Penetration testing of industrial control systems. Sandia National Laboratories (2005).
[7]
Matthias Eckhart and Andreas Ekelhart. 2018. Towards Security-Aware Virtual Environments for Digital Twins. In Proceedings of the 4th ACM Workshop on Cyber-Physical System Security (CPSS '18). ACM, New York, NY, USA, 61--72.
[8]
Manuel Egele, Theodoor Scholte, Engin Kirda, and Christopher Kruegel. 2008. A Survey on Automated Dynamic Malware-analysis Techniques and Tools. ACM Comput. Surv., Vol. 44, 2, Article 6 (March 2008), bibinfonumpages42 pages.
[9]
R. R. Fontes, S. Afzal, S. H. B. Brito, M. A. S. Santos, and C. E. Rothenberg. 2015. Mininet-WiFi: Emulating software-defined wireless networks. In 2015 11th International Conference on Network and Service Management (CNSM). 384--389.
[10]
I. N. Fovino, A. Carcano, T. D. L. Murel, A. Trombetta, and M. Masera. 2010. Modbus/DNP3 State-Based Intrusion Detection System. In 2010 24th IEEE International Conference on Advanced Information Networking and Applications . 729--736.
[11]
Hamid Reza Ghaeini, Daniele Antonioli, Ferdinand Brasser, Ahmad-Reza Sadeghi, and Nils Ole Tippenhauer. 2018. State-Aware Anomaly Detection for Industrial Control Systems. In The 33rd ACM/SIGAPP Symposium On Applied Computing (SAC) .
[12]
Dina Hadvziosmanović, Robin Sommer, Emmanuele Zambon, and Pieter H. Hartel. 2014. Through the Eye of the PLC: Semantic Security Monitoring for Industrial Processes. In Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC '14). ACM, New York, NY, USA, 126--135.
[13]
William Jardine, Sylvain Frey, Benjamin Green, and Awais Rashid. 2016. SENAMI: Selective Non-Invasive Active Monitoring for ICS Intrusion Detection. In Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy (CPS-SPC '16). ACM, New York, NY, USA, 23--34.
[14]
Henning Kagermann, Wolfgang Wahlster, and Johannes Helbig. 2013. Recommendations for Implementing the Strategic Initiative INDUSTRIE 4.0 -- Securing the Future of German Manufacturing Industry . Final Report of the Industrie 4.0 Working Group. acatech -- National Academy of Science and Engineering, München.
[15]
M. Krotofil and D. Gollmann. 2013. Industrial control systems security: What is happening?. In 2013 11th IEEE International Conference on Industrial Informatics (INDIN). 670--675.
[16]
Leslie Lamport. 1998. The Part-time Parliament. ACM Trans. Comput. Syst., Vol. 16, 2 (May 1998), 133--169.
[17]
Bob Lantz, Brandon Heller, and Nick McKeown. 2010. A Network in a Laptop: Rapid Prototyping for Software-defined Networks. In Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks (Hotnets-IX). ACM, New York, NY, USA, Article 19, bibinfonumpages6 pages.
[18]
D. G. Luenberger. 1964. Observing the State of a Linear System. IEEE Transactions on Military Electronics, Vol. 8, 2 (April 1964), 74--80.
[19]
T. Macaulay and B.L. Singer. 2016. Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS .CRC Press.
[20]
S. McLaughlin, C. Konstantinou, X. Wang, L. Davi, A. R. Sadeghi, M. Maniatakos, and R. Karri. 2016. The Cybersecurity Landscape in Industrial Control Systems. Proc. IEEE, Vol. 104, 5 (May 2016), 1039--1057.
[21]
Bill Miller and Dale Rowe. 2012. A Survey of SCADA and Critical Infrastructure Incidents. In Proceedings of the 1st Annual Conference on Research in Information Technology (RIIT '12). ACM, New York, NY, USA, 51--56.
[22]
Robert Mitchell and Ing-Ray Chen. 2014. A Survey of Intrusion Detection Techniques for Cyber-physical Systems. ACM Comput. Surv., Vol. 46, 4, Article 55 (March 2014), bibinfonumpages29 pages.
[23]
Andrew Nicholson, Helge Janicke, and Antonio Cau. 2014. Position Paper: Safety and Security Monitoring in ICS/SCADA Systems. In Proceedings of the 2nd International Symposium on ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014). BCS, UK, 61--66.
[24]
Jeyasingam Nivethan and Mauricio Papa. 2016. A SCADA Intrusion Detection Framework That Incorporates Process Semantics. In Proceedings of the 11th Annual Cyber and Information Security Research Conference (CISRC '16). ACM, New York, NY, USA, Article 6, bibinfonumpages5 pages.
[25]
Roland Rosen, Georg von Wichert, George Lo, and Kurt D. Bettenhausen. 2015. About The Importance of Autonomy and Digital Twins for the Future of Manufacturing. IFAC-PapersOnLine, Vol. 48, 3 (2015), 567 -- 572. 15th IFAC Symposium onInformation Control Problems inManufacturing.
[26]
Fred B. Schneider. 1990. Implementing Fault-tolerant Services Using the State Machine Approach: A Tutorial. ACM Comput. Surv., Vol. 22, 4 (Dec. 1990), 299--319.
[27]
Jill Slay and Michael Miller. 2008. Lessons Learned from the Maroochy Water Breach. In Critical Infrastructure Protection, Eric Goetz and Sujeet Shenoi (Eds.). Springer US, Boston, MA, 73--82.
[28]
Prem Uppuluri and R. Sekar. 2001. Experiences with Specification-Based Intrusion Detection .Springer Berlin Heidelberg, Berlin, Heidelberg, 172--189.
[29]
David I. Urbina, Jairo Giraldo, Alvaro A Cardenas, Junia Valente, Mustafa Faisal, Nils Ole Tippenhauer, Justin Ruths, Richard Candell, and Henrik Sandberg. 2016b. Survey and new directions for physics-based attack detection in control systems . Technical Report. NIST.
[30]
David I. Urbina, Jairo A. Giraldo, Alvaro A. Cardenas, Nils Ole Tippenhauer, Junia Valente, Mustafa Faisal, Justin Ruths, Richard Candell, and Henrik Sandberg. 2016a. Limiting the Impact of Stealthy Attacks on Industrial Control Systems. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16). ACM, New York, NY, USA, 1092--1105.
[31]
Matei Zaharia, Mosharaf Chowdhury, Tathagata Das, Ankur Dave, Justin Ma, Murphy McCauley, Michael J. Franklin, Scott Shenker, and Ion Stoica. 2012. Resilient Distributed Datasets: A Fault-tolerant Abstraction for In-memory Cluster Computing. In Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation (NSDI'12). USENIX Association, Berkeley, CA, USA, 2--2.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CPS-SPC '18: Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy
October 2018
114 pages
ISBN:9781450359924
DOI:10.1145/3264888
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 January 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. automationml
  2. cyber-physical systems
  3. digital twin
  4. industrial control systems
  5. intrusion detection systems
  6. state replication

Qualifiers

  • Research-article

Funding Sources

Conference

CCS '18
Sponsor:

Acceptance Rates

CPS-SPC '18 Paper Acceptance Rate 22 of 10 submissions, 220%;
Overall Acceptance Rate 53 of 66 submissions, 80%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)98
  • Downloads (Last 6 weeks)14
Reflects downloads up to 13 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)ARCHES PiCar-X: Software for Digital Twin ResearchJournal of Open Source Software10.21105/joss.071799:102(7179)Online publication date: Oct-2024
  • (2024)Robust Network Anomaly Detection with K-Nearest Neighbors (KNN) Enhanced Digital TwinsSoutheastCon 202410.1109/SoutheastCon52093.2024.10500053(421-426)Online publication date: 15-Mar-2024
  • (2024)Advancements and challenges of digital twins in industryNature Computational Science10.1038/s43588-024-00603-w4:3(169-177)Online publication date: 26-Mar-2024
  • (2024)FingerCI: Writing industrial process specifications from network trafficInternational Journal of Critical Infrastructure Protection10.1016/j.ijcip.2024.10072547(100725)Online publication date: Dec-2024
  • (2024)Digital Twin-assisted anomaly detection for industrial scenariosInternational Journal of Critical Infrastructure Protection10.1016/j.ijcip.2024.10072147(100721)Online publication date: Dec-2024
  • (2024)Insider threat detection in cyber-physical systemsComputers and Electrical Engineering10.1016/j.compeleceng.2024.109489119:PAOnline publication date: 1-Oct-2024
  • (2024)Systematic comparison of software agents and Digital Twins: differences, similarities, and synergies in industrial productionJournal of Intelligent Manufacturing10.1007/s10845-023-02278-yOnline publication date: 4-Jan-2024
  • (2024)Utilizing Digital Twin Simulation Technologies to Build ICS Cyber RangesNetwork Simulation and Evaluation10.1007/978-981-97-4519-7_20(283-294)Online publication date: 2-Aug-2024
  • (2024)Digital Twin for Secure Semiconductor Lifecycle ManagementHardware Security10.1007/978-3-031-58687-3_8(345-399)Online publication date: 3-Apr-2024
  • (2023)Empowering Digital Twin for Future Networks with Graph Neural Networks: Overview, Enabling Technologies, Challenges, and OpportunitiesFuture Internet10.3390/fi1512037715:12(377)Online publication date: 24-Nov-2023
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media