Abstract—
This paper considers features of cyberphysical systems (CPSs) as complexes combining physical and information components. Approaches to modeling CPSs based on graphs and stochastic dynamics are analyzed. Common features and further directions in CPS modeling are identified. The development direction of the homeostasis-based CPS information security modeling is determined.
Similar content being viewed by others
REFERENCES
Yastreb, N.A., The Fourth Industrial Revolution: Global industrial networks and the Internet of Things, Innovatsion. Vestn. Reg., 2014, no. 4, pp. 22–26.
Threats for The Future: Be Are Ready. Special Report on Strategies to Deal with Complex Threats. https://media.kaspersky.com/pdf/APT_Report_ONLINE_AW_rus.pdf.
Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., and Felten, E.W., Lest we remember: Cold boot attacks on encryption keys, Proceedings of the 17th USENIX Security Symposium, 2008, pp. 45–60. https://www.usenix.org/events/sec08/tech/full_papers/ halderman/halderman.pdf.
Lamport, L., Proving the correctness of multiprocess programs, IEEE Trans. Software Eng., 1977, vol. 3, no. 2, pp. 125–143. doi 10.1109/TSE.1977.229904
Schneider, F.B., Enforceable security policies, ACM Trans. Inf. Syst. Secur., 2000, vol. 3, no. 1, pp. 30–50. doi 10.1145/353323.353382
Mulligan, D.K. and Schneider, F.B., Doctrine for cybersecurity, Daedalus, 2011, vol. 140, no. 4, pp. 70–92.
Ashibani, Y. and Mahmoud, Q.H., Cyber physical systems security: Analysis, challenges and solutions, Comput. Secur., 2017, vol. 68, pp. 81–97.
Zanero, S., Cyber-physical systems, Computer, 2017, vol. 50, no. 4, pp. 14–16.
Zegzhda, D.P., Sustainability as a criterion for information security in cyber-physical systems, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 813–819.
Dat Dac Hoang, Hye-Young Paik, and Chae-Kyu Kim, Service-oriented middleware architectures for cyber-physical systems, Int. J. Comput. Sci. Network Secur., 2012, vol. 12, no. 1, pp. 79–87.
Seiger, R., Huber, S., Heisig, P., and Assmann, U., Enabling self-adaptive workflows for cyber-physical systems, Lect. Notes Bus. Inf. Process., 2016, vol. 248, pp. 3–17.
Zegzhda, P.D., Zegzhda, D.P., and Stepanova, T.V., Approach to the construction of the generalized functional-semantic cyber security model, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 627–633.
Zegzhda, P.D., Zegzhda, D.P., Pechenkin, A.I., and Poltavtseva, M.A., Modeling information systems for solving security control problems, Probl. Inf. Bezop., Komp’yut. Sist., 2016, no. 3, pp. 7–16.
Lavrova, D.S., An approach to developing the SIEM system for the Internet of Things, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 673–681.
Trenogin, N.G. and Sokolov, D.E., Fractal properties of network traffic in a client-server information system, Materialy Mezhdunarodnoi nauchno-tekhnicheskoi konferentsii Informatika i problemy telekommunikatsii (Proc. Int. Sci.-Tech. Conf. Informatics and Problems of Telecommunications), Novosibirsk: Sib. Gos. Univ. Telekommun. Inf., 2001, pp. 34–35.
Nicolis, J.S., Dynamics of Hierarchical Systems: An Evolutionary Approach, Springer, 1986.
Pozdnyak, I.S. and Buranova, M.A., Metodicheskie ukazaniya Issledovanie setevogo trafika na stepen' samopodobiya (Methodical Instructions: Study of Network Traffic for the Degree of Self-Similarity), Samara: Povolzh. Gos. Univ. Telekommun. Inf., 2013.
Zegzhda, D.P. and Stepanova, T.V., Applying large-scale adaptive graphs to modeling Internet of Things security, Proceedings of the 7th International Conference on Security of Information and Networks, SIN 2014, 2014, pp. 479–482.
Bekish, O.-Ya.L., Meditsinskaya biologiya (Medical Biology), Minsk: Uradzhai, 2000.
Gerostathopoulos, I., Skoda, D., Plasil, F., Bures, T., and Knauss, A., Architectural homeostasis in self-adaptive software-intensive cyber-physical systems, Lect. Notes Comput. Sci., 2016, vol. 9839, pp. 113–128.
Author information
Authors and Affiliations
Corresponding authors
Additional information
Translated by O. Pismenov
About this article
Cite this article
Zegzhda, D.P., Vasil’ev, Y.S. & Poltavtseva, M.A. Approaches to Modeling the Security of Cyberphysical Systems. Aut. Control Comp. Sci. 52, 1000–1009 (2018). https://doi.org/10.3103/S014641161808031X
Received:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S014641161808031X