Review Topical Sections

Survey on security and privacy issues in cyber physical systems

  • The notion of Cyber-Physical Systems (CPS) is proposed by the National ScientificFoundation to describe a type of systems which combine hardware and software components andbeing the next step in development of embedded systems. CPS includes a wide range of researchtopics ranging from signal processing to data analysis. This paper contains a brief review of the basicinfrastructure for CPS including smart objects and network aspects in relation to TCP/IP stack. AsCPS reflect the processes of the physical environment onto the cyber space, virtualisation as animportant tool for abstraction plays crucial role in CPS. In this context paper presents the challengesassociated with mobility and vritualisation; accordingly three main types of virtualisation, namelynetwork, devices and applications virtualisation are presented in the paper. These aspects are tightlycoupled with security and safety issues. Therefore, different threats, attack types with correspondingsubtypes and possible consequences are discussed as well as analysis of various approaches to copewith existing threats is introduced. In addition threat modelling approaches were also in scope of thiswork. Furthermore, needs and requirements for safety-critical CPS are reviewed. Thus the mainefforts of this paper are directed on introducing various aspects of the CPS with regard to securityand safety issues.

    Citation: Artem A. Nazarenko , Ghazanfar Ali Safdar. Survey on security and privacy issues in cyber physical systems[J]. AIMS Electronics and Electrical Engineering, 2019, 3(2): 111-143. doi: 10.3934/ElectrEng.2019.2.111

    Related Papers:

    [1] Lidong Wang, Cheryl Ann Alexander . Cyber security during the COVID-19 pandemic. AIMS Electronics and Electrical Engineering, 2021, 5(2): 146-157. doi: 10.3934/electreng.2021008
    [2] Dharmesh Faquir, Nestoras Chouliaras, Vlachou Sofia, Kalopoulou Olga, Leandros Maglaras . Cybersecurity in smart grids, challenges and solutions. AIMS Electronics and Electrical Engineering, 2021, 5(1): 24-37. doi: 10.3934/electreng.2021002
    [3] Hardeer Kaur, Jai Sukh Paul Singh . Software defined network implementation of multi-node adaptive novel quantum key distribution protocol. AIMS Electronics and Electrical Engineering, 2024, 8(4): 420-440. doi: 10.3934/electreng.2024020
    [4] Dave Bullock, Aliyu Aliyu, Leandros Maglaras, Mohamed Amine Ferrag . Security and privacy challenges in the field of iOS device forensics. AIMS Electronics and Electrical Engineering, 2020, 4(3): 249-258. doi: 10.3934/ElectrEng.2020.3.249
    [5] K.V. Dhana Lakshmi, P.K. Panigrahi, Ravi kumar Goli . Machine learning assessment of IoT managed microgrid protection in existence of SVC using wavelet methodology. AIMS Electronics and Electrical Engineering, 2022, 6(4): 370-384. doi: 10.3934/electreng.2022022
    [6] Olayanju Sunday Akinwale, Dahunsi Folasade Mojisola, Ponnle Akinlolu Adediran . Mitigation strategies for communication networks induced impairments in autonomous microgrids control: A review. AIMS Electronics and Electrical Engineering, 2021, 5(4): 342-375. doi: 10.3934/electreng.2021018
    [7] Samarjit Patnaik, Manas Ranjan Nayak, Meera Viswavandya . Smart deployment of energy storage and renewable energy sources for improving distribution system efficacy. AIMS Electronics and Electrical Engineering, 2022, 6(4): 397-417. doi: 10.3934/electreng.2022024
    [8] Lawrence O. Aghenta, M. Tariq Iqbal . Design and implementation of a low-cost, open source IoT-based SCADA system using ESP32 with OLED, ThingsBoard and MQTT protocol. AIMS Electronics and Electrical Engineering, 2020, 4(1): 57-86. doi: 10.3934/ElectrEng.2020.1.57
    [9] Habib Hadj-Mabrouk . Contribution of artificial intelligence and machine learning to the assessment of the safety of critical software used in railway transport. AIMS Electronics and Electrical Engineering, 2019, 3(1): 33-70. doi: 10.3934/ElectrEng.2019.1.33
    [10] Levent Ergün, Roman Müller Hainbach, Stefan Butzmann . Methodology of a hierarchical and automated failure analysis and its advantages. AIMS Electronics and Electrical Engineering, 2024, 8(3): 370-379. doi: 10.3934/electreng.2024017
  • The notion of Cyber-Physical Systems (CPS) is proposed by the National ScientificFoundation to describe a type of systems which combine hardware and software components andbeing the next step in development of embedded systems. CPS includes a wide range of researchtopics ranging from signal processing to data analysis. This paper contains a brief review of the basicinfrastructure for CPS including smart objects and network aspects in relation to TCP/IP stack. AsCPS reflect the processes of the physical environment onto the cyber space, virtualisation as animportant tool for abstraction plays crucial role in CPS. In this context paper presents the challengesassociated with mobility and vritualisation; accordingly three main types of virtualisation, namelynetwork, devices and applications virtualisation are presented in the paper. These aspects are tightlycoupled with security and safety issues. Therefore, different threats, attack types with correspondingsubtypes and possible consequences are discussed as well as analysis of various approaches to copewith existing threats is introduced. In addition threat modelling approaches were also in scope of thiswork. Furthermore, needs and requirements for safety-critical CPS are reviewed. Thus the mainefforts of this paper are directed on introducing various aspects of the CPS with regard to securityand safety issues.


    Cyber-Physical system is a concept focusing on bridging physical and cyber worlds. Firstly, the term of CPS was proposed by National Scientific Foundation (NSF), where CPS are described as complex engineered systems devoted to integration of cyber and physical components to extend capabilities of recent embedded systems [1]. This definition states clearly that CPS is the next evolution stage of Embedded Systems. CPS while compared to embedded systems are not limited by just one device, it is more an ecosystem of devices operating in the physical environment and being controlled by computational elements. Another similarity to CPS concept is Internet of Things (IoT) which, from a conceptual point of view, can be considered as a subset of CPS encompassing the infrastructure connecting various physical and virtual entities called 'things' in order to provide advanced services [2].

    In many areas of human activities, CPS has gained more and more attention, especially in the capacities where physical processes and physical equipment needed to be controlled, orchestrated and coordinated with humans, systems, or subsystems. The emerging trends like Industry 4.0 [3] or Industrial Internet [4] are the key indicators of CPS importance; transition to these concepts will involve increasing automation, autonomy and complete new understanding of production processes. Major incentive, which forces CPS development, is a need of convergence for physical processes and computational capabilities, where high degree of communication between components and abstraction of the processes occurring in the physical environment is needed. The scaling of the CPS systems, small and large scale respectively, is distinguished by number of involved components [5]. Small-scale CPS have just a little number of physical as well as cyber components and large-scale systems accordingly have hundreds or even thousands of components. Both of them can be geographically distributed, which may require convergence with global networks, such as Internet [6].

    There were several efforts to develop a general model for CPS in order to give a clear idea of the main components of a CPS regardless of application domains. In [7], CPS is represented through three main layers: the first layer consists of sensors and actuators which observe changing physical environment; the second layer aims at communication and abstraction of the real world processes and the third deals with computational capabilities. Another work in [8] describes an approach for CPS design consisting of three layers, namely physical layer, platform layer, and computation/communication layer, where the last two layers are in fact cyber layers. To establish a comparison among the design concepts, there are common similarities such as the same number of design layers and similar functions performed by the layers. Thus, first layer in both concepts [7,8] is focused on physical components operating in physical environment, whereas the second layer is aimed at interconnection of the lower and higher levels, storage and service composition with particular attention being paid to abstraction mechanisms and the last one serves to high level functions such as computational algorithms, processing, etc. However there is some research work which purely focuses on architectures for specific application domains. As in [9], the four layer architecture for CPS in healthcare domain is represented.

    Considering the complexity of modern CPS, issues of ensuring the security and safety of those systems are of high relevance. The potential threats can be related to a cyber, physical or both dimensions of CPS and thus require complex approach for identification and mitigation of security and safety vulnerabilities. In the current research the goal was to give an insight on vulnerabilities, attack types, mitigation schemes considering the CPS complexity in terms of scalability, distributiveness, components types and distinction between security and safety challenges. Special focus was made on Intrusion Detection Systems implementing the Machine Learning algorithms for threats detection and mitigation, with detailed literature research on algorithms and corresponding threats they were applied to, data sets and target objects which were investigated. Moreover, as the most of CPS can be described as open-loop systems, in other words, constantly collaborating with other systems, corresponding problems, issues and challenges are revealed and discussed.

    The rest of the paper is organised as follows. Support technologies, timeline, Infrastructure and virtualisation concepts related to Cyber Physical Systems are presented in Section 2; whereas importance of security in the presence of existing threats is highlighted in Section 3. An account of threat mitigation techniques as well as threat modelling is presented in Section 4. Section 5 investigates safety aspects of cyber physical systems before open research issues are discussed in Section 6 and paper finally concluded in Section 7.

    In this section the main technological developments are mapped as well as interrelations among CPS and other concepts are described to appreciate technological evolution chain which led to emergence of CPS. According to several sources, concepts such as Embedded Systems [5,10,11], IoT [5,10], Ubiquitous Computing [5,12], Smart Objects [5,13], Sensor Networks [5,14], Smart Environments [13,15] and Systems of Systems [15] plays an important role in CPS development and/or being an integral part of CPS.

    In terms of timeline, Embedded Systems are predecessors of all the mentioned concepts which appeared in the last century thereby starting the new era of microelectronics and responding on the critical issues, e.g. automatisation and remote control. Embedded systems have predefined functionality traversing across one or several functions, which cannot be easily changed (i.e. reprogrammed) by the end user. Importantly embedded systems were designed to control and manipulate the physical world processes [16]. Thus, initially embedded systems were narrow focused and compared to the IoT or CPS, were limited by just control functions of the physical processes without covering the cyber space.

    With growing need to control and organize complex systems, the necessity for interactive embedded systems became clear and the notion of Networked Embedded Systems appeared. A notable work devoted to this topic was completed in the framework of RUNES project within a CORDIS framework. The scenario considered was a 'hybrid network composed of different joint subsystems' [17], in fact a system of systems. The most important factor pushing the appearance of CPS was transition from single systems to networked or connected systems of high complexity. Considering this trend, another important concept strongly influencing the modern CPS, namely Sensor Networks appeared in 80th. Typically Sensor Network consists of a set of sensors deployed in a certain area focussed on information gathering [18]. Appearance of Sensor Networks facilitated development of Smart Objects, which according to [19] are identified as items (sensors or actuators) consisting of microprocessor, communication facilities and power sources. However the sensor network is not considered as an independent unit, but just as a part of complex systems, as for instance fire monitoring system etc [20].

    Huge influence on modern computing systems including CPS gave birth to concept of Ubiquitous Computing. Furthermore, the ideas of integration of computer systems with daily human activities making them 'invisible' for the end users were stated [21]. According to some researchers' opinion [22], ubiquitous computing overlaps with other concepts, for instance, ambient intelligence, IoT and pervasive computing. Another work in [23] states the main goal of IoT as provision of capabilities for the end users to extend current borders of everyday devices and development of personalized services by making use of connected ubiquitous devices. This represents the transition from Embedded Systems with predefined functionality to Ubiquitous Computing and IoT, where one of the main requirements is adoptability and agility. Further development of computing systems led to appearance of CPS and IoT. CPS is a step away from the paradigm where Operational Technologies are separated from Information technologies to prototype where physical and computational elements are highly integrated [14]. However, there is still no unified definition for IoT, some sources [24,25] describes IoT as a global infrastructure including communication technologies, standard protocols, etc., which provide services produced by 'things' to different high-level applications. While other sources [26,27] claim that IoT is a common term defining the sort of scenarios where the capabilities of smart devices/objects are boosted enabling global communication through internet and corresponding technologies. Thus, the idea of IoT can be considered as global term for representing the infrastructure for devices and systems to communicate or scenario where global connectivity is key requirement, while CPS finds itself in a first row of such a system, which can also be distributed and comprise global connectivity, but also be self-sufficient as a unit. Figure 1 demonstrates CPS support technologies.

    Figure 1.  CPS support technologies.

    Infrastructure plays a crucial role in deployment of every system; the same applies to Cyber-Physical Systems (CPS). As the main components of CPS can be considered as sensors / actuators, controllers, communication networks [28]. However, some CPS solutions additionally employ gateways [29]. Importantly, CPS can be both open-loop or closed loop systems. By the analogy with Internet of Things (IoT), open-loop CPS can have access to the global networks, and in this case such paradigms as Cloud Computing, Big Data etc. can be added into the notion of CPS infrastructure. Cyber Physical systems can consist of large extent of heterogeneous devices, including sensors, actuators, etc. Accordingly, this also puts some restrictions on CPS, for instance, necessity of using energy safety protocols and communication technologies. This heterogeneity is one of the biggest challenges in CPS, since various types of devices should get support from a system. Considering modern challenges in big as well as small systems, among challenges such as seamless integrity etc, mobility is another of most important factors that influences the whole system. It means that migrating devices can cause several difficulties and needs to be taken into account in the normal functionality of the system. Figure 2 shows generalised CPS infrastructure.

    Figure 2.  Generalised CPS infrastructure.

    Infrastructure is a complex term which includes hardware as well as software components. Since CPS are complex engineering architectures encapsulating physical and cyber spaces, several attempts for structuring them have been made. Five level CPS architecture has been proposed in [30] with layers functionality described as: (ⅰ) Smart connection level, (ⅱ) Data-to-information conversion level, (ⅲ) Cyber level, (ⅳ) Cognition level, and (ⅴ) Configuration level. Crucial role by different architectural solutions plays the point of view on the system, for example in [31], CPS architecture is proposed from the service oriented point of view and consists of 4 levels as follows: (1) Perceive tier, (2) Data tier, (3) Service tier, and (4) Execution tier. Since CPSs are the part of ICT area, it is important to find interrelations between Open Systems Interconnection Model (OSI), architectures and models developed for CPS. An adapted OSI model for CPS involves Middleware and System Infrastructure model. However, if CPS needs to be integrated with global networks such as Internet, TCP/IP model can be the best contender, where two lowest layers, Physical and Data accordingly, are represented by just one level. Application, Transport and Network layers respectively form part of the other three layers. Figure 3 represents some technologies and protocols belonging to each of the layers.

    Figure 3.  TCP/IP enabled CPS integration model.

    The main task of virtualisation in the context of CPS is to hide or abstract technical details from the layers lying above and to allow flexible resource sharing, so that functionality or resources are provided as a service. Since CPS connect cyber and physical space and include the whole cycle from the signals to complex applications, some important types of virtualisation schemes are described below.

    Network Virtualisation is a complex term and can be divided into several subsections, (ⅰ) Network Interface Cards virtualisation (NICV), (ⅱ) Router virtualization, and (ⅲ) Link virtualisation [32]. NICV relies on giving shared access to the network interface, for example Virtual Machine, where the VM Monitor not only provides access of each VM to the common network interface, but also protects from accessing data of each other [33]. Router virtualisation concept allows deployment of several virtual networks on the same physical infrastructure, thus creating isolated partitions [34]. Several virtual routers can be created on one hardware platform, for example XEN platform mentioned in [35]. Link virtualisation contains main concepts of physical channel multiplexing, bandwidth virtualisation and data path virtualisation [36,37]. Bandwidth virtualisation aims at union of several bandwidths to create a virtual link whereas link virtualisation is data path virtualisation with manipulations performed on packets, for example tunnel based VPNs and tags based VLANs [38].

    Devices / Resource virtualisation involve representation of physical resources without binding to their specific way of access [39]. In other words the main purpose of device virtualisation is to create a digital representation of device or object in cyber space considering all the necessary data which is able to access it and to represent its resources in the context of Service Oriented Architecture (SOA) [40]. These devices and objects can also have a variety of identification mechanisms like virtual personality or virtual identity [41]. Moreover, as CPS may not always possess the necessary capabilities to perform certain tasks, in this context resource virtualisation can be used as a flexible tool for collaboration, namely to share some tasks with nearby CPS with required resources [42,43].

    Applications virtualisation is of particular importance aimed at representing software applications abstracted from the underlying hardware or software platform [44]. Data Distribution Service (DDS) protocol provides the virtual environment for publishing and subscribing applications [45]. In the context of requests and relationships relevant to an application, the concept has been employed in database virtualisation to address the challenges of repeatability, re-execution without approach towards the database [46]. There are also attempts to implement virtualisation for specific application domains, where focus is made on quality monitoring [47,48]. Virtualisation in B2B and manufacturing domain is employed by usage of cloud computing [49,50].

    Many of the CPS can be considered as distributed systems, as they have dispersed components both on physical and computational level. A good example could be set of sensors deployed in a certain space connected to an agammaegator. Data collected from these sensors is stored in a distributed way and services built upon theses sensors, even deployed on the same infrastructure, operate in request/reply fashion. Distributed systems set a number of difficulties, such as synchronisation and collaboration; security is also a matter of concerns since in large scale system, messages are vulnerable on the way among nodes. Nevertheless, as modern CPS contains many components, which can be considered as independent units, thus issues of collaborative behavior are of the main importance. Distributed storage is a concept which is especially relevant for CPS producing huge amounts of data. Challenges arise such as local storage of the data which is harvested from the sensor nodes. Sensing nodes have some restriction in memory capacity etc, thus they need to clear memory and store the data in a centralized way. This can create a set of difficulties, for instance if connection is dropped and the data are extremely important for the functioning of the whole system. One of the storage implementations is Backend Device Management Generic Enabler provided by Fiware platform [51]. Another solution from the IoT perspective represented in [52] is based on collaborative distributed way of storing data, when data in the nodes memory are replicated and distributed to neighbor nodes with available memory capabilities, which are constantly updated according to a memory status in a given moment. Thus, distributed storage is relevant not only for large scale CPS, but also for small sensor networks with real-time restrictions or/and increased reliability.

    Distributed or parallel processing is another relevant concept for the CPS. For CPS with real-time constraints or generating large amounts of data, it is important to process gathered data in a fastest way and create interdependencies among various events. In this context two emerging concepts of distributed IoT applications and Federated Learning need to be mentioned. Distributed IoT is an application where components are deployed near the data sources [53] and might be executed in different platforms [54]. This concept is very similar to the Federated Learning which assumes that data are processed in a distributed way on mobile devices providing a model which is being used to build a general exemplary encapsulating a set of measurements performed by the nodes [55,56]. In the context of CPS, Federated Learning can be applied for processing data locally thereby reducing the load on a central node.

    Since potential threats can affect both the cyber and physical environments, security provision in CPS is extremely important at all stages, namely design, deployment and operation [57,58,59]. Moreover, as CPS are used on many objects of critical infrastructure, issues for protecting them have become extremely relevant. Distributed nature is another concern to be considered while introducing the security and safety measures during the design of CPS design phase. One possible view point is when the complex CPS is represented as a peer-to-peer network with key nodes with computational capabilities serving as gateways or access nodes for local CPS segments [60]. In the proposed architecture security tasks are performed by a "control element" having the role of security administrator implementing the external or intermediate (among distributed components within CPS) security policy for the CPS. Besides the external security policy issues of internal security policy management and conflict resolution are to be considered, as in [61], where the system for critical infrastructure protection, namely hydroelectric dam, is represented. The work discusses analysis of unauthorized network usage and proposes corresponding countermeasures which include reconfiguration of devices as well as measures ensuring integrity of critical data storage. The objects and people are represented as assets and agents respectively in Socio-CPS (SCPS). Though the issues related to SCPS security are discussed in [62], however the work presented lacks in attack prediction. Modern cyber physical systems require components- or subsystems-centric security approach to evaluate the possible consequences for the whole system, even when one of the components is compromised [63]. Considerable amount of research works discusses the possibility of attacks on control systems in order to gain access to the physical part of CPS [64,65]. This fact can be clearly seen on example of SCADA systems, design principles of which were introduced before the era of global interconnected systems [66]. As a consequence, SCADA systems, even though based on web technologies, often have compatibility issues related to integration with modern corporate communication networks. Further consequences associated with convergence of SCADA systems with corporate and global networks are the variety of new security threats, such as non secure remote connections, knowledge availability etc [67], thus with regard to the previous point the access of third parties providing maintenance services need to be restricted in terms of privileges to perform changes within a system [68]. Centralised administration has been proposed to tackle the issue of insecurity in remote connections [69] as well as unauthorised privileges. For further chapters we partially adopted the Security Framework [70] aiming at giving an insight on the area of CPS Security. It comprises of three dimensions or three coordinate axis: security, systems and CPS components respectively. Important deliverables of this framework is division of CPS components on physical, cyber and hybrid having both cyber and physical parts and security dimension introducing the notions of attack, vulnerability, control and threat. However, the framework doesn't represent the threats mitigation schemes, approaches and methods, focusing only on threats themselves and pays less attention to safety mentioning this as a part of security.

    Figure 4 describes common attack types and their sub-types in Cyber Physical Systems. The intruder aims to take control of entire system by launching control hijacking attack, whereas code injection exploits system vulnerabilities by systematic injection of rogue piece of code to change the execution of the entire program. Malware attacks employ special software to hamper normal functioning of a system. Traffic sniffing or interception is practiced in case of eavesdropping attack, whereas the intruder impersonates itself in spoofing attack [71]. All attack types can be extended by Denial of service attacks (DoS) which is aimed at flooding the system in order to disable the actual services provided by the system [72].

    Figure 4.  CPS security: common attack types/subtypes.

    Based on the above mentioned attack types several attack subtypes can be highlighted as follows.

    Permanent DoS is a type of attack when intruder tries to exploit unpatched vulnerabilities in order to install modified firmware to damage a system [73]. Distributed DoS attack is based on a model when several nodes/systems are sending requests to a victim system trying to occupy the available resources (i.e. bandwidth, processor time, etc.), thus rendering the system unable to provide services. Intruder employs the broadcast address of ill-configured network and sends packet by replacing its own address with the victim node address in reflected attacks. Thus the victim node eventually is flooded with fake responses. Smurf attack (ICMP packets) and Fraggle attack (UDP packets) are some of the variations of reflected attacks.

    GPS spoofing is based on broadcasting of incorrect signals of higher strength than received from satellites in order to deceive the victim [74]. Intruder explores the IP addresses of the victim nodes and then sends ARP responses to node X and node Y, with IP address of corresponding node and its own MAC address in ARP spoofing. Thus all packets between X and Y will then pass through the intruder node. IP spoofing is another subtype of spoofing attack aimed at using another IP address to pass through security system. This type of attack can be used on the first stage of complex intrusion in conjunction with reflected attack.

    SQL injection attack involves insertion of malicious SQL statement in the queries, thus leading towards failure of the input data. Cross site scripting exploits open scripting vulnerabilities and adds malicious code into web application leading towards execution. Remote file injection extends itself on the serve side of web applications where the file with malicious code is downloaded and is executed on the server. Shell injection attack is implemented through inclusion of malicious shell code into the code string for further interpretation by the shell [75].

    Man-in-the-Middle is an active type of attack and occurs when intruder intervenes between communicating entities trying to intercept the packets. Traffic sniffing is a passive type of eavesdropping aimed at traffic analysis using special device or program. Relay attacks are aimed at interception of authentication related information.

    Worm is a type of Malware software with ability of making copies of itself thus resulting into wastage of network bandwidth. Virus is also able to replicate itself as worm, but comparatively infects files and programs in the system. Trojan horse intrudes in the system under the guise of legitimate software, whereas Rootkit is a set of software; such as scripts, executable files, configuration files, etc; with ability to hide itself and other malicious software.

    Buffer overflow is a phenomenon when a program is writing data outside of the given buffer, often it is the consequence of the wrong processing of input data. Integer overflow is an error occurred due to inability to represent the numeric value within given storage space, whereas Format string is an intrusion during which the input string is executed as a command.

    Importantly, all attack types can be divided into either passive/active or invasive / non-invasive respectively [76]. Passive attacks, such as traffic sniffing, have the purpose to intercept the sensitive data without causing any destruction to the operation of the entire system. Whereas active attacks, like DoS/DDoS, code injections etc, are aimed at causing direct damage or to gain the control of the system or infrastructure [77]. These two paradigms are completely different, as for passive type of attacks it is desirable to be invisible to security tools to be able to continue dangerous activities as long as possible. The attacks, which are intended to remain invisible for a victim system, are often described in the literature as stealth attacks [78]. For active attacks, main purpose is to destroy or damage the system. Depending on the above mentioned attack groups, accordingly different protection strategies need to be implemented.

    Threats eventually translate into attack vectors. Hardware based attack vectors for smart devices, namely device identity theft and cryptographic keys theft have been identified in [79,80,81]. Importantly, attack vectors can vary depending upon CPS application domain. Work presented in [82] considers medical implants related attacks with the purpose, either to steal the information, change the therapy, or render the device useless by exhaustion of its energy sources. In the energy management domain, for example smart homes, an intruder can manipulate energy consumption measurements resulting into energy theft [83]. Considerable research work has been done towards automatic identification of attack vectors, such as data disclosure and resources disruption etc [84]. Knowledge based attack vector presented in [85] assumes that the intruder may not possess the necessary knowledge about physical processes and ways to take control over the system. However, the attacker implements five steps of intrusion: access, discovery, control, damage and cleanup accordingly, to gain full control of the system in direct or indirect way and to hide any traces of any caused intrusion. Figure 5 presents the main attack vectors in Cyber Physical Systems.

    Figure 5.  Attack vectors in cyber physical systems.

    Classical approaches in security assurance are often concentrated on the whole system paying less attention to a subsystem/component security. It is very important to distinguish the system faults from intrusion or attack. In this context, vulnerabilities assessment approach for industrial systems in proposed in [86]. In this context, a multi-agent scheme for identification and detection of attacks on smart grids is presented in [87]. The process of attack and faults separation is supported by condition state monitor analysing collected logs and system information. The Issue of avalanche effect in complex systems was raised in [88], when affecting one element or a subsystem can have the consequences for the entire system. However, the general methodology (Figure 6) to secure network and services infrastructure was proposed by CISCO [89], contains the following elements: security policy, securing process, monitoring and response, testing, management, and improvement. Securing Process applies to procedures of conducting necessary measures according to a valid security policy. Monitoring and Response implies to a permanent knowledge extraction about the environment where the system is deployed. Testing phase involves constant checking of the system abilities to react on threats including time-to response parameters. Lastly Management and improvement stage is aimed at organizing and efficient use of security assets with further activities on identified security gaps.

    Figure 6.  CISCO security methodology.

    The key element of security methodology is Security Policy (SP) directly affecting other components. Well established security policy should define following aspects [90]:

    ● The set of measures to undertake in the case of particular threat

    ● Roles distribution

    ● Clear definition of what is the accepted behavior

    ● Resources classification based on their sensitivity

    ● Communication process organization

    ● Reporting and logging process organization

    Securing process assumes establishment of all relevant security measures such as firewalls, authentication, authorization etc. Monitoring and response are focused on mechanisms for observing and detecting threats combining hardware, software and human practices. Testing serves to the purposes of constant control of configuration and state of the security system helping in detecting weak points. Managing and improving, as the new threats appear, security system needs to be kept up to date and management assumes keeping proper functioning of the system over time.

    This work focuses on analysis of vulnerabilities occurring through the interaction of cyber and physical elements of a system using discrete approach. Some salient and diverse threat mitigation schemes for Cyber Physical Systems are proposed in the sections below.

    Intrusion detection system (IDS) is an important component of cyber security systems which is aimed to inform either operator or a cyber security enabled system to respond to an attack. The main functions of IDS in CPS consist of collecting data related to entity which has been compromised and subsequent analysis of gathered data [91]. National Institute of Standards and Technology proposes four main types of IDS, most of the modern IDS types belongs to one of these types [92]:

    ● Network-based – focusing on network traffic and corresponding threats considering network protocols, traffic, devices.

    ● Wireless – is similar to the first one; however wireless traffic, protocols are in the scope of those IDSs.

    ● Network behavior analysis – monitors network traffic flows identifying suspicious behavior patterns and policy violations.

    ● Host-based IDS are monitoring activities related to a certain host including traffic, application activities, operations on files and configuration activities. This type of IDs is often applied on critical infrastructure nodes.

    In terms of the way of detecting the threat modern IDS can be subsequently divided into three subetaoups [93]:

    ● Anomaly-based assumes detection of the behavioral patterns which are different from the patterns of normal system's functioning;

    ● Signature-based requires a storage with a set of threats models being kept up-to-date, used to identify threats;

    ● Specification-based, in this mode specifications of the system as whole, as well as of components and interfaces are utilized for detection of suspicious activities.

    However different way of IDSs classification was proposed in [91], where IDS are grouped based on audit material, namely: host or network and detection techniques: knowledge based or behavior-based. Furthermore, the same work provides the explanation if difference between usual IDSs and IDSs for Cyber-Physical systems.

    Scheduling techniques have been proposed to address the issue of resource constraint of CPS where responsibilities sharing among CPS nodes are established to provide constant processing flow [94]. The approach presented in [95] employs guaranteed secure sensors to provide high probability that attack will be detected. Usage of so called trusted devices' compares data gathered from reference device with the data gathered by other devices deployed in the same environment. This idea has found its implementation in [96], where it is assumed that a set of sensors measures the same physical variable. The next step in this technique involves gathering the measurements and analyze using sensor algorithm considering the predefined sensor precisions. However, this idea is not very practical and may give in to passive as well as DoS type of attacks. Time based detection which assumes that there is a predetermined variable for worst case execution time (WCET), is another possible approach of intrusion detection in CPS [97]. If the execution time exceeds the predefined limits, then the system is assumed compromised.

    It is important to distinguish between simple rule-based mechanisms and machine learning algorithms (ML). Both can be represented at the same time in the same security architecture. Rule-based mechanisms are used as the first barrier on the way of threats identifying the critical threats which can cause significant destruction for the system and are based on rules from previously extracted knowledge. Security architecture combining ML algorithms and rule-based mechanisms consist of some basic phases: features extraction, features selection, rule-based detection and ML algorithms for threats detection and extraction of new rules (Figure 7). More advanced approach presumes addition of human supervision to the security architecture, supplied by extracted knowledge from the machine-learning module [98].

    Figure 7.  Hybrid rule-based and ML approach.

    The raw input can be represented by packets, log files which is captured and analyzed, for instance priority could be given to specific traffic types like P2P. The second step presumes definition of key features which are relevant for threat detection. On the third step, rule-based mechanisms are applied to the set of key features and potential dangerous entities are discarded. After malicious entities identified by rule-based detection module are discarded and the learning set for the ML module is formed, other entities, not identified as malicious, are checked by ML module. Furthermore, ML module can contain rule inference modules to produce new rules based on the new faced threats.

    It is worth to mention that machine-learning algorithms can be divided into two general groups, namely supervised and unsupervised. Supervised learning or so called stimulus-reaction is based on a set of learning samples as input and desired outputs, then the mapping functions is produced to connect the input and the output values. In the case of unsupervised learning there is just an input value and the task of an algorithm is to describe the structure from unlabeled data. The most common problems of supervised learning are classification and regression, and of unsupervised clustering, and association. In the context of system security clear example of supervised, unsupervised and semi-supervised approaches could be a set of detected threats. Machine learning techniques for traffic classification using ML were raised and discussed in [99]. The first case when supervised approach can be applied is when the system has knowledgebase with characteristics of main dangers, thus the set of malicious events as an input can be classified into predefined classes: DoS, spoofing, malware, etc. The second case of unsupervised learning is when no predefined descriptions of faced threats are available, but the threats need to be grouped based on certain similarities. And semi-supervised learning is for example, when the input set contains some labeled data for instance some of detected events belong to DoS domain, but the rest of the cases are not identified or the attack type is known, but its modification/subtype is completely new for security system.

    A Framework based on Machine learning, threshold based and rule based outlier detection to provide security in CPS for energy management systems (EMS) is proposed in [100]. Machine-learning approaches compensate for intrusion detection through deviation in system behaviour. Mostly these approaches require defining groups of devices or subsystems, where each subsystem may have its own behaviour pattern. Threshold-based-outlier approaches cater towards data analysis which may exceed the predefined limits. Rule-based detection analyses gathered sensor data on conformity with physical laws and remain within statistical limits. Even though threshold based and rule based approaches are not well suited to detect passive types of attack, but in conjunction with machine-learning, enable them to analyse the whole system behavior even when the data remains within set boarders. Deviations or anomaly based detection is employed to detect attacks on SCADA systems in [101].

    Machine learning algorithms can be applied on different levels of system security, as for instance on network [102,103,104] or application [105,106]. Issues of Software Defined Networks security were raised in [107], where some important threats were identified and solution based on Hidden Markov Model was proposed. The classification problem of incoming packets on dangerous and normal was discussed in [103] and multilayer perceptron algorithm was applied. Another work [108] was devoted to applying ML for comparison of several network traffic features extractors in order to define efficiency of botnet packet detection with perspective of defining the weight of each feature.

    Some important and widely used ML algorithms for insecurity assurance are as follows [109]: Random forest, Naïve Bayes, Bayesian Network, Logistic regression, Sequential minimal optimization, AdaBoost. The list can be completed with following ML algorithms used for detection of Web Spam: Support Vector Machine, Multilayer Perceptron Neural Network, Random Forest, K-nearest neighbor, Bagging, Dagging, Rotation Forest and Boosting algorithms. The above mentioned algorithms can be classified in two large groups (Table 1), namely single and meta algorithms [110]. Distinguishing characteristic of the Meta-algorithms is agammaegation of simple or so called 'weak' classifiers and creation of a 'strong classifier' combining them. For instance Boosting algorithm belongs to supervised learning algorithms combining single supervised algorithms such as Support Vector Machine or Naïve Bayes and is often applied for classification problem solving. More detailed research of ML methods and their application in security domain can be found in [111].

    Table 1.  ML algorithms.
    ML algorithms Meta ML algorithms
    Decision Tree Bagging
    Logistic Regression Boosting
    Naïve Bayes Dagging (Weka)
    KNN Rotation Forest
    Neural Networks Random Forest
    Support Vector Machine
    Bayesian Network
    Genetic Algorithms
    Sequential Minimal Optimization

     | Show Table
    DownLoad: CSV

    Table 2 presents a detailed set of relevant work in the area of ML applied for security purposes. All above mentioned algorithms are organized based on several criteria such as data set, type of ML algorithm, threats types and objects of analysis.

    Table 2.  Summary of ML algorithms, data sets, threats and investigated entities.
    Algorithms Palenzuela et al., [103] Leeds and Atkison, [149] Suh-Lee et al., [150] Morales-Ortega et al., [151] Hu et al., [152] Gouveia and Correia, [153] DeLoach et al., [105] Kamarudin et al., [154] Chinchore et al., [102] Livadas et al., [104] Alshammari and Zincir-Heywood, [155] Li and Guo, [156] Wang et al., [157] Baig et al., [158] Farid et al., [159] Stein et al., [160] Raj Kumar and Selvakumar, [161] Hu et al., [162] Laskov et al., [163] Yerima et al., 2015 Zhang et al., [164] Syarif et al., [165]
    Single ML Algorithms Decision Tree x x x x x x x x
    Logistic Regression x x x x
    Naïve Bayes x x x x
    KNN x
    Neural Networks x x x
    Support Vector Machine x x x
    Bayesian Network x
    Genetic Algorithms x
    Sequential Minimal Optimization
    Random Tree x
    BIRCH x
    Meta ML Bagging x x
    Boosting x x x x x x x
    Random Forest x
    Data Set Andrototal.org x
    SKAION 2006 x
    DREBIN x
    DARPA x x
    UNB ISCX x
    PlayDrone x
    VirusShare x
    Arbor Networks x
    Infocom06 x
    Dartmouth's wireless campus network x
    Univ2007 Dalhousie University x
    Univ2010 Dalhousie University x
    KDD99 x x x x x x x x
    WEBSPAM-UK2006 x
    Conficker x
    UNINA x
    SSE Lab x
    CAIDA DDoS x
    McAfee's internal repository x
    Self acquired data set x
    NSL-KDD x
    IARPA Dataset x
    Threat Probe x x x x x x x
    DOS x x x x x x x x
    U2R x x x x x x x x x
    R2L x x x x x x x x x
    Spam x
    DDoS x
    Flooding x
    Maleware x x
    Botnet traffic identification x x
    VoIP malicious traffic identification x
    Sybil attack x
    Malicious applications x x
    Buffer overflow x
    Malicious data in messages x
    Network intrusion x
    Object of analysis benchmark labeled data x x x x x x
    Applications featured logs x x
    network traffic traces x x x
    TCP dump files x x x
    pcap files x
    Human-assigned labels (spam/nonspam) x
    mobility traces x
    BSM audit logs x
    Binary vector x
    Log files x x
    traffic/packets x

     | Show Table
    DownLoad: CSV

    With constant development and improvement of malwares and intrusion techniques, there is a need for continuous update of the database of protection systems. Development of approaches for collecting and integrating knowledge about new threats with limited expert involvement is very important. The knowledge based approaches analyse unlabelled data of the malwares; based on them classifies the type of malware by referring it to one of the established and well known clusters. Knowledge based structural health monitoring techniques are applied to malware detection in [112]. The presented work also states important requirements for attack detection in manufacturing where no or little interference with normal functioning of a system is being made.

    CPS modelling holds a crucial role and it involves requirements of heterogeneity, dynamism and complexity which must be adequately considered and met accordingly [113]. The CPS modelling can span from information transfer to processes modelling [114]. In this context, security approaches in terms of threat modelling, strategies planning and unified approach to treat security and safety issues together are discussed in [115]. However independent of the model types, some issues are applicable for all the models. The model should be determinate, able enough to help arrive at solution of the problem, provable and executable [116].

    According to [117] there are five common modelling approaches which can be applied to a complex system: System dynamics, Bayesian networks, Coupled component models, Agent-based models and Knowledge-based models. System dynamics is an approach to analyze the whole system over certain periods of time, where all system components interact through the feedback loop; in this way change in behavior of one component can affect the other components and as a result the whole system. Bayesian network is aimed at defining the influence of one entity characteristics on another entity characteristics or one event on another. Whereas coupled component modelling approach is about using the models or model components from different disciplines in order to achieve an integrated solution [117,118]. In the agent based modeling, all entities of the system are represented through interacting agents with specific behavior considering their influence on the whole system. Finally, the knowledge-based modelling uses knowledge base and the logic tools to extract solution.

    Several efforts have been made towards security modeling of the cyber physical systems. A model is presented in [119] with the focus to combine cyber and physical threats of a critical infrastructure. Attention is also paid towards identification of features which have to be protected according to the predefined trend of security policy. Complex approach of security modelling in CPS which involves merger of cyber threats with physical threats is discussed n [120]. The modelled scenario employs UML and Sequence diagrams with application in transportation domain, e.g. in railroad management. The same idea is discussed in [121] which represent an analysis of information flow from perspective of integration of physical and cyber space. Importantly, the combination of cyber and physical characteristics can protect as well as endanger the information flow. Research presented in [122] discusses several attack type models such as fuzzy, interruption, man-in-the middle, replay, overflow and down-sampling attack models. The presented models were tested in a scenario which involved electrical vehicle design in order to show and analyse the behaviour of a system. Research work has also focussed on vulnerability assessment modelling methods which involve attack vectors such as: falsifying sensor inputs, changing set points and sending harmful commands to different system components. The methodology often is based on the interacting agents approach aimed at detecting malicious agent actions and possible consequences for the system state. However, agent-based approach could be applied to members of CPS, as in [123] the problem of formation control under attack in multi-agent systems was stated. CPS components are represented through agents who are under DoS attack, considering two scenarios when one agent or all agents are under attack. Another work presents Ariadne tool for modelling security requirements with topology of operational environment [124]. This method assumes that movement of agents and assets is considered in terms of satisfaction of security requirements, possible violations and subsequent verification.

    Table 3 summarizes mentioned threat mitigation techniques, in the context of adopted approach, purpose and type of attack as well as application domain.

    Table 3.  Threat mitigation techniques comparative analysis.
    Research Work Attack Purpose Type of Attack Proposed Approach Target Application Domain
    Zimmer et al., [97] Sensors compromise Active Time-based detection Node General
    Nur Abdullah and Tozal, [72] Denial of service Active Route record of IP protocol, Probabilistic packet marking Network General
    Al-Hammadi and Aickelin, [142] Data stealing, Denial of Service Active, Passive Behaviour analysis Network General
    Ivanov et al., [96] Sensors compromise Active Data fusion from sensors Node Robotics
    Skormin et al., [144] Variety of attacks as well as system failure Active, Passive System behaviour analysis based on system call data Node, Network General (e.g Health monitoring)
    Ntalampiras, [81] Sensors compromise Active Characteristics fusion of diverse signals representation Network Smart Grid
    Huda et al., [112] Injection of junk code, Instructions re-organisation, code substitution Active, Passive Dynamic changes in malware attack patterns based on unlabelled data Node General
    Petrovski et al., [143] Variety of attacks Active, Passive System behaviour analysis Node Automotive
    Rahman et al., [87] Data replacement, information corruption, Instructions re-organisation Active, Passive Agent-based approach Network, Node Energy Management
    Steger et al., [88] Taking control over system Active Metric-based approach for parameters of components/subsystems Node Automotive
    Udd et al., [101] Data replacement, information corruption, Instructions re-organisation Active, Passive System anomalies analysis, timing analysis Node, Network SCADA Systems
    Adhikari et al., [141] Code injection, Sensors compromise Active, Passive Analysis of causal relationship among devices Node, Network Power Systems
    Vincent et al., [57] Taking control over system Active Behaviour analysis Node Manufacturing
    Paridari et al., [100] Denial of service Active Machine learning detection, limit-based detection, rules-based detection Network Energy Management

     | Show Table
    DownLoad: CSV

    Dynamical nature of the cyber-physical systems set important requirements for security systems and analysis. Work presented in [58] employs system Theoretic Process Analysis (STPA-sec) to monitor systems security and STPA for smart grid safety analysis. Most importantly, the presented work highlights that security and safety need to be considered jointly in order to identify the most complete set of cases which can lead to a system threat. In order to set clear line between two notions, security and safety, there is a need to highlight the differences. According to [125], safety and security has many features in common, but the main difference is in the nature of problems covered by the terms. In the case of security, threats might be unknown and system or analysts have to act under higher level of uncertainty. On the other hand, safety hazards scenarios can be easily formulated from the restricted set of threats and reports based on previously faced hazards. Bayesian Belief Networks were used in [126] in order to analyse safety in conjunction with security. Moreover, data obtained using the Bayesian Belief Networks approach were compared to data gathered through Functional Requirements approach with conclusion made that they can complement each other.

    Due to distributed and multi layered nature of the CPS, where components or subsystems can be deployed on different geographical locations, safety issues of communication among entities have become extremely important. An approach for safety assurance in the presence of unreliable communication has been presented in [127]. The presented scheme is based on safety intervals for message arrival and considers system evolution in the case of unlimited delays. Dimensional view on CPS safety analysis, where domain model introduced is divided into abstraction levels, viewpoints and modes is presented in [128]. The highest abstraction level in this work describes physical processes and communication with physical environment which includes users. The cyber level is responsible for division of a CPS into subsystems and processes into sub-processes. The next level aims at division of subsystems into components and sub-processes into process steps. Subsequently, the last layer, i.e. component layer, sets the modules considering the purpose of components. Viewpoints defines the safety consideration point, in other words it allows to split the general problem of safety provision in CPS onto specific blocks related to structure, behavior, communication, deployment or physical aspects.

    Safety critical cyber physical systems can suffer from sufficient financial loss due to incorrect usage or an intrusion, thus rendering the system not usable [129,130]. CPS deployed on critical infrastructure, for instance energy generation, medical CPS, industrial CPS is good example of safety critical systems. Safety-critical systems possess a number of requirements including: feedback loop from physical environment, distributed management and control, functioning under uncertainty, real-time etc [131]. Spatial and temporal characteristics are very important, thus requiring urgent decision making in emergency situation in case of safety-critical systems [116,132]. Failure prediction architecture for safety-critical CPS has been proposed in [133]. Distinctive features of the architecture involve online operation, no usage of components specific as well internal logic application related data. The presented approach requires only the network traffic analysis based on system behavior.

    Importantly, safety verification in safety-critical CPS can help to reduce risks, costs and time-to-market [134,135,136,137]. The presented work attempts to create a framework for safety verification and validation which will allow collaborative approach through combined efforts of specialists from different system design domains including software, hardware, etc. This can provide extended view of all system levels in the context of safety assurance. Formal verification process for safety critical Cyber Physical systems with application in automotive domain was proposed in [138]. The approach was aimed at safety analysis of system models with respect to safety relevant attributes. Issues of functional safety were raised in [139] and accordingly approach for safety risks analysis was proposed. The work presented in [140,141] represents a survey on validation and verification approaches aimed at giving an overview of existing gaps and current trends, including safety and security issues in cyber physical systems. Importantly, the work highlights the fact that there still is a gap between formal modeling of computational processes and modeling of physical processes.

    Collaborative approaches to ensure the safety of a system has gained much attention. In this context, the idea presented in [142,143,144] is based on safety messages shared by cooperative vehicle safety systems. The system under consideration sends two types of messages over certain period of time: which includes event driven messages of high priority, and regular vehicle tracking messages to communicate with other vehicles in the vicinity. Thus the vehicles create a network of collaborative entities which allows self-improvement as well as environment awareness. The concept of reactive controllers and control-based protocols is widely employed in context of CPS. Reactive controllers are the entities which check the consistency of the systems behavior to a predefined requirements and act in proactive manner by collaborating with corresponding physical environment. These requirements, called contracts' are represented through linear temporal and signal temporal logic. Collaborative efforts for improving the overall CPS safety are very important, as CPS cover a wide range of domains, including human-system interaction, physical components, cyber components, communication elements, etc. Thus it is very important to understand and consider the interrelations among these heterogeneous, distributed elements [145,146].

    This section is devoted to discussion of some important open research issues in the context of security provision of CPS.

    Enabling Collaborative Mechanisms for CPS Protection: Collaborative mechanisms apply to a common strategy of threats mitigation, but also to information exchange about already faced threats. The report released by McAfee [147] states that fragmented security approach is not effective anymore against modern threats. Furthermore, idea of an open integrated ecosystem for coordination of security activities was coined. Thus, security systems even belonging to different stakeholders will benefit from the knowledge exchange about faced threats. In this way, as the new threats appear even faster than threats mitigation solutions to cope with the threats, this will allow to reduce response time and resources needed. Another possible solution is shared knowledgebase, which is being improved by several parties and increase efficiency of threats mitigation.

    Safety Communication for Geographically distributed points: As some of the key nodes or subsystems of a system can be geographically distributed, it makes the process of safer communication a critical challenge. Furthermore, applications accessing the data acquired by, for example the sensor nodes might be compromised and thus the sensor network is attacked in a passive way and these types of threats are hard to be detected. One possible solution could be extracted from the idea of federated learning, where data is not transmitted to the central node for processing, but being processed locally. Thus there is no need to send the local data set to a central server, but just an update to a global model [55].

    Protection of critical infrastructure: Good example of critical infrastructure are the smart grids, which, according to [148], some key challenges are (ⅰ) heterogeneity of technologies and protocols, (ⅱ) weaknesses in communication protocols, as some of them don't posses mechanisms for security ensuring, (ⅲ) limited capabilities of some physical devices, (ⅳ) diversity of security strategies varying from one application domain to another.

    Protection of Cyber and Physical components: Integrity is one of the major requirements of CPS. Attention needs to be paid to security aspects of a sensor network as well as to superstructures and data integrity. Another important issue applies to the lack of general methodology in developing secure CPS, thus there are many proprietary solutions, which may be based on potentially vulnerable approaches.

    Security and Mobility: Mobile devices are potential carriers of threats, as they are contacting a lot of external networks and services. With the spread of wearable smart mobile assistants and implants, critical challenge lies in improving security measures for these devices, as they may harm the human health and even life.

    Pro-active Security Systems: Based on previous threats, Pro-active systems enforced by analytical tools can suggest the main attack vectors and threats types. For instance, the most faced threat by a system could be DDoS attack, which requires special measures for exactly this type of threats. Thus, support tools for testing of system weaknesses and identifying the security priorities could ease the process of security policy improvement.

    Integration and Analytic Tools: There is a clear need for new security models combining machine learning, decision making algorithms and human-assisted analysis. Human-assisted analysis is still an important factor in identifying previously faced threats. Furthermore, as the most faced threats need counter measures to be performed in real-time and since data volumes are extremely high, new solutions for reduced response time are needed.

    Cyber-Physical Systems are complex systems based on convergence of physical or hardware and cyber or software components. CPS has large variety of application areas: among others are transport, healthcare, wearables, home automation etc. The number of deployed CPS steadily increase, which causes several challenges related to security and safety. Some important elements and challenges of CPS were identified and discussed in this paper. Among which were the issues related to infrastructure as a key element of CPS with focus on networking. The role of virtualisation and its main types: network, resources and application were presented. Furthermore, in regard to evolving nature of the modern CPS and growing number of mobile components mobility aspects were also raised. Importance of new complex approaches in the area of Security and Privacy for CPS considering the influence of single components and subsystems threats on the whole system is discussed. Some salient threats and countermeasures including complex Intrusion Detection Systems with utilization of Machine Learning Algorithms were reviewed and debated. In addition threats modeling, which is very important on design stage to develop security mechanisms as well as to evaluate possible damage to the systems under different circumstances, has also been in the scope of this work. Necessity of joint security and safety consideration in order to identify the most complete set of potential threats is also highlighted in the paper. The first part of the paper is covering large variety of topics, which are relevant to understand the security and safety risks, subsequently the second part aims at giving the comprehensive overview of threats, attack vectors and mitigation approaches. In our future work we plan to analyze different threats and mitigation models considering the application domains with respect to heterogeneous and distributed nature of CPS and based on this introduce an appropriate set of measures for detecting and mitigating the security and safety risks domain specific.

    The authors declare that there is no conflict of interest.



    [1] National Science Foundation (NSF): Cyber-Physical Systems, USA, 2015. Available from: http://www.nsf.gov/pubs/2015/nsf15541/nsf15541.pdf.
    [2] Camarinha-Matos LM, Goes J, Gomes L, et al. (2013) Contributing to the Internet of Things, In: Doctoral Conference on Computing, Electrical and Industrial Systems, pp. 312. Springer, Berlin, Heidelberg.
    [3] Hermann M, Pentek T, Otto B (2015) Design Principles for Industrie 4.0 Scenarios: A Literature Review. Working Paper, Technical University of Dortmund, Dortmund, Germany.
    [4] Evans PC, Annunziata M (2012) Industrial Internet: Pushing the Boundaries of Minds and Machines. Available from: http://www.ge.com/docs/chapters/Industrial_Internet.pdf.
    [5] Schmidt DC, White J, Gill CD (2014) Elastic Infrastructure to Support Computing Clouds for Large-scale Cyber-Physical Systems, In: 2014 IEEE 17th International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, pp. 5663, IEEE.
    [6] Koubaa A, Björn A (2009) A Vision of Cyber-Physical Internet, In: 8th International Workshop on Real Time Networks (RTN'09), pp. 16. Instituo Politécnico do Porto. Instituto Superior de Engenharia do Porto.
    [7] Tan Y, Goddard S, Pérez LC (2008) A prototype architecture for cyber-physical systems. ACM SIGBED Review 5: 26.
    [8] Sztipanovits J, Koutsoukos X, Karsai G, et al. (2012) Toward a science of cyberphysical system integration. Proceedings of the IEEE 100: 2944.
    [9] Kocabas O, Soyata T, Aktas MK (2016) Emerging Security Mechanisms for Medical Cyber Physical Systems. IEEE/ACM Transactions on Computational Biology and Bioinformatics 13: 401416.
    [10] Gunes V, Peter S, Givargis T, et al. (2014) A Survey on Concepts, Applications, and Challenges in Cyber-Physical Systems. KSII T Internet Inf 8: 42424268.
    [11] Baheti R, Gill H (2011) Cyber-physical Systems. The Impact of Control Technology 12: 161166.
    [12] Ding W, Engel W, Goode A, et al. (2016) Declarative Modeling Cases of Cyber Physical Systems. In: 2016 International Conference on Logistics, Informatics and Service Sciences (LISS), pp. 16. IEEE.
    [13] Ahmad A, Paul A, Rathore MM, et al. (2016) Smart cyber society: Integration of capillary devices with high usability based on CyberPhysical System. Future Gener Comp Sy 56: 493503.
    [14] Molina E, Jacob E (2017) Software-defined networking in cyber-physical systems: A survey. Comput Electr Eng 66: 407419.
    [15] Ashibani Y, Mahmoud QH (2017) Cyber physical systems security: Analysis, challenges and solutions. Comput Secur 68: 8197.
    [16] Heath S (2002) Embedded Systems Design. 2nd Edition, Newnes, Oxford, UK.
    [17] Mascolo C, Hailes S, Lymberopoulos L, et al. (2005) Survey of middleware for networked embedded systems. Project report. Available from: http://erepo.usiu.ac.ke/bitstream/handle/11732/12/IST-RUNES_D5.1.pdf?sequence=1&isAllowed=y.
    [18] Yick J, Mukherjee B, Ghosal D (2008) Wireless sensor network survey. Comput Netw 52: 22922330.
    [19] Vasseur J-P, Dunkels A (2010) Interconnecting Smart Objects with IP: The Next Internet. Morgan Kaufmann.
    [20] Akyildiz IF, Kasimoglu IH (2004) Wireless sensor and actor networks: research challenges. Ad Hoc Netw 2: 351367.
    [21] Weiser M (1999) Some computer science issues in ubiquitous computing. ACM SIGMOBILEMobile Computing and Communications Review 3: 12.
    [22] Friedewald M, Raabe O (2011) Ubiquitous computing: An overview of technology impacts. Telematics and Informatics, 28: 5565.
    [23] Mayer S, Verborgh R, Kovatsch M, et al. (2016) Smart Configuration of Smart Environments. IEEE T Autom Sci Eng 13: 12471255.
    [24] IERC-European Research Cluster on the Internet of Things, 2014. Available from: http://www.internet-of-things-research.eu/about_iot.htm.
    [25] ITU-International Telecommunication Union, 2012. Recommendation Y.2069: Terms and definitions for the Internet of things. Available from: https://www.itu.int/rec/T-REC-Y.2069-201207-I/en.
    [26] Weber RH and Studer E (2016) Cybersecurity in the Internet of Things: Legal aspects. Computer Law & Security Review 32: 715728.
    [27] Chaouchi H (Ed.) (2013) The Internet of Things Connecting Objects to the Web. John Wiley & Sons.
    [28] Li H, Dimitrovski A, Song JB, et al. (2014) Communication Infrastructure Design in Cyber Physical Systems with Applications in Smart Grids: A Hybrid System Framework. IEEE Communications Surveys & Tutorials 16: 16891708.
    [29] Szczodrak M, Yang Y, Cavalcanti D, et al. (2013) An open framework to deploy heterogeneous wireless testbeds for Cyber- Physical Systems. In: 2013 8th IEEE International Symposium on Industrial Embedded Systems (SIES), pp. 215224.
    [30] Lee J, Bagheri B, Kao HA (2015) A Cyber-Physical Systems architecture for Industry 4.0-based manufacturing systems. Manufacturing Letters 3: 1823.
    [31] Hu L, Xie N, Kuang Z, et al. (2012) Review of Cyber-Physical System Architecture. In: 2012IEEE15th International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops, pp. 2530.
    [32] Rixner S (2008) Network virtualization: Breaking the performance barrier. Queue 6: 37.
    [33] Rauchfuss H, Wild T, Herkersdorf A (2010) A network interface card architecture for I/O virtualization in embedded systems. In: Proceedings of the 2nd conference on I/O virtualization, pp. 22. USENIX Association.
    [34] Ganegedara T, Jiang W, Prasanna V (2011) Multiroot: Towards memory-efficient router virtualization. In: 2011IEEE International Conference on Communications (ICC), pp. 15.
    [35] Egi N, Greenhalgh A, Handley M, et al. (2007) Evaluating Xen for Router Virtualization. In: 2007 16th International Conference on Computer Communications and Networks (ICCCN), pp. 12561261.
    [36] Wen H, Tiwary PK, Le-Ngoc T (2013) Network Virtualization: Overview. In: Wireless Virtualization, pp. 510. Springer, Cham.
    [37] Canonico R, Di Gennaro P, Vittorio M, et al. (2007) Virtualization Techniques in Network Emulation. In: European Conference on Parallel Processing, pp. 144153. Springer, Berlin, Heidelberg.
    [38] Carapinha J, Jiménez J (2009) Network virtualization: a view from the bottom. In: Proceedings of the 1st ACM workshop on Virtualized infrastructure systems and architectures, pp. 7380. ACM.
    [39] Martínez NL, Martínez JF, Díaz VH (2014) Virtualization of Event Sources in Wireless Sensor Networks for the Internet of Things. Sensors 14: 2273722753.
    [40] Taherkordi A, Eliassen F (2014) Towards Independent in-Cloud Evolution of Cyber-Physical Systems. In: 2014 IEEE International Conference on Cyber-Physical Systems, Networks, and Applications, pp. 1924.
    [41] Kuehnle H (2014) Smart Equipment and Virtual Resources trigger Network Principles in Manufacturing. In: IOP Conference Series: Material Science and Engineering, Vol. 58, p. 012002. IOP Publishing.
    [42] Karnouskos S (2011) Cyber-physical systems in the smartgrid. In: 2011 9th IEEE International Conference on Industrial Informatics, pp. 2023. IEEE.
    [43] Gokhale A, McDonald MP, Poff L (2010) Resource Provisioning and Dynamic Resource Management in Intelligent Transportation Systems. In: 11th International Conference on Mobile Data Management, Kansas City, USA.
    [44] García-Valls M, Cucinotta T, Lu C (2014) Challenges in real-time virtualization and predictable cloud computing. J Syst Architect 60: 726-740. doi: 10.1016/j.sysarc.2014.07.004
    [45] Al-Fuqaha AI, Guizani M, Mohammadi M, et al. (2015) Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications. IEEE Communications Surveys & Tutorials 17: 23472376.
    [46] Pham Q, Malik T, Glavic B, et al. (2015) LDV: Light-weight database virtualization. In: 2015 IEEE 31st International Conference on Data Engineering (ICDE), pp. 11791190.c
    [47] Verdouw CN, Beulens AJM, Reijers HA, et al. (2015) A control model for object virtualization in supply chain management. Comput Ind 68: 116131.
    [48] Verdouw CN, Wolfert J, Beulens AJM, et al. (2016) Virtualization of food supply chains with the internet of things. J Food Eng 176: 128136.
    [49] Liu N, Li X, Shen W (2014) Multi-granularity resource virtualization and sharing strategies in cloud manufacturing. J Netw Comput Appl 46: 7282.
    [50] Kertesz A, Kecskemeti G, Brandic I (2014) An interoperable and self-adaptive approach for SLA-based service virtualization in heterogeneous Cloud environments. Future Gener Comp Sy 32: 5468.
    [51] Márquez FG, Jimenez M, Ralli C, et al. (2015) Developing your first application using FI-WARE. Available from: http://cattelefonica.webs.upv.es/Fiware/developingyourfirstapplicationusingfiware.pdf.
    [52] Gonizzi P, Ferrari G, Gay V, et al. (2015) Data dissemination scheme for distributed storage for IoT observation systems at large scale. Inform Fusion 22: 1625.
    [53] Janak J, Schulzrinne H (2016) Framework for Rapid Prototyping of Distributed IoT Applications Powered by WebRTC, In: 2016Principles, Systems and Applications of IP Telecommunications (IPTComm), pp. 17. IEEE.
    [54] Girau R, Martis S, Atzori L (2017) Lysis: A Platform for IoT Distributed Applications Over Socially Connected Objects. IEEE Internet Things 4: 4051.
    [55] McMahan HB, Moore E, Ramage D, et al. (2017) Communication-Efficient Learning of Deep Networks from Decentralized Data. International Conference on Artificial Intelligence and Statistics, 12731282.
    [56] Larsen RB, Carron A, Zeilinger MN (2017) Safe Learning for Distributed Systems with Bounded Uncertainties. IFAC-PapersOnLine 50: 25362542.
    [57] Vincent H, Wells L, Tarazaga P, et al. (2015) Trojan Detection and Side-Channel Analyses for Cyber-Security in Cyber- Physical Manufacturing Systems. Procedia Manufacturing 1: 7785.
    [58] Friedberg I, McLaughlin K, Smith P, et al. (2017) STPA-SafeSec: Safety and security analysis for cyber-physical systems. Journal of information security and applications 34: 183196.
    [59] Govindarasu M, Hann A, Sauer P (2012) Cyber-Physical Systems Security for Smart Grid. Future Grid InitiativeWhite Paper, PSERC.
    [60] Alcaraz C, Lopez J, Wolthusen SD (2016) Policy enforcement system for secure interoperable control in distributed Smart Grid systems. J Netw Comput Appl 59: 301314.
    [61] Di Sarno C, Garofalo A, Matteucci I, et al. (2016) A novel security information and event management system for enhancing cyber security in a hydroelectric dam. Int J Crit Infr Prot 13: 3951.
    [62] Lenzini G, Mauw S, Ouchani S (2015) Security analysis of socio-technical physical systems. Comput Electr Eng 47: 258274.
    [63] Perkins C, Muller G (2015) Using Discrete Event Simulation to Model Attacker Interactions with Cyber and Physical Security Systems. Procedia Computer Science 61: 221226.
    [64] Cherdantseva Y, Burnap P, Blyth A, et al. (2016) A review of cyber security risk assessment methods for SCADA system. Comput Secur 56: 127.
    [65] Cardenas AA, Amin S, Sinopoli B, et al. (2009) Challenges for Securing Cyber Physical Systems. Workshop on future directions in cyber-physical systems security 5.
    [66] Mo Y, Kim THJ, Brancik K, et al. (2011) CyberPhysical Security of a Smart Grid Infrastructure. P IEEE 100: 195209.
    [67] Ozturk M, Aubin P (2011) SCADA Security: Challenges and Solutions. White Paper, Telemetry & Remote SCADA Solutions, Schneider Electric.
    [68] Alcaraz C, Zeadally S (2013) Critical Control System Protection in the 21st Century. Computer 46: 7483.
    [69] Creery A, Byres EJ (2005) Industrial cybersecurity for power system and SCADA networks. In: Record of Conference Papers Industry Applications Society52nd Annual Petroleum and Chemical Industry Conference, pp. 303309. IEEE.
    [70] Humayed A, Lin J, Li F, et al. (2017) Cyber-Physical Systems Security-A Survey. IEEE Internet Things 4: 18021831.
    [71] Papp D, Ma Z, Buttyan L (2015) Embedded Systems Security: Threats, Vulnerabilities, and Attack Taxonomy. In: 2015 13th Annual Conference on Privacy, Security and Trust (PST), pp. 145152.
    [72] Nur AY, Tozal ME (2016) Defending Cyber-Physical Systems against DoS Attacks. In: 2016 IEEE International Conference on Smart Computing (SMARTCOMP), pp. 13. IEEE.
    [73] Neumann PG (2006) Risks to the Public. ACM SIGSOFT Software Engineering Notes 30.
    [74] Jokar P, Arianpoo N, Leung VCM (2013) Spoofing detection in IEEE 802.15.4 networks based on received signal strength. Ad Hoc Netw 11: 26482660.
    [75] Su Z, Wassermann G (2006) The Essence of Command Injection Attacks in Web Applications. In: Acm Sigplan Notices 41: 372382.
    [76] Shoukry Y, Martin P, Tabuada P, et al. (2013) Non-invasive Spoofing Attacks for Anti-lock Braking Systems. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 5572. Springer, Berlin, Heidelberg.
    [77] Chen Y, Kar S, Moura JMF (2016) Cyber Physical Attacks with Control Objectives. In: 2016 IEEE 55th Conference on Decision and Control (CDC), pp. 11251130. IEEE.
    [78] Cazorla L, Alcaraz C, Lopez J (2018) Cyber Stealth Attacks in Critical Information Infrastructures. IEEE Syst J 12: 17781792.
    [79] Wurm J, Jin Y, Liu Y, et al. (2017) Introduction to Cyber-Physical System Security: A Cross-Layer Perspective. IEEE Transactions on Multi-Scale Computing Systems 3: 215227.
    [80] Puttonen J, Afolaranmi SO, Moctezuma LG (2015) Security in Cloud-based Cyber-physical Systems. In: 201510th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), pp. 671676.
    [81] Ntalampiras S (2016) Automatic identification of integrity attacks in cyber-physical systems. Expert Syst Appl 58: 164173.
    [82] Altawy R, Youssef AM (2016) Security Tradeoffs in Cyber Physical Systems: A Case Study Survey on Implantable Medical Devices. IEEE Access 4: 959979.
    [83] Konstantinou C, Maniatakos M, Saqib F, et al. (2015) Cyber-Physical Systems: A Security Perspective. In: 2015 20th IEEE European Test Symposium (ETS), pp. 18. IEEE.
    [84] Teixeira A, Pérez D, Sandberg H (2012) Attack Models and Scenarios for Networked Control Systems. In: Proceedings of the 1st international conference on High Confidence Networked Systems, pp. 5564. ACM.
    [85] Gollmann D, Gurikov P, Isakov A, et al. (2016) Cyber-Physical Systems Security Experimental Analysis of a Vinyl Acetate Monomer Plant. In: Proceedings of the1st ACM Workshop on Cyber-Physical System Security, pp. 112. ACM.
    [86] DeSmit Z, Elhabashy AE, Wells LJ, et al. (2016) Cyber-Physical Vulnerability Assessment in Manufacturing Systems. Procedia Manufacturing 5: 10601074.
    [87] Rahman MS, Mahmud MA, Oo AMT, et al. (2016) Multi-Agent Approach for Enhancing Security of Protection Schemes in Cyber-Physical Energy Systems. IEEE Transactions on Industrial Informatics 13: 436447.
    [88] Steger M, Karner M, Hillebrand J, et al. (2016) A Security Metric for Structured Security Analysis of Cyber-Physical Systems Supporting SAE J3061. In: 2016 2nd International Workshop on Modelling, Analysis, and Control of Complex CPS (CPS Data), pp. 16.
    [89] Burton J, Dubrawsky I, Osipov V, et al. (2003) Secure Intrusion Detection Systems. Syngress Publishing, Inc., Rockland, USA.
    [90] Rehman RU (2003) Intrusion Detection Systems with Snort Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID. Prentice Hall Professional.
    [91] Mitchell R, Chen IR (2014) A Survey of Intrusion Detection Techniques for Cyber-Physical Systems. ACM Computing Surveys (CSUR) 46: 55.
    [92] Scarfone K, Mell P (2007) Guide to Intrusion Detection and Prevention Systems (IDPS): Recommendations of the National Institute of Standards and Technology. NIST No. Special Publication (NIST SP)-800-94.
    [93] Alcaraz C, Cazorla L, Fernandez G (2014) Context-Awareness Using Anomaly-Based Detectors for Smart Grid Domains. In: International Conference on Risks and Security of Internet and Systems, pp. 1734. Springer, Cham.
    [94] Abbas W, Laszka A, Vorobeychik Y, et al. (2015) Scheduling Intrusion Detection Systems in Resource-Bounded Cyber- Physical Systems. In: Proceedings of the 1st ACM Workshop on Cyber-Physical Systems-Security and/or Privacy, pp. 5566. ACM.
    [95] Naghnaeian M, Hirzallah N, Voulgaris PG (2015) Dual Rate Control for Security in Cyber-physical Systems. In: 2015 54th IEEE Conference on Decision and Control (CDC), pp. 141451420.
    [96] Ivanov R, Pajic M, Lee I (2016) Attack-Resilient Sensor Fusion for Safety-Critical Cyber-Physical Systems. ACM Transactions on Embedded Computing Systems (TECS) 15: 21.
    [97] Zimmer C, Bhat B, Mueller F, et al. (2010) Time-Based Intrusion Detection in Cyber-Physical Systems. In: Proceedings of the1st ACM/IEEE International Conference on Cyber-Physical Systems, pp. 109118. ACM.
    [98] Joseph AD, Laskov P, Roli F, et al. (2013) Machine Learning Methods for Computer Security (Dagstuhl Perspectives Workshop 12371), In: Dagstuhl Manifestos, Vol. 3. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik.
    [99] Nguyen TTT, Armitage GJ (2008) A survey of techniques for internet traffic classification using machine learning. IEEE Commun Surv Tut 10: 5676.
    [100] Paridari K, Mady AE-D, La Porta S, et al. (2016) Cyber-Physical-Security Framework for Building Energy Management System. In: 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS), p. 18. IEEE.
    [101] Udd R, Asplund M, Nadjm-Tehrani S, et al. (2016) Exploiting Bro for Intrusion Detection in a SCADA System. In: Proceedings of the2nd ACM International Workshop on Cyber-Physical System Security, pp. 4451.
    [102] Chinchore A, Xu G, Jiang F (2016) Classifying Sybil in MSNs using C4.5. In: 2016International Conference on Behavioral, Economic and Socio-cultural Computing (BESC), pp. 16.
    [103] Palenzuela F, Shaffer M, Ennis M, et al. (2016) Multilayer Perceptron Algorithms for Cyberattack Detection. In: 2016IEEE National Aerospace and Electronics Conference (NAECON) and Ohio Innovation Summit (OIS), pp. 248252.
    [104] Livadas C, Walsh R, Lapsley DE (2006) Using Machine Learning Techniques to Identify Botnet Traffic. In: LCN, pp. 967974.
    [105] DeLoach J, Caragea D, Ou X (2016) Android Malware Detection with Weak Ground Truth Data. In: 2016IEEE International Conference on Big Data (Big Data), pp. 34573464.
    [106] Yerima SY, Sezer S, Muttik I (2015) High accuracy android malware detection using ensemble learning. IET Information Security 9: 313320.
    [107] Song C, Perez-Pons A, Yen KK (2016) Building a Platform for Software-Defined Networking Cybersecurity Applications. In: 2016 15th IEEE International Conference on Machine Learning and Applications, pp. 482487.
    [108] Jianguo J, Qi B, Zhixin S, et al. (2016) Botnet Detection Method Analysis on the Effect of Feature Extraction. In: 2016IEEE Trustcom/BigDataSE/ISPA, pp. 18821888.
    [109] Cohena A, Nissima N, Rokacha L, et al (2016) SFEM: Structural feature extraction methodology for the detection of malicious office documents using machine learning methods. Expert Syst Appl 63: 324343.
    [110] Goh KL, Singh AK (2015) Comprehensive Literature Review on Machine Learning Structures for Web Spam Classification. Procedia Computer Science 70: 434441.
    [111] Buczak AL, Guven E (2016) A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection. IEEE Commun Surv Tut 18: 11531176.
    [112] Huda S, Miah S, Hassan MM, et al. (2017) Defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data. Inform Sciences 379: 211228.
    [113] Seiger R, Keller C, Niebling F, et al. (2015) Modelling complex and flexible processes for smart cyber-physical environments. Journal of Computational Science 10: 137148.
    [114] Kroiß C, Bureš T (2016) Logic-based modeling of information transfer in cyberphysical multi-agent systems. Future Gener Comp Sy 56: 124139.
    [115] Khaitan SK, McCalley JD (2015) Design Techniques and Applications of Cyberphysical Systems: A Survey. IEEE SYST J 9: 350365.
    [116] Petnga L, Austin M (2016) An ontological framework for knowledge modeling and decision support in cyber-physical systems. Adv Eng Inform 30: 7794.
    [117] Kelly RA, Jakeman AJ, Barreteau O, et al. (2013) Selecting among five common modelling approaches for integrated environmental assessment and management. Environ Modell Softw 47: 159181.
    [118] Strasser U, Vilsmaier U, Prettenhaler F, et al. (2014) Coupled component modelling for inter- and transdisciplinary climate change impact research: Dimensions of integration and examples of interface design. Environ Modell Softw 60: 180187.
    [119] Burmester M, Magkos E, Chrissikopoulos V (2012) Modeling security in cyberphysical systems. Int J Crit Infr Prot 5: 118126.
    [120] Marrone S, Rodríguez RJ, Nardone R, et al. (2015) On synergies of cyber and physical security modelling in vulnerability assessment of railway systems. Comput Electr Eng 47: 275285.
    [121] Akella R, Tang H, McMillin BM (2010) Analysis of information flow security in cyberphysical systems. Int J Cri Infr Prot 3: 157173.
    [122] Wan J, Canedo A, Al Faruque MA (2015) Security-Aware Functional Modeling of Cyber-Physical Systems. In: 2015 IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA), pp. 14. IEEE.
    [123] Amullen EM, Shetty S, Keel LH (2016) Model-based resilient control for a multi-agent system against Denial of Service attacks. In: 2016 World Automation Congress (WAC), pp. 16.
    [124] Tsigkanos C, Pasquale L, Ghezzi C, et al. (2015) Ariadne: Topology Aware Adaptive Security for Cyber-Physical Systems. In: Proceedings of the 37th IEEE International Conference on Software Engineering, pp. 729732. IEEE Press.
    [125] Kriaa S, Pietre-Cambacedes L, Bouissou M, et al. (2015) A survey of approaches combining safety and security for industrial control systems. Reliab Eng Syst Safe 139: 156178.
    [126] Kornecki AJ, Subramanian N, Zalewski J (2013) Studying Interrelationships of Safety and Security for Software Assurance in Cyber-Physical Systems: Approach Based on Bayesian Belief Networks. In: 2013 Federated Conference on Computer Science and Information Systems, pp. 13931399.
    [127] Bak S, Abad FAT, Huang Z, et al. (2013) Using Run-Time Checking to Provide Safety and Progress for Distributed Cyber-Physical Systems. In: 2013IEEE 19th International Conference on Embedded and Real-Time Computing Systems and Applications, pp. 287296.
    [128] Kuschnerus D, Bilgic A, Bruns F, et al. (2015) A Hierarchical Domain Model for Safety-Critical Cyber-Physical Systems in Process Automation. In: 2015 IEEE 13th International Conference on Industrial Informatics (INDIN), pp. 430436.
    [129] Knight JC (2002) Safety critical systems: challenges and directions. In: Proceedings of the24th International Conference on Software Engineering, pp. 547550.
    [130] Neuman C (2009) Challenges in Security for Cyber-Physical Systems. In: DHS Workshop on Future Directions in Cyber- Physical Systems Security, pp. 2224.
    [131] Sun H, Liu J, Chen X, et al. (2015) Specifying Cyber-Physical System Safety Properties with Metric Temporal-Spatial Logic. In: 2015 Asia-PacificSoftware Engineering Conference (APSEC), pp. 254260.
    [132] Baldoni R, Montanari L, Rizzuto M (2015) On-line failure prediction in safety-critical systems. Future Gener Comp Sy 45: 123132.
    [133] Masrur A, Kit M, Matena V, et al. (2016) Component-based design of cyber-physical applications with safety-critical requirements. Microprocess Microsy 42: 7086.
    [134] Nguyen HH, Tan R, Yau DKY (2014) Safety-Assured Collaborative Load Management in Smart Grids. In: 2014 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS), pp. 151162.
    [135] Weissnegger R, Schuss M, Kreiner C, et al. (2016) Simulation-based Verification of Automotive Safety-CriticalSystems based on EAST-ADL. Procedia computer science 8: 245252.
    [136] Ishigooka T, Saissi H, Piper T, et al. (2014) Practical Use of Formal Verification for Safety Critical Cyber-Physical Systems: A Case Study. In: 2014 IEEE International Conference on Cyber-Physical Systems, Networks, and Applications, pp. 712.
    [137] Piesik E, Śliwiński M, Barnert T (2016) Determining and verifying the safety integrity level of the safety instrumented systems with the uncertainty and security aspects. Reliab Eng Syst Safe 152: 259272.
    [138] Zheng X, Julien C, Kim M, et al. (2015) Perceptions on the State of the Art in Verification and Validation in Cyber- Physical Systems. IEEE Syst J 11: 26142627.
    [139] Fallah YP, Huang CL, Sengupta R, et al. (2010) Design of Cooperative Vehicle Safety Systems Based on Tight Coupling of Communication, Computing and Physical Vehicle Dynamics. In: Proceedings of the 1st ACM/IEEE International Conference on Cyber-Physical Systems, pp. 159167.
    [140] Schmittner C, Ma Z, Schoitsch E, et al. (2015) A Case Study of FMVEA and CHASSIS as Safety and Security Co- Analysis Method for Automotive Cyber-physical Systems. In: Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, pp. 6980.
    [141] Adhikari U, Morris TH, Pan S (2014) A Causal Event Graph for Cyber-Power System Events Using Synchrophasor. In: 2014 IEEE PES General Meeting|Conference & Exposition, pp. 15. IEEE.
    [142] Al-Hammadi Y, Aickelin U (2010) Behavioural Correlation for Detecting P2P Bots. In: 2010 2nd International Conference on Future Networks (ICFN), pp. 323327.
    [143] Petrovski A, Rattadilok P, Petrovski S (2015) Designing a Context-Aware Cyber Physical System for Detecting Security Threats in Motor Vehicles. In: Proceedings of the 8th International Conference on Security of Information and Networks, pp. 267270.
    [144] Skormin V, Dolgikh A, Birnbaum Z (2014) The Behavioral Approach to Diagnostics of Cyber-Physical Systems. In: 2014 IEEE AUTOTEST, pp. 2630. IEEE.
    [145] Wang A, Iyer M, Dutta R, et al. (2013) Network Virtualization: Technologies, Perspectives, and Frontiers. J Lightwave Technol 31: 523537.
    [146] Wardell DC, Mills RF, Peterson GL, et al. (2016) A Method for Revealing and Addressing Security Vulnerabilities in Cyber-Physical Systems by Modeling Malicious Agent Interactions with Formal Verification. Procedia Computer Science 95: 2431.
    [147] McAfee Special report: How Collaboration Can Optimize Security Operations. The new secret weapon against advanced threats, 2016. Available from: https://abyteofcyber.com/DOCS/rp-soc-collaboration-advanced-threats.pdf.
    [148] Mrabet ZE, Kaabouch N, Ghazi HE, et al. (2018) Cyber-security in smart grid: Survey and challenges. Comput Electr Eng 67: 469482.
    [149] Leeds M, Atkison T (2016) Preliminary Results of Applying Machine Learning Algorithms to Android Malware Detection. In: 2016International Conference on Computational Science and Computational Intelligence, pp. 10701073.
    [150] Suh-Lee C, Jo J-Y, Kim Y (2016) Text Mining for Security Threat Detection Discovering Hidden Information in Unstructured Log Messages. In: 2016 IEEE Conference on Communications and Network Security (CNS), pp. 252260.
    [151] Morales-Ortega S, Escamilla-Ambrosio PJ, Rodríguez-Mota A, et al. (2016) Native Malware Detection in Smartphones with Android OS Using Static Analysis, Feature Selection and Ensemble Classifiers. In: 2016 11th International Conference on Malicious and Unwanted Software (MALWARE), pp. 18.
    [152] Hu W, Liao Y, Vemuri VR (2003) Robust Anomaly Detection Using Support Vector Machines. In: Proceedings of the International Conference on Machine Learning, pp. 282289.
    [153] Gouveia A, Correia M (2016) Feature Set Tuning in Statistical Learning Network Intrusion Detection. In: 2016 IEEE 15th International Symposium on Network Computing and Applications, pp. 6875.
    [154] Kamarudin MH, Maple C, Watson T, et al. (2015) Packet Header Intrusion Detection with Binary Logistic Regression Approach in Detecting R2L and U2R attacks. In: 20154th International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, pp. 101106.
    [155] Alshammari R, Zincir-Heywood AN (2015) Identification of VoIP encrypted traffic using a machine learning approach. Journal of King Saud University Computer and Information Sciences 27: 7792.
    [156] Li Y, Guo L (2007) An Efficient Network Anomaly Detection Scheme Based on TCM-KNN Algorithm and Data Reduction Mechanism. In: 2007IEEE SMC Information Assurance and Security Workshop, pp. 221227.
    [157] Wang W, Lee XD, Hu AL, et al. (2013) Co-Training based Semi-Supervised Web Spam Detection. In: 2013 10th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), pp. 789793.
    [158] Baig M, El-Alfy E-SM, Awais MM (2014) Intrusion Detection Using a Cascade of Boosted Classifiers (CBC), In: 2014 International Joint Conference on Neural Networks, pp. 13861392.
    [159] Farid DM, Harbi N, Rahman MZ (2010) Combining Naïve Bayes and Decision Tree for Adaptive Intrusion Detection. International Journal of Network Security & Its Applications (IJNSA) 2: 1225.
    [160] Stein G, Chen B, Wu AS, et al. (2005) Decision Tree Classifier For Network Intrusion Detection With GA-based Feature Selection. In: Proceedings of the 43rd annual Southeast regional conference, pp. 136141.
    [161] Kumar PAR, Selvakumar S (2013) Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems. Comput Commun 36: 303319.
    [162] Hu W, Hu W, Maybank SJ (2008) AdaBoost-Based Algorithm for Network Intrusion Detection. Systems Man and Cybernatics 38: 577583.
    [163] Laskov P, Schäfer C, Kotenko I, et al. (2004) Intrusion Detection in Unlabeled Data with Quarter-sphere Support Vector Machines. Praxis der Informationsverarbeitung und Kommunikation 27: 228236.
    [164] Zhang J, Luo X, Perdisci R, et al. (2011) Boosting the Scalability of Botnet Detection Using Adaptive Traffic Sampling. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pp. 124134.
    [165] Syarif I, Zaluska E, Prugel-Bennett A, et al. (2012) Application of Bagging, Boosting and Stacking to Intrusion Detection. In: MLDM'12 Proceedings of the8th international conference on Machine Learning and Data Mining in Pattern Recognition, pp. 593602.
  • This article has been cited by:

    1. Lampros Pyrgas, Paris Kitsos, Compact Hardware Architectures of Enocoro-128v2 Stream Cipher for Constrained Embedded Devices, 2020, 9, 2079-9292, 1505, 10.3390/electronics9091505
    2. Sara A. Mahboub, Elmustafa Sayed Ali Ahmed, Rashid A. Saeed, 2021, chapter 6, 9781799851011, 109, 10.4018/978-1-7998-5101-1.ch006
    3. Artem A. Nazarenko, Joao Sarraipa, Luis M. Camarinha-Matos, Christian Grunewald, Marc Dorchain, Ricardo Jardim-Goncalves, Analysis of Relevant Standards for Industrial Systems to Support Zero Defects Manufacturing Process, 2021, 2452414X, 100214, 10.1016/j.jii.2021.100214
    4. Zuzhen ji, Shuang-Hua Yang, Yi Cao, Yuchen Wang, Chenchen Zhou, Liang Yue, Yinqiao Zhang, Harmonizing safety and security risk analysis and prevention in cyber-physical systems, 2021, 148, 09575820, 1279, 10.1016/j.psep.2021.03.004
    5. Sheng Ding, Skander Ayoub, Andrey Morozov, 2022, Chapter 15, 978-3-031-15841-4, 204, 10.1007/978-3-031-15842-1_15
    6. Keshav Kaushik, 2022, 9781119836193, 273, 10.1002/9781119836636.ch12
    7. Shabnam Pasandideh, Pedro Pereira, Luis Gomes, Cyber-Physical-Social Systems: Taxonomy, Challenges, and Opportunities, 2022, 10, 2169-3536, 42404, 10.1109/ACCESS.2022.3167441
    8. E. Yu. Pavlenko, Systematization of Cyber Threats to Large-Scale Systems with Adaptive Network Topology, 2022, 56, 0146-4116, 906, 10.3103/S0146411622080132
    9. Krishna Chimmanee, Suttisak Jantavongso, Practical mobile network planning and optimization for Thai smart cities: Towards a more inclusive globalization, 2021, 3, 2590051X, 100062, 10.1016/j.resglo.2021.100062
    10. Junhui Zhang, Qing-Guo Wang, Tshilidzi Marwala, Jitao Sun, Neural network-based control for RRP-based networked systems under DoS attacks with power interval, 2022, 145, 00051098, 110555, 10.1016/j.automatica.2022.110555
    11. Reham Abdelrazek Ali, Elmustafa Sayed Ali, Rania A. Mokhtar, Rashid A. Saeed, 2022, Chapter 4, 978-981-16-9259-8, 81, 10.1007/978-981-16-9260-4_4
    12. Hope Nkiruka Eke, Andrei Petrovski, Hatem Ahriz, M. Omar Al-Kadri, 2022, Chapter 6, 978-3-030-97165-6, 119, 10.1007/978-3-030-97166-3_6
    13. Nadhira Khezami, Marouane Kessentini, Thiago Do N. Ferreira, A Systematic Literature Review on Software Maintenance for Cyber-Physical Systems, 2021, 9, 2169-3536, 159858, 10.1109/ACCESS.2021.3126681
    14. A. Daniel, R. Deebalakshmi, R. Thilagavathy, T. Kohilakanagalakshmi, S. Janakiraman, Balamurugan Balusamy, Optimal feature selection for malware detection in cyber physical systems using graph convolutional network, 2023, 108, 00457906, 108689, 10.1016/j.compeleceng.2023.108689
    15. Bhawna Wadhwa, Murugan Ramasamy, 2024, Chapter 27, 978-981-99-8134-2, 305, 10.1007/978-981-99-8135-9_27
    16. Defiana Arnaldy, Regina Patricia Theyser, 2023, Analysis of Apilogy.id Email Domain Security Status Using DMARC (Domain-Based Message Authentication, Reporting, and Conformance), 979-8-3503-4516-2, 125, 10.1109/IC2IE60547.2023.10331296
    17. Pavuluri Jaswanth, Pavuluri Yaswanth chowdary, M.V.S. Ramprasad, Deep learning based intelligent system for robust face spoofing detection using texture feature measurement, 2023, 29, 26659174, 100868, 10.1016/j.measen.2023.100868
    18. M. Imran Malik, Ahmed Ibrahim, Peter Hannay, Leslie F. Sikos, Developing Resilient Cyber-Physical Systems: A Review of State-of-the-Art Malware Detection Approaches, Gaps, and Future Directions, 2023, 12, 2073-431X, 79, 10.3390/computers12040079
    19. E. B. Aleksandrova, A. A. Shtyrkina, Method for the Adaptive Neutralization of Structural Breaches in Cyber-Physical Systems Based on Graph Artificial Neural Networks, 2023, 57, 0146-4116, 1076, 10.3103/S0146411623080011
    20. Fadel Ananda Dotty, Yudistira Asnar, 2023, Intrusion Detection System Architecture for Cyber-Physical System, 979-8-3503-8129-0, 1, 10.1109/ICEEI59426.2023.10346839
    21. Xuan Du, 2023, Design and Evaluation of an English Virtual Teaching Effectiveness Evaluation System Based on Improved GLR Algorithm, 979-8-3503-0159-5, 1, 10.1109/ICDSNS58469.2023.10245031
    22. B. K. Tripathy, G. K. Panda, Ashok Sahu, 2024, Chapter 2, 978-3-031-54037-0, 27, 10.1007/978-3-031-54038-7_2
    23. Georgios Spathoulas, Angeliki Katsika, Georgios Kavallieratos, 2025, Chapter 15, 978-981-97-8797-5, 292, 10.1007/978-981-97-8798-2_15
    24. Abdullah Alabdulatif, Navod Neranjan Thilakarathne, Zaharaddeen Karami Lawal, A Review on Security and Privacy Issues Pertaining to Cyber-Physical Systems in the Industry 5.0 Era, 2024, 80, 1546-2226, 3917, 10.32604/cmc.2024.054150
  • Reader Comments
  • © 2019 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(11187) PDF downloads(3423) Cited by(24)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog