TY - GEN
T1 - Reflective attenuation of cyber-physical attacks
AU - Segovia, Mariana
AU - Cavalli, Ana Rosa
AU - Cuppens, Nora
AU - Rubio-Hernan, Jose
AU - Garcia-Alfaro, Joaquin
N1 - Publisher Copyright:
© Springer Nature Switzerland AG 2020.
PY - 2020/1/1
Y1 - 2020/1/1
N2 - Cyber-physical systems (CPS) integrate computation and networking resources to control a physical process. The adoption of new communication capabilities comes at the cost of introducing new security threats that need to be handled properly. Threats must be addressed at cyber and physical domains at the same time in order to detect and automatically mitigate the threats. In this paper, we elaborate an approach to attenuate cyber-physical attacks driven by reflective programmable networking actions, in order to take control of adversarial actions against cyber-physical systems. The approach builds upon the concept of programmable reflection and programmable networking. We validate the approach using experimental work.
AB - Cyber-physical systems (CPS) integrate computation and networking resources to control a physical process. The adoption of new communication capabilities comes at the cost of introducing new security threats that need to be handled properly. Threats must be addressed at cyber and physical domains at the same time in order to detect and automatically mitigate the threats. In this paper, we elaborate an approach to attenuate cyber-physical attacks driven by reflective programmable networking actions, in order to take control of adversarial actions against cyber-physical systems. The approach builds upon the concept of programmable reflection and programmable networking. We validate the approach using experimental work.
KW - Adversary model
KW - Attack detection
KW - Attack mitigation
KW - Critical infrastructures
KW - Cyber-physical security
KW - Networked control systems
U2 - 10.1007/978-3-030-42048-2_2
DO - 10.1007/978-3-030-42048-2_2
M3 - Conference contribution
AN - SCOPUS:85081574905
SN - 9783030420475
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 19
EP - 34
BT - Computer Security - ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Revised Selected Papers
A2 - Katsikas, Sokratis
A2 - Katsikas, Sokratis
A2 - Cuppens, Frédéric
A2 - Cuppens, Nora
A2 - Lambrinoudakis, Costas
A2 - Gritzalis, Stefanos
A2 - Kalloniatis, Christos
A2 - Mylopoulos, John
A2 - Antón, Annie
A2 - Pallas, Frank
A2 - Pohle, Jörg
A2 - Sasse, Angela
A2 - Meng, Weizhi
A2 - Furnell, Steven
A2 - Garcia-Alfaro, Joaquin
PB - Springer
T2 - 5th International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2019, the 3rd International Workshop on Security and Privacy Requirements Engineering, SECPRE 2019, the 1st International Workshop on Security, Privacy, Organizations, and Systems Engineering, SPOSE 2019, and the 2nd International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2019, held in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2019
Y2 - 26 September 2019 through 27 September 2019
ER -