A Graph-Based Technique for Securing the Distributed Cyber-Physical System Infrastructure

Spreading digitalization, flexibility, and autonomy of technological processes in cyber-physical systems entails high security risks corresponding to negative consequences of the destructive actions of adversaries. The paper proposes a comprehensive technique that represents a distributed functional...

Full description

Bibliographic Details
Main Authors: Maxim Kalinin, Evgenii Zavadskii, Alexey Busygin
Format: Article
Language:English
Published: MDPI AG 2023-10-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/23/21/8724
_version_ 1797631343378563072
author Maxim Kalinin
Evgenii Zavadskii
Alexey Busygin
author_facet Maxim Kalinin
Evgenii Zavadskii
Alexey Busygin
author_sort Maxim Kalinin
collection DOAJ
description Spreading digitalization, flexibility, and autonomy of technological processes in cyber-physical systems entails high security risks corresponding to negative consequences of the destructive actions of adversaries. The paper proposes a comprehensive technique that represents a distributed functional cyber-physical system’s infrastructure as graphs: a functional dependencies graph and a potential attacks graph. Graph-based representation allows us to provide dynamic detection of the multiple compromised nodes in the functional infrastructure and adapt it to rolling intrusions. The experimental modeling with the proposed technique has demonstrated its effectiveness in the use cases of advanced persistent threats and ransomware.
first_indexed 2024-03-11T11:21:30Z
format Article
id doaj.art-8bf6bbbaf2e94210a2ef387a74a5584a
institution Directory Open Access Journal
issn 1424-8220
language English
last_indexed 2024-03-11T11:21:30Z
publishDate 2023-10-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj.art-8bf6bbbaf2e94210a2ef387a74a5584a2023-11-10T15:11:49ZengMDPI AGSensors1424-82202023-10-012321872410.3390/s23218724A Graph-Based Technique for Securing the Distributed Cyber-Physical System InfrastructureMaxim Kalinin0Evgenii Zavadskii1Alexey Busygin2Institute of Computer Sciences and Cybersecurity, Peter the Great St. Petersburg Polytechnic University, 29 Polytekhnicheskaya ul., 195251 St. Petersburg, RussiaInstitute of Computer Sciences and Cybersecurity, Peter the Great St. Petersburg Polytechnic University, 29 Polytekhnicheskaya ul., 195251 St. Petersburg, RussiaInstitute of Computer Sciences and Cybersecurity, Peter the Great St. Petersburg Polytechnic University, 29 Polytekhnicheskaya ul., 195251 St. Petersburg, RussiaSpreading digitalization, flexibility, and autonomy of technological processes in cyber-physical systems entails high security risks corresponding to negative consequences of the destructive actions of adversaries. The paper proposes a comprehensive technique that represents a distributed functional cyber-physical system’s infrastructure as graphs: a functional dependencies graph and a potential attacks graph. Graph-based representation allows us to provide dynamic detection of the multiple compromised nodes in the functional infrastructure and adapt it to rolling intrusions. The experimental modeling with the proposed technique has demonstrated its effectiveness in the use cases of advanced persistent threats and ransomware.https://www.mdpi.com/1424-8220/23/21/8724adaptationattack graphcyber-physical systemfunctional dependencies graphfunctional infrastructuresecurity
spellingShingle Maxim Kalinin
Evgenii Zavadskii
Alexey Busygin
A Graph-Based Technique for Securing the Distributed Cyber-Physical System Infrastructure
Sensors
adaptation
attack graph
cyber-physical system
functional dependencies graph
functional infrastructure
security
title A Graph-Based Technique for Securing the Distributed Cyber-Physical System Infrastructure
title_full A Graph-Based Technique for Securing the Distributed Cyber-Physical System Infrastructure
title_fullStr A Graph-Based Technique for Securing the Distributed Cyber-Physical System Infrastructure
title_full_unstemmed A Graph-Based Technique for Securing the Distributed Cyber-Physical System Infrastructure
title_short A Graph-Based Technique for Securing the Distributed Cyber-Physical System Infrastructure
title_sort graph based technique for securing the distributed cyber physical system infrastructure
topic adaptation
attack graph
cyber-physical system
functional dependencies graph
functional infrastructure
security
url https://www.mdpi.com/1424-8220/23/21/8724
work_keys_str_mv AT maximkalinin agraphbasedtechniqueforsecuringthedistributedcyberphysicalsysteminfrastructure
AT evgeniizavadskii agraphbasedtechniqueforsecuringthedistributedcyberphysicalsysteminfrastructure
AT alexeybusygin agraphbasedtechniqueforsecuringthedistributedcyberphysicalsysteminfrastructure
AT maximkalinin graphbasedtechniqueforsecuringthedistributedcyberphysicalsysteminfrastructure
AT evgeniizavadskii graphbasedtechniqueforsecuringthedistributedcyberphysicalsysteminfrastructure
AT alexeybusygin graphbasedtechniqueforsecuringthedistributedcyberphysicalsysteminfrastructure