Cargando…

A Graph-Based Technique for Securing the Distributed Cyber-Physical System Infrastructure

Spreading digitalization, flexibility, and autonomy of technological processes in cyber-physical systems entails high security risks corresponding to negative consequences of the destructive actions of adversaries. The paper proposes a comprehensive technique that represents a distributed functional...

Descripción completa

Detalles Bibliográficos
Autores principales: Kalinin, Maxim, Zavadskii, Evgenii, Busygin, Alexey
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10649996/
https://www.ncbi.nlm.nih.gov/pubmed/37960424
http://dx.doi.org/10.3390/s23218724
_version_ 1785135678070194176
author Kalinin, Maxim
Zavadskii, Evgenii
Busygin, Alexey
author_facet Kalinin, Maxim
Zavadskii, Evgenii
Busygin, Alexey
author_sort Kalinin, Maxim
collection PubMed
description Spreading digitalization, flexibility, and autonomy of technological processes in cyber-physical systems entails high security risks corresponding to negative consequences of the destructive actions of adversaries. The paper proposes a comprehensive technique that represents a distributed functional cyber-physical system’s infrastructure as graphs: a functional dependencies graph and a potential attacks graph. Graph-based representation allows us to provide dynamic detection of the multiple compromised nodes in the functional infrastructure and adapt it to rolling intrusions. The experimental modeling with the proposed technique has demonstrated its effectiveness in the use cases of advanced persistent threats and ransomware.
format Online
Article
Text
id pubmed-10649996
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-106499962023-10-26 A Graph-Based Technique for Securing the Distributed Cyber-Physical System Infrastructure Kalinin, Maxim Zavadskii, Evgenii Busygin, Alexey Sensors (Basel) Article Spreading digitalization, flexibility, and autonomy of technological processes in cyber-physical systems entails high security risks corresponding to negative consequences of the destructive actions of adversaries. The paper proposes a comprehensive technique that represents a distributed functional cyber-physical system’s infrastructure as graphs: a functional dependencies graph and a potential attacks graph. Graph-based representation allows us to provide dynamic detection of the multiple compromised nodes in the functional infrastructure and adapt it to rolling intrusions. The experimental modeling with the proposed technique has demonstrated its effectiveness in the use cases of advanced persistent threats and ransomware. MDPI 2023-10-26 /pmc/articles/PMC10649996/ /pubmed/37960424 http://dx.doi.org/10.3390/s23218724 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Kalinin, Maxim
Zavadskii, Evgenii
Busygin, Alexey
A Graph-Based Technique for Securing the Distributed Cyber-Physical System Infrastructure
title A Graph-Based Technique for Securing the Distributed Cyber-Physical System Infrastructure
title_full A Graph-Based Technique for Securing the Distributed Cyber-Physical System Infrastructure
title_fullStr A Graph-Based Technique for Securing the Distributed Cyber-Physical System Infrastructure
title_full_unstemmed A Graph-Based Technique for Securing the Distributed Cyber-Physical System Infrastructure
title_short A Graph-Based Technique for Securing the Distributed Cyber-Physical System Infrastructure
title_sort graph-based technique for securing the distributed cyber-physical system infrastructure
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10649996/
https://www.ncbi.nlm.nih.gov/pubmed/37960424
http://dx.doi.org/10.3390/s23218724
work_keys_str_mv AT kalininmaxim agraphbasedtechniqueforsecuringthedistributedcyberphysicalsysteminfrastructure
AT zavadskiievgenii agraphbasedtechniqueforsecuringthedistributedcyberphysicalsysteminfrastructure
AT busyginalexey agraphbasedtechniqueforsecuringthedistributedcyberphysicalsysteminfrastructure
AT kalininmaxim graphbasedtechniqueforsecuringthedistributedcyberphysicalsysteminfrastructure
AT zavadskiievgenii graphbasedtechniqueforsecuringthedistributedcyberphysicalsysteminfrastructure
AT busyginalexey graphbasedtechniqueforsecuringthedistributedcyberphysicalsysteminfrastructure