Threat analysis for cyber physical system

Cyber physical systems are the systems that have an interaction between the computers and the real-world; it has been widely used in many different areas and played a major role in our daily lives, Smart Grid, healthcare, aircrafts, and emergency management are the most areas where CPS applied. Howe...

Full description

Saved in:
Bibliographic Details
Main Author: Ahmed Al-Mhiqani, Mohammed Nasser
Format: Thesis
Language:English
English
Published: 2015
Subjects:
Online Access:http://eprints.utem.edu.my/id/eprint/15888/1/Threat%20analysis%20for%20cyber%20physical%20system.pdf
http://eprints.utem.edu.my/id/eprint/15888/2/Threat%20analysis%20for%20cyber%20physical%20system.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-utem-ep.15888
record_format uketd_dc
institution Universiti Teknikal Malaysia Melaka
collection UTeM Repository
language English
English
advisor Ahmad, Rabiah

topic T Technology (General)
TJ Mechanical engineering and machinery
spellingShingle T Technology (General)
TJ Mechanical engineering and machinery
Ahmed Al-Mhiqani, Mohammed Nasser
Threat analysis for cyber physical system
description Cyber physical systems are the systems that have an interaction between the computers and the real-world; it has been widely used in many different areas and played a major role in our daily lives, Smart Grid, healthcare, aircrafts, and emergency management are the most areas where CPS applied. However the cyber physical systems currently one of the important hackers‟ target that have a lot of incidents because of the high impacts of these systems, many works have been conducted in CPS but still there are a lack of theories and tools that organizations and researchers can use to understand the natural of the new threats and the impacts that each threat can cause to the physical systems, in this project we will investigate the current threats on CPSs, develop matrices to calculate these threats, and conduct analysis on the collected data using quantitative approach.
format Thesis
qualification_name Master of Philosophy (M.Phil.)
qualification_level Master's degree
author Ahmed Al-Mhiqani, Mohammed Nasser
author_facet Ahmed Al-Mhiqani, Mohammed Nasser
author_sort Ahmed Al-Mhiqani, Mohammed Nasser
title Threat analysis for cyber physical system
title_short Threat analysis for cyber physical system
title_full Threat analysis for cyber physical system
title_fullStr Threat analysis for cyber physical system
title_full_unstemmed Threat analysis for cyber physical system
title_sort threat analysis for cyber physical system
granting_institution Universiti Teknikal Malaysia Melaka
granting_department Faculty of Information and Communication Technology
publishDate 2015
url http://eprints.utem.edu.my/id/eprint/15888/1/Threat%20analysis%20for%20cyber%20physical%20system.pdf
http://eprints.utem.edu.my/id/eprint/15888/2/Threat%20analysis%20for%20cyber%20physical%20system.pdf
_version_ 1747833881286934528
spelling my-utem-ep.158882022-06-10T14:01:56Z Threat analysis for cyber physical system 2015 Ahmed Al-Mhiqani, Mohammed Nasser T Technology (General) TJ Mechanical engineering and machinery Cyber physical systems are the systems that have an interaction between the computers and the real-world; it has been widely used in many different areas and played a major role in our daily lives, Smart Grid, healthcare, aircrafts, and emergency management are the most areas where CPS applied. However the cyber physical systems currently one of the important hackers‟ target that have a lot of incidents because of the high impacts of these systems, many works have been conducted in CPS but still there are a lack of theories and tools that organizations and researchers can use to understand the natural of the new threats and the impacts that each threat can cause to the physical systems, in this project we will investigate the current threats on CPSs, develop matrices to calculate these threats, and conduct analysis on the collected data using quantitative approach. 2015 Thesis http://eprints.utem.edu.my/id/eprint/15888/ http://eprints.utem.edu.my/id/eprint/15888/1/Threat%20analysis%20for%20cyber%20physical%20system.pdf text en public http://eprints.utem.edu.my/id/eprint/15888/2/Threat%20analysis%20for%20cyber%20physical%20system.pdf text en validuser https://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=96211 mphil masters Universiti Teknikal Malaysia Melaka Faculty of Information and Communication Technology Ahmad, Rabiah 1. Cyber Security Research Alliance, 2013. Designed-In Cyber Security For Cyber-Physical Systems. National Institute Of Standards And Technology Maryland. Available At: Http://Www.Cybersecurityresearch.Org/Documents/CSRA_Workshop_Report.Pdf [Accessed: 7 June 2015]. 2. Anon, 2013, Fuel Oil And Kerosene Sales - Energy Information Administration [Online]. Available At: Http://Www.Eia.Gov/Petroleum/Fueloilkerosene/ [Accessed: 6 June 2015]. 3. Applegate, S.D., 2013. The Dawn Of Kinetic Cyber. Cyber Conflict (Cycon), 2013 5th International Conference. 2013 NATO CCD COE, Tallinn. 4. AVIATION, A., 2013. The Connectivity Challenge: Protecting Critical Assets In A Networked World. The American Institute Of Aeronautics And Astronauts (AIAA) Aviation. 2013 Los Angeles, CA. 5. B, Y.G., Bhaskar, P.C. And Kamat, R.K., 2012. Assessing The Guilt Probability In Intentional Data Leakage. (IJCSIT) International Journal Of Computer Science And Information Technologies, 3(3), Pp.4075.4078. 6. Barend Pretorius, B. Van N., 2015. Iccws 2015 - The Proceedings Of The 10th International Conference On Cyber Warfare And Security. 2015 Academic Conferences Limited, P. 558. 7. Blackwell, C., 2010. A Security Ontology For Incident Analysis. Proceedings Of The Sixth Annual Workshop On Cyber Security And Information Intelligence Research - CSIIRW .10. 2010 ACM Press, New York, New York, USA, P. 1. 8. Cerchio, R. De, Administration, F.A. And Riley, C., 2011. Aircraft Systems Cyber Security. IEEE 30th Digital Avionics Systems Conference (DASC). 2011 Seattle, Pp. 1.7. 9. Combs, M.M., 2011. Impact Of The Stuxnet Virus On Industrial Control Systems, Indiana, USA. 10. Cory Janssen, 2013, What Is Account Hijacking? - Definition From Techopedia [Online]. Available At: Http://Www.Techopedia.Com/Definition/24632/Account-Hijacking [Accessed: 6 June 2015]. 11. UK Centre For The Protection Of National Infrastructure, 2012. Cyber Security In Civil Aviation. Available At: Http://Goo.Gl/Yr6lmf [Accessed: 6 June 2015]. 12. Critchley, T., 2014. High Availability IT Services Francis, T.&, (Ed.), Taylor & Francis. 13. Cybenko, J.H. And G., 2014. Three Tenets For Secure Cyber-Physical System Design And Assessment. SPIE 9097, Cyber Sensing 2014. Maryland. 14. Dan Lohrmann, 2012. 2012 NASCIO Recognition Award Nomination Integrating Cyber And Physical Security: Ending The Divide Using A Comprehensive Approach To Risk Nomination Category:, Michigan. 15. Denning, D.E., 1999. Activism, Hacktivism, And Cyberterrorism: The Internet As A Tool For Influencing Foreign Policy. In: Networks And Netwars: The Future Of Terror, Crime, And Militancy. 16. Douligeris, C. And Mitrokotsa, A., 2004. DDoS Attacks And Defense Mechanisms: Classification And State-Of-The-Art. Computer Networks, 44(5), Pp.643.666. 17. Ezio Bartocci, Oliver Hoeftberger, R.G., 2014. Cyber- Physical Systems. , (97). 18. Fan, X., Gong, G. And Locke, G., 2013. Security Challenges In Smart-Grid Metering And Control Systems. Technology Innovation Management Review, 3(July), Pp.42.49. Available At: Http://Timreview.Ca/Article/702. 19. Gelenbe, E. And Wu, F.-J., 2013. Future Research On Cyber-Physical Emergency Management Systems. Future Internet, 5(3), Pp.336.354. Available At: Http://Www.Mdpi.Com/1999-5903/5/3/336/ [Accessed: 11 October 2014]. 20. Goel, S. And Chen, V., 2005. Information Security Risk Analysis . A Matrix-Based Approach. Proceedings Of The Information Resource Management Association (IRMA) International Conference. 2005 San Diego, CA, Pp. 1.9. 21. Guardian, T., 2012, Exclusive: Secret Assad Emails Lift Lid On Life Of Leader.s Inner Circle | World News | The Guardian [Online]. Available At: Http://Www.Theguardian.Com/World/2012/Mar/14/Assad-Emails-Lift-Lid-Inner-Circle [Accessed: 6 June 2015]. 22. Hansman, S. And Hunt, R., 2005. A Taxonomy Of Network And Computer Attacks. Computers & Security, 24(1), Pp.31.43. Available At: http://goo.gl/hJBy5h [Accessed: 22 November 2014]. 23. Haque, S.A. And Aziz, S.M., 2013. False Alarm Detection In Cyber-Physical Systems For Healthcare Applications. AASRI Procedia, 5, Pp.54.61. Available At: Http://Linkinghub.Elsevier.Com/Retrieve/Pii/S2212671613000590 [Accessed: 11 December 2014]. 24. Haque, S.A., Aziz, S.M. And Rahman, M., 2014. Review Of Cyber-Physical System In Healthcare. International Journal Of Distributed Sensor Networks, 2014, Pp.1.20. Available At: Http://Www.Hindawi.Com/Journals/Ijdsn/2014/217415/. 25. Heinrich, M., 2012, Cyber Attackers Disrupt Internet In Iran: Official | Reuters [Online]. Available At: http://goo.gl/XPhi6Z [Accessed: 6 June 2015]. 26. Helps, R. And Mensah, F.N., 2012. Comprehensive Design Of Cyber Physical Systems. Proceedings Of The 13th Annual Conference On Information Technology Education - SIGITE .12, P.233. Available At: http://goo.gl/btNgsI. 27. Iasiello, E., 2013. Getting Ahead Of The Threat : And Cyber. Aerospace America, (August), Pp.22.25. Available At: Http://Tinyurl.Com/Qhjxaq4. 28. ICT, E.C.F., 2013, Targeted Attacks | Capital [Online]. Available At: Http://Capital.Atosresearch.Eu/Threat13 [Accessed: 6 June 2015]. 29. Janssen, C., What Is Cyberwarfare (Cyber War)? - Definition From Techopedia [Online]. Available At: Http://Www.Techopedia.Com/Definition/13600/Cyberwarfare [Accessed: 6 June 2015]. 30. Juhh, P.B., 1999, Whistleblowing: A Restrictive Definition And Interpretation.: Ebscohost [Online]. Available At: Http://Goo.Gl/Qrfzf5 [Accessed: 6 June 2015]. 31. Kambic, K., Aurthor, K,. Ellis, W., Jensen, T., Johansen, K., Lee, B., Liles, S., 2013, An Analysis Of Cyber Conflict Within The Oil & Gas Industries. Center For Education And Research. Available At: https://goo.gl/kiZaJ3 32. Kjaerland, M., 2006. A Taxonomy And Comparison Of Computer Security Incidents From The Commercial And Government Sectors. Computers & Security, 25(7), Pp.522.538. Available At: Http://Linkinghub.Elsevier.Com/Retrieve/Pii/S0167404806001234 [Accessed: 22 December 2014]. 33. Klinefelter, J.R. And Klinefelter, T.A., 2015. Minimalist Investor Maximum Profits 1st Editio. Page Publishing Inc, (Ed.), Page Publishing Inc. 34. Kovacs, E., 2012, Anonymous Hackers Leak 1GB Of Emails From Syrian Ministry Of Foreign Affairs - Softpedia [Online]. Available At: http://goo.gl/oTCHHN [Accessed: 6 June 2015]. 35. Kovacs, E., 2013, Hackers Publish PM Resignation Notice On Malaysian Government Website - Softpedia [Online]. Available At: Http://News.Softpedia.Com/News/Hackers-Publish-PM-Resignation-Notice-On-Malaysian-Government-Website-330327.Shtml [Accessed: 6 June 2015]. 36. Liu, Y., Reiter, M.K. And Ning, P., 2009. False Data Injection Attacks Against State Estimation In Electric Power Grids. Proceedings Of The 16th ACM Conference On Computer And Communications Security - CCS .09, P.21. Available At: Http://Portal.Acm.Org/Citation.Cfm?Doid=1653662.1653666. 37. THIDAYLIVE, T., 2015. INEC Website Hacked, Articles | THISDAY LIVE. Available At: Http://Www.Thisdaylive.Com/Articles/Inec-Website-Hacked/205285/ [Accessed: 6 June 2015]. 38. Loukas, G., Gan, D. And Vuong, T., 2013a. A Review Of Cyber Threats And Defence Approaches In Emergency Management. Future Internet, 5(2), Pp.205.236. Available At: Http://Www.Mdpi.Com/1999-5903/5/2/205/ [Accessed: 22 December 2014]. 39. Loukas, G., Gan, D. And Vuong, T., 2013b. A Taxonomy Of Cyber Attack And Defence Mechanisms For Emergency Management Networks. Pervasive Computing And 40. Communications Workshops (PERCOM Workshops), 2013 IEEE International Conference. 2013 Ieee, San Diego, CA, Pp. 534.539. 41. Mcdonald, M. John M., Bryan T R., Regis H., Cassidy, Adrian C., 2010. Modeling And Simulation For Cyber- Physical System Security Research , Development And Applications, California. 42. Mehedi Hassan, M., Pathan, A.-S.K., Huh, E.-N. And Abawajy, J., 2014. Emerging Sensor-Cloud Technology For Pervasive Services And Applications. International Journal Of Distributed Sensor Networks, 2014, Pp.1.2. Available At: Http://Www.Hindawi.Com/Journals/Ijdsn/2014/610106/ [Accessed: 23 December 2014]. 43. Miller, B. And Rowe, D., 2012. A Survey SCADA Of And Critical Infrastructure Incidents. Proceedings Of The 1st Annual Conference On Research In Information Technology - RIIT .12. 11 October 2012 ACM Press, New York, New York, USA, P. 51. 44. Miller, W.B., Rowe, D.C. And Woodside, R., 2014. A Comprehensive And Open Framework For Classifying Incidents Involving Cyber-Physical Systems. IAJC/ISAM Joint International Conference. 45. Mohit, K, 2013, Cyber Attack Hits Istanbul Airport Passport Control System [Online]. Available At: Http://Thehackernews.Com/2013/07/Istanbul-Airport-Cyber-Attack-Virus.Html [Accessed: 6 June 2015]. 46. Mostafa, H, M.E.D., 2015, Iran.s State TV Social Media Accounts Hacked | Reuters [Online]. Available At: Http://Goo.Gl/Sqjwlr [Accessed: 6 June 2015]. 47. Muller, K., Paulitsch, M., Tverdyshev, S. And Blasum, H., 2012. MILS-Related Information Flow Control In The Avionic Domain: A View On Security-Enhancing Software Architectures. IEEE/IFIP International Conference On Dependable Systems And Networks Workshops (DSN 2012). June 2012 Ieee, Boston, MA, Pp. 1.6. 48. Mulligan, A.D.K., Wang, L. And Burstein, A.J., 2011. Privacy In The Smart Grid : An Information Flow Analysis, Berkeley. 49. Nabil Adam, 2010. Workshop On Future Directions In Cyber-Physical Systems Security, New Jersey. 50. National Institute Of Standards And Technology, 2014. Framework For Improving Critical Infrastructure Cybersecurity, 51. BBC News, 2012, Computer Virus Hits Second Energy Firm - BBC News [Online]. Available At: Http://Www.Bbc.Com/News/Technology-19434920 [Accessed: 6 June 2015]. 52. BBC News, 2012, Iranian Oil Terminal ¡°Offline¡± After ¡°Malware Attack¡± - BBC News [Online]. Available At: Http://Www.Bbc.Com/News/Technology-17811565 [Accessed: 6 June 2015]. 53. BBC News, 2015, Malaysia Airlines Website ¡°Compromised¡± By Hackers - BBC News [Online]. Available At: Http://Www.Bbc.Com/News/World-Asia-30978299 [Accessed: 6 June 2015]. 54. Paganini, P., 2014, Foreign Hackers Stole Flight MH370 Data From Investigatorssecurity Affairs [Online]. Available At: http://goo.gl/Vd36NL [Accessed: 6 June 2015]. 55. Park, K.-J., Zheng, R. And Liu, X., 2012. Cyber-Physical Systems: Milestones And Research Challenges. Computer Communications, 36(1), Pp.1.7. Available At: Http://Linkinghub.Elsevier.Com/Retrieve/Pii/S0140366412003180 [Accessed: 1 December 2014]. 56. Peterson, S., 2011, Exclusive: Iran Hijacked US Drone, Says Iranian Engineer (Video) - Csmonitor.Com [Online]. Available At: Http://Www.Csmonitor.Com/World/Middle-East/2011/1215/Exclusive-Iran-Hijacked-US-Drone-Says-Iranian-Engineer-Video [Accessed: 6 June 2015]. 57. Rabiah, A. Zahari, Y., 2012. A Dynamic Cyber Terrorism Framework. (IJCSIS) International Journal Of Computer Science And Information Security, 10(Xxx). 58. Raj, R., Lee, I. And Stankovic, J., 2010. Cyber-Physical Systems : The Next Computing Revolution. Automation Conference 2010,. 2010 ACM, California, Pp. 0.5. 59. REBECCA, 2012, Anonymous Takes Down Egyptian Government Websites | Social Media And Tech Blog [Online]. Available At: http://goo.gl/Yyf0KeAccessed: 6 June 2015]. 60. C. Wueest, 2014. Targeted Attacks Against The Energy Sector, Symantec Corporation, Mountain View, CA. 61. Sampigethaya, K. And Bushnell, L., 2009. A Framework For Securing Future E-Enabled Aircraft Navigation And Surveillance .. AIAA Infotech@Aerospace Conference. 2009 American Institute Of Aeronautics And Astronautics, Washington. 62. Selvan, S., 2013, Saudi Arabia Ministry Of Defense Mail System Compromised By Syrian Electronic Army - E Hacker News [Online]. Available At: Http://Goo.Gl/0rvtt [Accessed: 6 June 2015]. 63. Shehabat, A., 2012. The Social Media Cyber-War: The Unfolding Events In The Syrian Revolution 2...: Ebscohost. Global Media Journal Australian Edition. Available At: Http://Goo.Gl/4rxj2c [Accessed: 6 June 2015]. 64. Shi, J., Wan, J., Yan, H. And Suo, H., 2011. A Survey Of Cyber-Physical Systems. 2011 International Conference On Wireless Communications And Signal Processing (WCSP), Pp.1.6. 65. Simmons, C.B., Shiva, S.G., Bedi, H. And Dasgupta, D., 2014. AVOIDIT : A Cyber Attack Taxonomy. 9th Annual Symposium On Information Assurance (ASIA.14), Pp.2.12. 66. Sommer, P., Brown, I., 2011. ¡° Reducing Systemic Cybersecurity Risk ,¡± Organization For Economic Co-Operation And Development (OECD), 2011. 67. Telegraph, 2012, Hillary Clinton Boasts Of US Cyberwar Against Al-Qaeda [Online]. Available At: http://goo.gl/Au4fVa [Accessed: 6 June 2015]. 68. Turk, R.J., 2005. Cyber Incidents Involving Control Systems. , Technical Report INL/EXT-05-00671, Idao National Laboratory, October 2005. 69. Walker, J.J., 2012. Cyber Security Concerns For Emergency Management. In: Emergency Management. Intechopen, Pine Bluff, P. 39. 70. Warren, P. And Streeter, M., 2013. Cyber Crime & Warfare: All That Matters, Mcgraw-Hill, US. 71. Wolf, W., 2012. Computers As Components Principles Of Embedded Computing System Design Second Edi., Elsevier, Burlington. 72. Zhang, L., Wang, Q. And Tian, B., 2013. Security Threats And Measures For The Cyber-Physical Systems. The Journal Of China Universities Of Posts And Telecommunications, 20(August),Pp.25.29.