首页> 美国卫生研究院文献>Sensors (Basel Switzerland) >Command Disaggregation Attack and Mitigation in Industrial Internet of Things
【2h】

Command Disaggregation Attack and Mitigation in Industrial Internet of Things

机译:工业物联网中的命令分解攻击和缓解

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.
机译:工业物联网中的网络物理攻击可能会严重破坏物理系统。在本文中,我们集中于命令分解攻击,其中攻击者通过侵入诸如可编程逻辑控制器之​​类的命令聚合器来修改分解的命令,然后恶意地操纵物理过程。有必要调查这些攻击,分析其对物理过程的影响,并寻求有效的检测机制。我们描述了两种不同类型的命令分解攻击模式:(1)命令序列混乱,并且(2)将分解子命令分配给错误的执行器。我们描述了三种攻击模型来实现这些模式,而现有的检测方法无法对其进行检测。提供了一种新颖有效的框架来检测命令分解攻击。该框架利用两层命令序列之间的相关性,包括来自中央控制器输出的命令和来自执行器输入的子命令,来检测中断发生之前的攻击。我们已经设计了框架的组件,并说明了如何挖掘和使用这些相关性来检测攻击。我们提供了两个案例研究,以验证来自各种攻击模型和检测框架有效性的不同程度的影响。最后,我们讨论如何增强检测框架。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号