Skip to main content

Abstract

As the presence of Cyber-Physical Systems (CPS) becomes ubiquitous throughout all facets of modern society, malicious attacks by hostile actors have increased exponentially in recent years. Attacks on critical national infrastructure (CNI) such as oil pipelines or electrical power grids have become commonplace, as increased connectivity to the public internet increases the attack surface of CPS. This paper presents a study of the current academic literature describing the state of the art for anomaly detection of security threats to Cyber-Physical Systems, with a focus on life safety issues for industrial control networks (ICS), with the goal of improving the accuracy of anomaly detection. As a new contribution, this paper also identifies outstanding challenges in the field, and maps selected challenges to potential solutions and/or opportunities for further research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zanero, S.: Cyber-physical systems. Computer 50(4), 14–16 (2017). https://doi.org/10.1109/MC.2017.105

    Article  Google Scholar 

  2. Radanliev, P., De Roure, D., Van Kleek, M., Santos, O., Ani, U.: Artificial intelligence in cyber physical systems. AI & Soc. 36(3), 783–796 (2020). https://doi.org/10.1007/s00146-020-01049-0

    Article  Google Scholar 

  3. Rouzbahani, H.M., Karimipour, H., Rahimnejad, A., Dehghantanha, A., Srivastava, G.: Anomaly detection in cyber-physical systems using machine learning. In: Choo, K.-K.R., Dehghantanha, A. (eds.) Handbook of Big Data Privacy, pp. 219–235. Springer International Publishing, Cham (2020). https://doi.org/10.1007/978-3-030-38557-6_10

    Chapter  Google Scholar 

  4. Wolf, M., Serpanos, D.: Safety and security in cyber-physical systems and internet-of-things systems. Proc. IEEE 106(1), 9–20 (2018). https://doi.org/10.1109/JPROC.2017.2781198

    Article  Google Scholar 

  5. Langner, R.: To kill a centrifuge: a technical analysis of what stuxnet's creators tried to achieve. The Langner Group https://www.langner.com/to-kill-a-centrifuge/ (2011)

  6. Tsochev, G., Sharabov, M.: Artificial intelligence methods used in industry 4.0 in particular industrial control systems. In: AIP Conference Proceedings, vol. 2333, p. 070017 (2021). https://doi.org/10.1063/5.0041610

  7. Craggs, B., Rashid, A.: Smart cyber-physical systems: beyond usable security to security ergonomics by design. In: 2017 IEEE/ACM 3rd International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS), pp. 22–25 (2017). https://doi.org/10.1109/SEsCPS.2017.5

  8. Stout, W.M.S.: Toward a multi-agent system architecture for insight & cybersecurity in cyber-physical networks. In: 2018 International Carnahan Conference on Security Technology (ICCST), pp. 1–5 (2018). https://doi.org/10.1109/CCST.2018.8585632

  9. Das, R., Menon, V., Morris, T.H.: On the edge realtime intrusion prevention system for DoS attack. In: Proceedings of 5th International Symposium for ICS & SCADA Cyber Security Research 2018 (ICS-CSR 2018) (2018). https://doi.org/10.14236/ewic/ICS2018.10

  10. Maloney, M., Reilly, E., Siegel, M., Falco, G.: Cyber physical iot device manage-ment using a lightweight agent. In: 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 1009–1014 (2019). https://doi.org/10.1109/iThings/GreenCom/CPSCom/SmartData.2019.00176

  11. Rehman, S., Gruhn, V.: An effective security requirements engineering framework for cyber-physical systems. Technologies 2018(6), 65 (2018). https://doi.org/10.3390/technologies6030065

    Article  Google Scholar 

  12. Qassim, Q.S., Jamil, N., Mahdi, M.N., Abdul Rahim, A.A.: Towards SCADA threat intelligence based on intrusion detection systems - a short review. In: 2020 8th International Conference on Information Technology and Multimedia (ICIMU), pp. 144–149 (2020). https://doi.org/10.1109/ICIMU49871.2020.9243337

  13. Benbenishti, L.: SCADA MODBUS Protocol Vulnerabilities. Cyberbit (2017). https://www.cyberbit.com/blog/ot-security/scada-modbus-protocol-vulnerabilities/

  14. Osborne, C.: Colonial pipeline attack: everything you need to know. Zdnet (2021). https://www.zdnet.com/article/colonial-pipeline-ransomware-attack-everything-you-need-to-know/

  15. Rubio, J.E., Alcaraz, C., Roman, R., Lopez, J.: Current cyber-defense trends in industrial control systems. Comput. Secur. 87, 101561 (2019). https://doi.org/10.1016/j.cose.2019.06.015

    Article  Google Scholar 

  16. Toshihiko, O.: Lightweight cryptography applicable to various IoT devices. NEC Technical J. 12(1), 67–71 (2017). https://www.nec.com/en/global/techrep/journal/g17/n01/170114.html

    Google Scholar 

  17. Adamsky, F., et al.: Integrated protection of industrial control systems from cyber-attacks: the ATENA approach. Int. J. Crit. Infrastruct. Prot. 21, 72–82 (2018). https://doi.org/10.1016/j.ijcip.2018.04.004

    Article  Google Scholar 

  18. Nunes, D., Sá Silva, J., Boavida, F.: A Practical Introduction to Human‐in‐the‐Loop Cyber‐Physical Systems. Wiley Publishing (2018). https://doi.org/10.1002/9781119377795

  19. Wu, M., Song, Z., Moon, Y.B.: Detecting cyber-physical attacks in CyberManufacturing systems with machine learning methods. J. Intell. Manuf. 30(3), 1111–1123 (2017). https://doi.org/10.1007/s10845-017-1315-5

    Article  Google Scholar 

  20. Kabiri, P., Chavoshi, M.: Destructive attacks detection and response system for physical devices in cyber-physical systems. In: 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), pp. 1–6 (2019). https://doi.org/10.1109/CyberSecPODS.2019.8884999

  21. Etalle, S.: Network monitoring of industrial control systems: the lessons of security matters. In: CPS-SPC'19: Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy (2019). https://doi.org/10.1145/3338499.3357354

  22. Alhaidari, F.A., AL-Dahasi, E.M.: New approach to determine DDoS attack patterns on SCADA system using machine learning. In: 2019 International Conference on Computer and Information Sciences (ICCIS), pp. 1–6 (2019). https://doi.org/10.1109/ICCISci.2019.8716432

  23. Ashibani, Y., Mahmoud, Q.H.: Cyber physical systems security: analysis, challenges and solutions. Comput. Secur. 68(2017), 81–97 (2017). https://doi.org/10.1016/j.cose.2017.04.005

    Article  Google Scholar 

  24. Bostjancic Rakas, S.V., Stojanovic, M.D., Markovic-Petrovic, J.D.: A review of research work on network-based SCADA intrusion detection systems. IEEE Access 8, 93083–93108 (2020). https://doi.org/10.1109/ACCESS.2020.2994961

    Article  Google Scholar 

  25. Sundararajan, A., Chavan, D., Saleem, A.I.S.: A survey of protocol-level challenges and solutions for distributed energy resource cyber-physical security. Energies 2018(11), 2360 (2018). https://doi.org/10.3390/en11092360

    Article  Google Scholar 

  26. Bartusiak, R.D., et al.: Open Process Automation: A standards-based, open, secure, interoperable process control archi-tecture. Control Eng. Pract. 121, 105034 (2022). https://doi.org/10.1016/j.conengprac.2021.105034

    Article  Google Scholar 

  27. Kabore, R., Kouassi, A., N’goran, R., Asseu, O., Kermarrec, Y., Lenca, P.: Review of anomaly detection systems in industrial control systems using deep feature learning approach. Engineering 13(01), 30–44 (2021). https://doi.org/10.4236/eng.2021.131003

    Article  Google Scholar 

Download references

Acknowledgement

This research has been funded by the SUDOE Interreg Program -grant INUNDATIO-, by the Spanish Ministry of Economics and Industry, grant PID2020-112726RB-I00, by the Spanish Research Agency (AEI, Spain) under grant agreement RED2018-102312-T (IA-Biomed), and by the Ministry of Science and Innovation under CERVERA Excellence Network project CER-20211003 (IBERUS) and Missions Science and Innovation project MIG-20211008 (INMERBOT). Also, by Principado de Asturias, grant SV-PA-21-AYUD/2021/50994.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nicholas Jeffrey .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jeffrey, N., Tan, Q., Villar, J.R. (2023). Anomaly Detection of Security Threats to Cyber-Physical Systems: A Study. In: García Bringas, P., et al. 17th International Conference on Soft Computing Models in Industrial and Environmental Applications (SOCO 2022). SOCO 2022. Lecture Notes in Networks and Systems, vol 531. Springer, Cham. https://doi.org/10.1007/978-3-031-18050-7_1

Download citation

Publish with us

Policies and ethics