Cargando…

Command Disaggregation Attack and Mitigation in Industrial Internet of Things

A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then malici...

Descripción completa

Detalles Bibliográficos
Autores principales: Xun, Peng, Zhu, Pei-Dong, Hu, Yi-Fan, Cui, Peng-Shuai, Zhang, Yan
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2017
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5677416/
https://www.ncbi.nlm.nih.gov/pubmed/29065461
http://dx.doi.org/10.3390/s17102408
_version_ 1783277240385011712
author Xun, Peng
Zhu, Pei-Dong
Hu, Yi-Fan
Cui, Peng-Shuai
Zhang, Yan
author_facet Xun, Peng
Zhu, Pei-Dong
Hu, Yi-Fan
Cui, Peng-Shuai
Zhang, Yan
author_sort Xun, Peng
collection PubMed
description A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.
format Online
Article
Text
id pubmed-5677416
institution National Center for Biotechnology Information
language English
publishDate 2017
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-56774162017-11-17 Command Disaggregation Attack and Mitigation in Industrial Internet of Things Xun, Peng Zhu, Pei-Dong Hu, Yi-Fan Cui, Peng-Shuai Zhang, Yan Sensors (Basel) Article A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework. MDPI 2017-10-21 /pmc/articles/PMC5677416/ /pubmed/29065461 http://dx.doi.org/10.3390/s17102408 Text en © 2017 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Xun, Peng
Zhu, Pei-Dong
Hu, Yi-Fan
Cui, Peng-Shuai
Zhang, Yan
Command Disaggregation Attack and Mitigation in Industrial Internet of Things
title Command Disaggregation Attack and Mitigation in Industrial Internet of Things
title_full Command Disaggregation Attack and Mitigation in Industrial Internet of Things
title_fullStr Command Disaggregation Attack and Mitigation in Industrial Internet of Things
title_full_unstemmed Command Disaggregation Attack and Mitigation in Industrial Internet of Things
title_short Command Disaggregation Attack and Mitigation in Industrial Internet of Things
title_sort command disaggregation attack and mitigation in industrial internet of things
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5677416/
https://www.ncbi.nlm.nih.gov/pubmed/29065461
http://dx.doi.org/10.3390/s17102408
work_keys_str_mv AT xunpeng commanddisaggregationattackandmitigationinindustrialinternetofthings
AT zhupeidong commanddisaggregationattackandmitigationinindustrialinternetofthings
AT huyifan commanddisaggregationattackandmitigationinindustrialinternetofthings
AT cuipengshuai commanddisaggregationattackandmitigationinindustrialinternetofthings
AT zhangyan commanddisaggregationattackandmitigationinindustrialinternetofthings