Skip to main content

Data-Based Defense-in-Depth of Critical Systems

  • Conference paper
  • First Online:
Dynamic Data Driven Applications Systems (DDDAS 2020)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 12312))

Included in the following conference series:

Abstract

Cyber Physical Systems (CPS) are attracting intense research interest due to the explosive availability of data and connectivity. The Dynamic Data Driven Applications Systems (DDDAS) paradigm provides a suitable framework for solutions to the risks of connectivity through big data and machine learning. Computational and measurement data come together to produce integrative yet discriminating features and patterns amenable to machine learning and Artificial Intelligence (AI) decision approaches and thus DDDAS and CPSs bridge the physical with the cyber world in numerous applications principally anchored in unique physics.

DDDAS is of great value in prioritizing and categorizing data in accordance with system dynamics. The physical aspect of CPSs is considered as an advantage, as the inherited inertia of systems like these affords additional time for processing and protective activities. This characteristic proves helpful towards intrusion detection and projection of failures as well as buttressing the system with defense-in-depth capabilities demonstrated through effectively achieving Byzantine Fault Tolerance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ahmad, Ι., Zarrar, Μ.Κ., Saeed, T., Rehman, S.: Security aspects of cyber physical systems. In: 1st International Conference on Computer Applications & Information Security (ICCAIS) (2018)

    Google Scholar 

  2. E-ISAC: Analysis of the Cyber Attack on the Ukrainian Power Grid, Washington, DC (2016)

    Google Scholar 

  3. Shoker, A.: Exploiting universal redundancy. In: 15th IEEE International Symposium on Network Computing and Applications (2016)

    Google Scholar 

  4. Cox, B., et al.: N-Variant systems: a secretless framework for security through diversity. In: Security 2006: 15th USENIX Security Symposium (2006)

    Google Scholar 

  5. Rowe, J., Levitt, K., Demir, T., Erbacher, R.: Artificial diversity as maneuvers in a control theoretic moving target defense. In: National Symposium on Moving Target Research (2012)

    Google Scholar 

  6. Mertoguno, J.S., Craven, R.M., Mickelson, M.S., Koller D.P.: A physics‐based strategy for cyber resilience of CPS. SPIE 11009. In: Autonomous Systems: Sensors, Processing, and Security for Vehicles and Infrastructure (2019)

    Google Scholar 

  7. Ashaari, A., Ahmad, T., Shamsuddin, M., Wan Mohamad, W.M., Abdullah, M.: State space modeling of reactor core in a pressurized water reactor. In: AIP Conference Proceedings (2014)

    Google Scholar 

  8. Wang, X., Tsoukalas, L., Wei, T., Reifman, J.: An innovative fuzzy-logic-based methodology for trend identification. Nuclear Technol. 135(1), 67–84 (2001)

    Article  Google Scholar 

  9. Blasch, E., Al-Nashif, Y., Hariri, S.: Static versus dynamic data information fusion analysis using DDDAS for cyber security trust. Procedia Comput. Sci. 29, 1299–1313 (2014)

    Article  Google Scholar 

  10. Dsouza, G., Hariri, S., Al-Nashif, Y., Rodriguez, G.: Resilient dynamic data driven application systems (rDDDAS). Procedia Comput. Sci. 18, 1929–1938 (2013)

    Article  Google Scholar 

  11. Tucker, C.S., Burrows, M., Lesniak, K., Klein, S.: Cybersecurity policies and their impact on dynamic data driven application systems. In: 2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems (FAS*W), pp. 363–365 (2017)

    Google Scholar 

  12. Wang, G., Wu, J., Zeng, B., Xu, Z., Wu, W., Ma, X.: State-space model predictive control method for core power control in pressurized water reactor nuclear power stations. Nucl. Eng. Technol. 49(1) (2016)

    Google Scholar 

  13. Ansarifar, G.R., Rafiei, M.: Second-order sliding-mode control for a pressurized water nuclear reactor considering the xenon concentration feedback. Nucl. Eng. Technol. 47, 94–101 (2015)

    Article  Google Scholar 

Download references

Acknowledgement

This work is supported in part by ONR under Grant No N00014-18-1-2278, the US Department of Energy under Grant No. 2014-0501-03 and a GS-Gives grant to AI Systems Lab (AISL).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Styliani Pantopoulou , Pola Lydia Lagari , Clive H. Townsend or Lefteri H. Tsoukalas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Pantopoulou, S., Lagari, P.L., Townsend, C.H., Tsoukalas, L.H. (2020). Data-Based Defense-in-Depth of Critical Systems. In: Darema, F., Blasch, E., Ravela, S., Aved, A. (eds) Dynamic Data Driven Applications Systems. DDDAS 2020. Lecture Notes in Computer Science(), vol 12312. Springer, Cham. https://doi.org/10.1007/978-3-030-61725-7_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-61725-7_33

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-61724-0

  • Online ISBN: 978-3-030-61725-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics