Cargando…
Command Disaggregation Attack and Mitigation in Industrial Internet of Things
A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then malici...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2017
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5677416/ https://www.ncbi.nlm.nih.gov/pubmed/29065461 http://dx.doi.org/10.3390/s17102408 |
_version_ | 1783277240385011712 |
---|---|
author | Xun, Peng Zhu, Pei-Dong Hu, Yi-Fan Cui, Peng-Shuai Zhang, Yan |
author_facet | Xun, Peng Zhu, Pei-Dong Hu, Yi-Fan Cui, Peng-Shuai Zhang, Yan |
author_sort | Xun, Peng |
collection | PubMed |
description | A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework. |
format | Online Article Text |
id | pubmed-5677416 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2017 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-56774162017-11-17 Command Disaggregation Attack and Mitigation in Industrial Internet of Things Xun, Peng Zhu, Pei-Dong Hu, Yi-Fan Cui, Peng-Shuai Zhang, Yan Sensors (Basel) Article A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework. MDPI 2017-10-21 /pmc/articles/PMC5677416/ /pubmed/29065461 http://dx.doi.org/10.3390/s17102408 Text en © 2017 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Xun, Peng Zhu, Pei-Dong Hu, Yi-Fan Cui, Peng-Shuai Zhang, Yan Command Disaggregation Attack and Mitigation in Industrial Internet of Things |
title | Command Disaggregation Attack and Mitigation in Industrial Internet of Things |
title_full | Command Disaggregation Attack and Mitigation in Industrial Internet of Things |
title_fullStr | Command Disaggregation Attack and Mitigation in Industrial Internet of Things |
title_full_unstemmed | Command Disaggregation Attack and Mitigation in Industrial Internet of Things |
title_short | Command Disaggregation Attack and Mitigation in Industrial Internet of Things |
title_sort | command disaggregation attack and mitigation in industrial internet of things |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5677416/ https://www.ncbi.nlm.nih.gov/pubmed/29065461 http://dx.doi.org/10.3390/s17102408 |
work_keys_str_mv | AT xunpeng commanddisaggregationattackandmitigationinindustrialinternetofthings AT zhupeidong commanddisaggregationattackandmitigationinindustrialinternetofthings AT huyifan commanddisaggregationattackandmitigationinindustrialinternetofthings AT cuipengshuai commanddisaggregationattackandmitigationinindustrialinternetofthings AT zhangyan commanddisaggregationattackandmitigationinindustrialinternetofthings |