Skip to main content

Advertisement

Log in

A cyber-physical attack taxonomy for production systems: a quality control perspective

  • Published:
Journal of Intelligent Manufacturing Aims and scope Submit manuscript

Abstract

With recent advancements in computer and network technologies, cyber-physical systems have become more susceptible to cyber-attacks, with production systems being no exception. Unlike traditional information technology systems, cyber-physical systems are not limited to attacks aimed solely at intellectual property theft, but include attacks that maliciously affect the physical world. In manufacturing, cyber-physical attacks can destroy equipment, force dimensional product changes, or alter a product’s mechanical characteristics. The manufacturing industry often relies on modern quality control (QC) systems to protect against quality losses, such as those that can occur from an attack. However, cyber-physical attacks can still be designed to avoid detection by traditional QC methods, which suggests a strong need for new and more robust QC tools. As a first step toward the development of new QC tools, an attack taxonomy to better understand the relationships between QC systems, manufacturing systems, and cyber-physical attacks is proposed in this paper. The proposed taxonomy is developed from a quality control perspective and accounts for the attacker’s view point through considering four attack design consideration layers, each of which is required to successfully implement an attack. In addition, a detailed example of the proposed taxonomy layers being applied to a realistic production system is included in this paper.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Notes

  1. A system’s attack surface is a term that represents all possible means through which an attacker can access the system and potentially cause harm (Manadhata and Wing 2011).

  2. Quality inspection “are measures aimed at checking, measuring, or testing of one or more product characteristics and to relate the results to the requirements to confirm compliance” (Pan et al. 2017).

References

  • Albakri, M., Sturm, L., Williams, C. B., & Tarazaga, P. (2017). Impedance-based non-destructive evaluation of additively manufactured parts. Rapid Prototyping Journal, 23(3), 589–601. https://doi.org/10.1108/RPJ-03-2016-0046.

    Article  Google Scholar 

  • Albright, D., Brannan, P., & Christina, W. (2010). Did Stuxnet take out 1,000 centrifuges at the Natanz enrichment plant? Institute for Science and International Security (ISIS).

  • Anthem. (2016). How to access and sign up for identity theft repair and credit monitoring services. https://www.anthemfacts.com/cyber-attack. Accessed April 9, 2017.

  • Assante, M. J., & Lee, R. M. (2015). The industrial control system cyber kill chain. The SANS Technology Institute.

  • Bayanifar, H., & Kühnle, H. (2017). Enhancing dependability and security of cyber-physical production systems. In L. M. Camarinha-Matos, M. Parreira-Rocha, & J. Ramezani (Eds.), Technological innovation for smart systems: 8th IFIP WG 5.5/SOCOLNET advanced doctoral conference on computing, electrical and industrial systems, DoCEIS 2017, Costa de Caparica, Portugal, May 3–5, 2017, proceedings (pp. 135–143). Cham: Springer International Publishing.

  • Bayuk, J. L., Cavit, D., Guerrino, E., Mahony, J., McDowell, B., Nelson, W., et al. (2011). Malware risks and mitigation report. Washington, DC: BITS Financial Services Roundtable.

    Google Scholar 

  • Belikovetsky, S., Solewicz, Y., Yampolskiy, M., Toh, J., & Elovici, Y. (2017). Detecting cyber-physical attacks in additive manufacturing using digital audio signing. arXiv preprint, arXiv:1705.06454.

  • Belikovetsky, S., Yampolskiy, M., Toh, J., & Elovici, Y. (2016). Dr0wned-cyber-physical attack with additive manufacturing. arXiv preprint, arXiv:1609.00133.

  • Box, G. E. P., & Woodall, W. H. (2012). Innovation, quality engineering, and statistics. Quality Engineering, 24(1), 20–29. https://doi.org/10.1080/08982112.2012.627003.

    Article  Google Scholar 

  • Brenner, J. F. (2013). Eyes wide shut: The growing threat of cyber attacks on industrial control systems. Bulletin of the Atomic Scientists, 69(5), 15–20. https://doi.org/10.1177/0096340213501372.

    Article  Google Scholar 

  • Cárdenas, A., Amin, S., Lin, Z.-S., Huang, Y.-L., Huang, C.-Y., & Sastry, S. Attacks against process control systems: Risk assessment, detection, and response. In 6th ACM symposium on information, computer and communications security (ASIACCS ’11), Hong Kong, 22–24 March 2011 (pp. 355–366). https://doi.org/10.1145/1966913.1966959.

  • Cárdenas, A., Amin, S., Sinopoli, B., Giani, A., Perrig, A., & Sastry, S. (2009). Challenges for securing cyber physical systems. In Workshop on future directions in cyber-physical systems security, 2009 (pp. 5): DHS.

  • Castillo, M. (2017). Yahoo’s hack warning comes from third breach, The Company Says. http://www.cnbc.com/2017/02/15/yahoo-sends-new-warning-to-customers-about-data-breach.html. Accessed April 9, 2017.

  • Chambers, J. (2015). What does the internet of everything mean for security? https://www.weforum.org/agenda/2015/01/companies-fighting-cyber-crime/?utm_content=bufferb0881&utm_medium=social&utm_source=facebook.com&utm_campaign=buffer. Accessed October 30, 2015.

  • Cherry, S. (2011). Sons of stuxnet. http://spectrum.ieee.org/podcast/telecom/security/sons-of-stuxnet. Accessed December 15, 2014.

  • Chhetri, S. R., Canedo, A., & Al Faruque, M. A. (2016). KCAD: Kinetic cyber-attack detection method for cyber-physical additive manufacturing systems. In International conference on computer aided design (ICCAD ’16), Austin, TX, USA, November 07–10 2016: IEEE/ACM. https://doi.org/10.1145/2966986.2967050.

  • Chhetri, S. R., Wan, J., & Al Faruque, M. A. (2017). Cross-domain security of cyber-physical systems. In 22nd Asia and South Pacific design automation conference (ASP-DAC 2017), Chiba/Tokyo, Japan, 16–19 January 2017 (pp. 200–205): IEEE. https://doi.org/10.1109/ASPDAC.2017.7858320.

  • Deloitte. (2014). Global cyber executive briefing—Manufacturing. https://www2.deloitte.com/global/en/pages/risk/articles/Manufacturing.html. Accessed August 16, 2015.

  • DeSmit, Z., Elhabashy, A. E., Wells, L. J., & Camelio, J. A. (2017). An approach to cyber-physical vulnerability assessment for intelligent manufacturing systems. Journal of Manufacturing Systems, 43(Part 2), 339–351. https://doi.org/10.1016/j.jmsy.2017.03.004.

    Article  Google Scholar 

  • Evans, D. (2011). The Internet of Things: How the next evolution of the internet is changing everything. Cisco Internet Business Solutions Group (IBSG).

  • Fahey, M., & Wells, N. (2016). Yahoo data breach is among the biggest in history. http://www.cnbc.com/2016/09/22/yahoo-data-breach-is-among-the-biggest-in-history.html. Accessed April 9, 2017.

  • Gendarmerie, N. (2011). Prospective analysis on trends in cybercrime from 2011 to 2020.

  • Goonatilake, R., Bachnak, R., & Herath, S. (2011). Statistical quality control approaches to network intrusion detection. International Journal of Network Security & Its Applications (IJNSA), 3(6), 115–124.

    Article  Google Scholar 

  • Groover, M. P. (2010). Fundamentals of modern manufacturing: Materials, processes, and systems (4th ed.). Hoboken, NJ: Wiley.

    Google Scholar 

  • Hutchins, M. J., Bhinge, R., Micali, M. K., Robinson, S. L., Sutherland, J. W., & Dornfeld, D. (2015). Framework for identifying cybersecurity risks in manufacturing. Procedia Manufacturing, 1, 47–63. https://doi.org/10.1016/j.promfg.2015.09.060.

    Article  Google Scholar 

  • IBM X-Force Research (2016). 2016 Cyber security intelligence index infographic for manufacturing. IBM Corporation.

  • ICS-CERT (2016). ICS-CERT Monitor Newsletters: November–December 2015. https://ics-cert.us-cert.gov/sites/default/files/Monitors/ICS-CERT_Monitor_Nov-Dec2015_S508C.pdf. Accessed May 26, 2016.

  • Kammerdiner, A. R. (2014). Statistical techniques for assessing cyberspace security. In C. Vogiatzis, J. L. Walteros, & P. M. Pardalos (Eds.), Dynamics of information systems—Computational and mathematical challenges (Vol. 105, pp. 161–177). Berlin: Springer.

    Google Scholar 

  • Kravets, D. (2009). Feds: Hacker disabled offshore oil platforms’ leak-detection system. www.wired.com/2009/03/feds-hacker-dis. Accessed December 15, 2014.

  • Kurtzman Carson Consultants. (2016). Home depot breach settlement. http://www.homedepotbreachsettlement.com/. Accessed 15 June 2016.

  • Lee, T. B. (2014). The Sony hack: How it happened, who is responsible, and what we’ve learned. www.vox.com/2014/12/14/7387945/sony-hack-explained. Accessed December 15, 2014.

  • Liptak, A. (2017). Renault shut down several french factories after cyberattack. https://www.theverge.com/2017/5/14/15637472/renault-nissan-shut-down-french-uk-factories-wannacry-cyberattack. Accessed May 15, 2017.

  • Manadhata, P. K., & Wing, J. M. (2011). An attack surface metric. IEEE Transactions on Software Engineering, 37(3), 371–386. https://doi.org/10.1109/TSE.2010.60.

    Article  Google Scholar 

  • Mandiant (2015). M-Trends 2015: A view from the front line. Mandiant.

  • McGee, B. (2016). Move over Healthcare, ransomware has manufacturing in its sights. https://blog.fortinet.com/2016/06/06/move-over-healthcare-ransomware-has-manufacturing-in-its-sights. Accessed August 3, 2016.

  • Megahed, F. M., & Jones-Farmer, L. A. (2015). Statistical Perspectives on “Big Data”. In S. Knoth & W. Schmid (Eds.), Frontiers in statistical quality control 11 (pp. 29–47). Berlin: Springer.

    Chapter  Google Scholar 

  • Meserve, J. (2007). Mouse click could plunge city into darkness, experts say. http://www.cnn.com/2007/US/09/27/power.at.risk/index.html. Accessed February 22, 2016.

  • Montgomery, D. C. (2009). Introduction to statistical quality control (6th ed.). Hoboken, N.J.: Wiley.

    Google Scholar 

  • Moore, S. B., Gatlin, J., Belikovetsky, S., Yampolskiy, M., King, W. E., & Elovici, Y. (2017a). Power consumption-based detection of sabotage attacks in additive manufacturing. arXiv preprint arXiv:1709.01822.

  • Moore, S. B., Glisson, W. B., & Yampolskiy, M. (2017b). Implications of malicious 3D printer firmware. In Proceedings of the 50th Hawaii International Conference on System Sciences (HICSS), Waikoloa Village, Hawaii, USA, 4–7 January (pp. 6089–6098).

  • MTConnect Institute (2016). www.mtconnect.org. Accessed April 11, 2016.

  • Neil, J., Hash, C., Brugh, A., Fisk, M., & Storlie, C. B. (2013). Scan statistics for the online detection of locally anomalous subgraphs. Technometrics, 55(4), 403–414. https://doi.org/10.1080/00401706.2013.822830.

    Article  Google Scholar 

  • Pan, Y., White, J., Schmidt, D. C., Elhabashy, A., Sturm, L., Camelio, J., et al. (2017). Taxonomies for reasoning about cyber-physical attacks in IoT-based manufacturing systems. International Journal of Interactive Multimedia and Artificial Intelligence, Special Issue on Advances and Applications in the Internet of Things and Cloud Computing, 4(3), 45–54. https://doi.org/10.9781/ijimai.2017.437.

    Google Scholar 

  • Park, Y., Baek, S. H., Kim, S.-H., & Tsui, K.-L. (2014). Statistical process control-based intrusion detection and monitoring. Quality and Reliability Engineering International, 30(2), 257–273. https://doi.org/10.1002/qre.1494.

    Article  Google Scholar 

  • Pham, T. (2015). Authentication-based attacks target energy and critical manufacturing industries. https://duo.com/blog/authentication-based-attacks-target-energy-and-critical-manufacturing. Accessed August 17, 2015.

  • Poulsen, K. (2009). Ex-employee fingered in texas power company hack. www.wired.com/2009/05/efh/. Accessed December 15, 2014.

  • Slay, J., & Miller, M. (2008). Lessons learned from the maroochy water breach. In E. Goetz & S. Shenoi (Eds.), Critical infrastructure protection (pp. 73–82). Boston, MA: Springer.

    Google Scholar 

  • Stamp, J., Dillinger, J., Young, W., & DePoy, J. (2003). Common vulnerabilities in critical infrastructure control systems. Sandia National Laboratories.

  • Steitz, C. A., Eric (2016). German nuclear plant infected with computer viruses, operator says. http://www.reuters.com/article/us-nuclearpower-cyber-germany-idUSKCN0XN2OS. Accessed June 15, 2016.

  • Stouffer, K., Zimmerman, T., Tang, C., Lubell, J., Cichonski, J., & McCarthy, J. (2017). Cybersecurity framework manufacturing profile. National Institute of Standards and Technology (NIST).

  • Sturm, L. D., Albakri, M., Williams, C. B., & Tarazaga, P. (2016). In-situ detection of build defects in additive manufacturing via impedance-based monitoring. Paper presented at the proceedings of the 27th annual international solid freeform fabrication symposium—an additive manufacturing conference, Austin, Texas, USA, 8–10 August.

  • Sturm, L. D., Williams, C. B., Camelio, J. A., White, J., & Parker, R. (2017). Cyber-physical vulnerabilities in additive manufacturing systems: A case study attack on the.STL file with human subjects. Journal of Manufacturing Systems, 44(Part 1), 154–164. https://doi.org/10.1016/j.jmsy.2017.05.007.

    Article  Google Scholar 

  • Symantec. (2014). Internet security threat report 2014 (Vol. 19). Symantec Corporation.

  • Symantec. (2015). Internet security threat report 2015 (Vol. 20). Symantec Corporation.

  • Symantec. (2016). Internet security threat report 2016 (Vol. 21). Symantec Corporation.

  • Symantec. (2017). Internet security threat report 2017 (Vol. 22). Symantec Corporation.

  • Target (2014). Data Breach FAQ. https://corporate.target.com/about/shopping-experience/payment-card-issue-faq. Accessed October 28, 2015.

  • Teemu, M. (2015). 3 Key learnings: Ransomware hits a concrete manufacturer. https://business.f-secure.com/3-key-learnings-ransomware-hits-a-concrete-manufacturer/. Accessed August 3, 2016.

  • Tucker, P. (2014). Forget the Sony hack, this could be the biggest cyber attack of 2015. www.defenseone.com/technology/2014/12/forget-sony-hack-could-be-he-biggest-cyber-attack-2015/101727/. Accessed February 22, 2016.

  • Tuptuk, N., & Hailes, S. (2016). The Cyberattack on Ukraine’s power grid is a warning of what’s to come. https://theconversation.com/the-cyberattack-on-ukraines-power-grid-is-a-warning-of-whats-to-come-52832. Accessed June 15, 2016.

  • Turner, H., White, J., Camelio, J. A., Williams, C., Amos, B., & Parker, R. (2015). Bad parts: Are our manufacturing systems at risk of silent cyberattacks? IEEE Security & Privacy, 13(3), 40–47.

    Article  Google Scholar 

  • Underbrink, A., Potter, A., Jaenisch, H., & Reifer, D. J. (2012). Application stress testing achieving cyber security by testing cyber attacks. In IEEE conference on technologies for homeland security (HST), 13–15, 556–561. https://doi.org/10.1109/THS.2012.6459909.

  • Vincent, H., Wells, L., Tarazaga, P., & Camelio, J. (2015). Trojan detection and side-channel analyses for cyber-security in cyber-physical manufacturing systems. Procedia Manufacturing, 1, 77–85. https://doi.org/10.1016/j.promfg.2015.09.065.

    Article  Google Scholar 

  • Wegner, A., Graham, J., & Ribble, E. (2017). A new approach to cyberphysical security in industry 4.0. In L. Thames & D. Schaefer (Eds.), Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing (pp. 59–72). Cham: Springer.

    Chapter  Google Scholar 

  • Wells, L. J., Camelio, J. A., Williams, C. B., & White, J. (2014). Cyber-physical security challenges in manufacturing systems. Manufacturing Letters, 2(2), 74–77. https://doi.org/10.1016/j.mfglet.2014.01.005.

    Article  Google Scholar 

  • Wu, M., & Moon, Y. B. (2017). Taxonomy of cross-domain attacks on cybermanufacturing system. Procedia Computer Science, 114, 367–374. https://doi.org/10.1016/j.procs.2017.09.050.

    Article  Google Scholar 

  • Wu, M., Song, Z., & Moon, Y. B. (2017). Detecting cyber-physical attacks in cybermanufacturing systems with machine learning methods. Journal of Intelligent Manufacturing,. https://doi.org/10.1007/s10845-017-1315-5.

    Google Scholar 

  • Wu, Q., Zhang, H., & Pu, J. (2007). Mitigating distributed denial-of-service attacks using network connection control charts. In Proceedings of the 2nd international conference on scalable information systems (InfoScale ’07), Suzhou, China (pp. 1–4): ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).

  • Yampolskiy, M., King, W., Pope, G., Belikovetsky, S., & Elovici, Y. (2017). Evaluation of additive and subractive manufacturing from the security perpsective. In M. Rice, & S. Shenoi (Eds.), Critical infrastructure protection XI: 11th IFIP WG 11.10 international conference, ICCIP 2017, Arlington, VA, USA, March 13–15, 2017, Revised selected papers (pp. 23–44, IFIP Advances in Information and Communication Technology). Cham: Springer.

  • Yampolskiy, M., Skjellum, A., Kretzschmar, M., Overfelt, R. A., Sloan, K. R., & Yasinsac, A. (2016). Using 3D printers as weapons. International Journal of Critical Infrastructure Protection, 14, 58–71. https://doi.org/10.1016/j.ijcip.2015.12.004.

    Article  Google Scholar 

  • Ye, N., Borror, C., & Zhang, Y. (2002). EWMA techniques for computer intrusion detection through anomalous changes in event intensity. Quality and Reliability Engineering International, 18(6), 443–451.

    Article  Google Scholar 

  • Ye, N., Emran, S. M., Li, X., & Chen, Q. (2001). Statistical process control for computer intrusion detection. In DARPA information survivability conference and exposition II, 2001 (DISCEX’01). (Vol. 1, pp. 3–14): IEEE.

  • Ye, N., Vilbert, S., & Qiang, C. (2003). Computer intrusion detection through EWMA for autocorrelated and uncorrelated data. IEEE Transactions on Reliability, 52(1), 75–82. https://doi.org/10.1109/TR.2002.805796.

    Article  Google Scholar 

  • Zeltmann, S. E., Gupta, N., Tsoutsos, N. G., Maniatakos, M., Rajendran, J., & Karri, R. (2016). Manufacturing and security challenges in 3D printing. The Journal of The Minerals, Metals & Materials Society (JOM), 68(7), 1872–1881. https://doi.org/10.1007/s11837-016-1937-7.

    Article  Google Scholar 

Download references

Acknowledgements

This research work was funded by the National Science Foundation (NSF) Grant CMMI-1436365 and supported by Virginia Tech’s Cyber-Physical Security Systems Manufacturing (CPSSMFG) Group. The authors would also like to thank the reviewers, for their constructive feedback, and the members of the Center for Innovation-based Manufacturing (CIbM) lab at Virginia Tech, for their help with revising this manuscript.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ahmad E. Elhabashy.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Elhabashy, A.E., Wells, L.J., Camelio, J.A. et al. A cyber-physical attack taxonomy for production systems: a quality control perspective. J Intell Manuf 30, 2489–2504 (2019). https://doi.org/10.1007/s10845-018-1408-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10845-018-1408-9

Keywords