Skip to main content
Log in

Assessing the Security of a Cyber-Physical System Based on an Analysis of Malware Signatures

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract—

The structure and basic properties of a generalized cyber-physical system are studied. Information security problems and basic approaches to ensuring the cyber security of these systems are analyzed. A method based on the analysis of the indicators of compromise for assessing the degree of compromise of a generalized cyber-physical system is presented.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.
Fig. 2.
Fig. 3.
Fig. 4.
Fig. 5.
Fig. 6.

REFERENCES

  1. Lasi, H., Fettke, P., Kemper, H., Feld, T., and Hoffmann, M., Industry 4.0, Business Inf. Syst. Eng., 2014, vol. 6, no. 4, pp. 239–242. https://doi.org/10.1007/s12599-014-0334-4

    Article  Google Scholar 

  2. Pavlenko, E., Zegzhda, D., and Shtyrkina, A., Criterion of cyber-physical systems sustainability, CEUR Workshop Proc., 2019, pp. 60–64.

  3. Ivanov, D., Kalinin, M., Krundyshev, V., and Orel, E., Automatic security management of smart infrastructures using attack graph and risk analysis, 2020 Fourth World Conf. on Smart Trends in Systems, Security and Sustainability (WorldS4), London, 2020, IEEE, 2020, vol. 4, pp. 295–300. https://doi.org/10.1109/worlds450073.2020.9210410

  4. Kalinin, M., Ovasapyan, T., and Poltavtseva, M., Application of the learning automaton model for ensuring cyber resiliency, Symmetry, 2022, vol. 14, no. 10, p. 2208. https://doi.org/10.3390/sym14102208

    Article  ADS  Google Scholar 

  5. Lee, E.A., The past, present and future of cyber-physical systems: A focus on models, Sensors, 2015, vol. 15, no. 3, pp. 4837–4869. https://doi.org/10.3390/s150304837

    Article  PubMed  PubMed Central  ADS  Google Scholar 

  6. Barišić, A., Ruchkin, I., Savić, D., Mohamed, M.A., Al-Ali, R., Li, L.W., Mkaouar, H., Eslampanah, R., Challenger, M., Blouin, D., Nikiforova, O., and Cicchetti, A., Multi-paradigm modeling for cyberâЂ“physical systems: A systematic mapping review, Journal of Systems and Software, 2022, vol. 183, p. 111081. https://doi.org/10.1016/j.jss.2021.111081

    Article  Google Scholar 

  7. Meshchanin, V.Yu., Estimating the stability of the system (network) of high-dimensionality military communications, Voennaya Mysl’, 2021, no. 3, pp. 87–92.

  8. Chartrand, G. and Zhang, P., Chromatic Graph Theory, Boca Raton, Fla.: Chapman and Hall/CRC, 2019. https://doi.org/10.1201/9780429438868

    Book  Google Scholar 

  9. Morozov, D., Lezoche, M., and Panetto, H., Multi-paradigm modelling of cyber-physical systems, IFAC-PapersOnLine, 2018, vol. 51, no. 11, pp. 1385–1390. https://doi.org/10.1016/j.ifacol.2018.08.334

    Article  Google Scholar 

  10. Ovasapyan, T.D. and Ivanov, D.V., Security provision in wireless sensor networks on the basis of the trust model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1042–1048. https://doi.org/10.3103/s0146411618080205

    Article  Google Scholar 

  11. Ovasapyan, T. and Moskvin, D., Security provision in WSN on the basis of the adaptive behavior of nodes, 2020 Fourth World Conf. on Smart Trends in Systems, Security and Sustainability (WorldS4), London, 2020, IEEE, 2020, pp. 81–85. https://doi.org/10.1109/worlds450073.2020.9210421

  12. Ovasapyan, T.D., Knyazev, P.V., and Moskvin, D.A., Application of taint analysis to study the safety of software of the internet of things devices based on the arm architecture, Autom. Control Comput. Sci., 2020, vol. 54, no. 8, pp. 834–840. https://doi.org/10.3103/s0146411620080246

    Article  Google Scholar 

  13. Alguliyev, R., Imamverdiyev, Ya., and Sukhostat, L., Cyber-physical systems and their security issues, Comput. Ind., 2018, vol. 100, pp. 212–223. https://doi.org/10.1016/j.compind.2018.04.017

    Article  Google Scholar 

  14. Zegzhda, D.P., Aleksandrova, E.B., Kalinin, M.O., et al., Kiberbezopasnost’ tsifrovoi industrii. Teoriya i praktika funktsional’noi ustoichivosti k kiberatakam (Cybersecurity of Digital Industry: Theory and Practice of Functional Stability to Cyber Attacks), Zegzhda, D.P., Ed., Moscow: Goryachaya Liniya-Telekom, 2021.

    Google Scholar 

  15. What is an indicator of compromise (IoC), Kaspersky IT Encyclopedia. https://encyclopedia.kaspersky.com/glossary/indicator-of-compromise-ioc/.

  16. Gumerov, B.Z., Methods for the enrichment of information security events using CRIBL and MISP, Probl. Nauki, 2022, no. 6, pp. 38–45. https://doi.org/10.24411/2304-2338-2022-10602

Download references

Funding

This work was supported by ongoing institutional funding. No additional grants to carry out or direct this particular research were obtained.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to D. A. Moskvin.

Ethics declarations

The author of this work declares that he has no conflicts of interest.

Additional information

Translated by I. Obrezanova

Publisher’s Note.

Allerton Press remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Moskvin, D.A. Assessing the Security of a Cyber-Physical System Based on an Analysis of Malware Signatures. Aut. Control Comp. Sci. 57, 894–903 (2023). https://doi.org/10.3103/S0146411623080175

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411623080175

Keywords:

Navigation