A Graph-Based Technique for Securing the Distributed Cyber-Physical System Infrastructure
Spreading digitalization, flexibility, and autonomy of technological processes in cyber-physical systems entails high security risks corresponding to negative consequences of the destructive actions of adversaries. The paper proposes a comprehensive technique that represents a distributed functional...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-10-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/23/21/8724 |
_version_ | 1797631343378563072 |
---|---|
author | Maxim Kalinin Evgenii Zavadskii Alexey Busygin |
author_facet | Maxim Kalinin Evgenii Zavadskii Alexey Busygin |
author_sort | Maxim Kalinin |
collection | DOAJ |
description | Spreading digitalization, flexibility, and autonomy of technological processes in cyber-physical systems entails high security risks corresponding to negative consequences of the destructive actions of adversaries. The paper proposes a comprehensive technique that represents a distributed functional cyber-physical system’s infrastructure as graphs: a functional dependencies graph and a potential attacks graph. Graph-based representation allows us to provide dynamic detection of the multiple compromised nodes in the functional infrastructure and adapt it to rolling intrusions. The experimental modeling with the proposed technique has demonstrated its effectiveness in the use cases of advanced persistent threats and ransomware. |
first_indexed | 2024-03-11T11:21:30Z |
format | Article |
id | doaj.art-8bf6bbbaf2e94210a2ef387a74a5584a |
institution | Directory Open Access Journal |
issn | 1424-8220 |
language | English |
last_indexed | 2024-03-11T11:21:30Z |
publishDate | 2023-10-01 |
publisher | MDPI AG |
record_format | Article |
series | Sensors |
spelling | doaj.art-8bf6bbbaf2e94210a2ef387a74a5584a2023-11-10T15:11:49ZengMDPI AGSensors1424-82202023-10-012321872410.3390/s23218724A Graph-Based Technique for Securing the Distributed Cyber-Physical System InfrastructureMaxim Kalinin0Evgenii Zavadskii1Alexey Busygin2Institute of Computer Sciences and Cybersecurity, Peter the Great St. Petersburg Polytechnic University, 29 Polytekhnicheskaya ul., 195251 St. Petersburg, RussiaInstitute of Computer Sciences and Cybersecurity, Peter the Great St. Petersburg Polytechnic University, 29 Polytekhnicheskaya ul., 195251 St. Petersburg, RussiaInstitute of Computer Sciences and Cybersecurity, Peter the Great St. Petersburg Polytechnic University, 29 Polytekhnicheskaya ul., 195251 St. Petersburg, RussiaSpreading digitalization, flexibility, and autonomy of technological processes in cyber-physical systems entails high security risks corresponding to negative consequences of the destructive actions of adversaries. The paper proposes a comprehensive technique that represents a distributed functional cyber-physical system’s infrastructure as graphs: a functional dependencies graph and a potential attacks graph. Graph-based representation allows us to provide dynamic detection of the multiple compromised nodes in the functional infrastructure and adapt it to rolling intrusions. The experimental modeling with the proposed technique has demonstrated its effectiveness in the use cases of advanced persistent threats and ransomware.https://www.mdpi.com/1424-8220/23/21/8724adaptationattack graphcyber-physical systemfunctional dependencies graphfunctional infrastructuresecurity |
spellingShingle | Maxim Kalinin Evgenii Zavadskii Alexey Busygin A Graph-Based Technique for Securing the Distributed Cyber-Physical System Infrastructure Sensors adaptation attack graph cyber-physical system functional dependencies graph functional infrastructure security |
title | A Graph-Based Technique for Securing the Distributed Cyber-Physical System Infrastructure |
title_full | A Graph-Based Technique for Securing the Distributed Cyber-Physical System Infrastructure |
title_fullStr | A Graph-Based Technique for Securing the Distributed Cyber-Physical System Infrastructure |
title_full_unstemmed | A Graph-Based Technique for Securing the Distributed Cyber-Physical System Infrastructure |
title_short | A Graph-Based Technique for Securing the Distributed Cyber-Physical System Infrastructure |
title_sort | graph based technique for securing the distributed cyber physical system infrastructure |
topic | adaptation attack graph cyber-physical system functional dependencies graph functional infrastructure security |
url | https://www.mdpi.com/1424-8220/23/21/8724 |
work_keys_str_mv | AT maximkalinin agraphbasedtechniqueforsecuringthedistributedcyberphysicalsysteminfrastructure AT evgeniizavadskii agraphbasedtechniqueforsecuringthedistributedcyberphysicalsysteminfrastructure AT alexeybusygin agraphbasedtechniqueforsecuringthedistributedcyberphysicalsysteminfrastructure AT maximkalinin graphbasedtechniqueforsecuringthedistributedcyberphysicalsysteminfrastructure AT evgeniizavadskii graphbasedtechniqueforsecuringthedistributedcyberphysicalsysteminfrastructure AT alexeybusygin graphbasedtechniqueforsecuringthedistributedcyberphysicalsysteminfrastructure |