{"title":"Analyzing Implicit Interactions to Identify Weak Points in Cyber-Physical System Designs","authors":"Luke Newton, Jason Jaskolka","doi":"10.1109/RWS52686.2021.9611810","DOIUrl":"https://doi.org/10.1109/RWS52686.2021.9611810","url":null,"abstract":"Cyber-physical systems often consist of many interacting components with numerous communication paths, some of which may be unintended and/or unforeseen by system designers. The existence of such paths, known as implicit interactions, represent security vulnerabilities that can be exploited to mount cyberattacks and destabilize a system. For any system with an abundance of implicit interactions, it can be difficult to understand which aspects of the design contribute most to the presence of this vulnerability. In this paper, we present an approach to identify weak points in the designs of cyber-physical systems based on frequency analyses of the interactions, both implicit and intended, present in a system design. We demonstrate the approach with a real-world Wastewater Dechlorination System. The proposed method can aid system designers in understanding which aspects of their systems contribute most to the existence of implicit interactions to enable effective mitigation strategies to improve overall system security and resilience.","PeriodicalId":294639,"journal":{"name":"2021 Resilience Week (RWS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115795726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Infrastructure eXpression for Codified Cyber Attack Surfaces and Automated Applicability","authors":"Rita Foster, Zach Priest, M. Cutshaw","doi":"10.1109/RWS52686.2021.9611807","DOIUrl":"https://doi.org/10.1109/RWS52686.2021.9611807","url":null,"abstract":"The internal laboratory directed research and development (LDRD) project Infrastructure eXpression (IX) at the Idaho National Laboratory (INL), is based on codifying infrastructure to support automatic applicability to emerging cyber issues, enabling automated cyber responses, codifying attack surfaces, and analysis of cyber impacts to our nation's most critical infrastructure. IX uses the Structured Threat Information eXpression (STIX) open international standard version 2.1 which supports STIX Cyber Observable (SCO) to codify infrastructure characteristics and exposures. Using these codified infrastructures, STIX Relationship Objects (SRO) connect to STIX Domain Objects (SDO) used for modeling cyber threat used to create attack surfaces integrated with specific infrastructure. This IX model creates a shareable, actionable and implementable attack surface that is updateable with emerging threat or infrastructure modifications. Enrichment of cyber threat information includes attack patterns, indicators, courses of action, malware and threat actors. Codifying infrastructure in IX enables creation of software and hardware bill of materials (SBoM/HBoM) information, analysis of emerging cyber vulnerabilities including supply chain threat to infrastructure.","PeriodicalId":294639,"journal":{"name":"2021 Resilience Week (RWS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126499997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber Senses: Modeling Network Situational Awareness after Biology","authors":"Benjamin A. Blakely","doi":"10.1109/RWS52686.2021.9611793","DOIUrl":"https://doi.org/10.1109/RWS52686.2021.9611793","url":null,"abstract":"Biological organisms have a complex and finely-tuned set of systems for detecting and processing information about their environments to inform decision making. These systems vary according to the environment and behaviors of a species, but many themes run throughout. In a similar sense, information technology systems and networks are found in many different contexts, with a wide variety of purposes. And yet there are many commonalities in the information available to them about their environment. In this paper, we propose an analogy of biological senses to enable cyber anomaly detection. An overview of the science of sensory experience is given and used to draw an analogous block diagram for a cyber-sensory architecture. Network traffic is considered as a case study for how these comparisons might hold in a practical sense. Recommendations are then made for future work in this area.","PeriodicalId":294639,"journal":{"name":"2021 Resilience Week (RWS)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116315879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Drift Correction through Nonlinear Sensing","authors":"Dhrubajit Chowdhury, A. Melin, K. Villez","doi":"10.1109/RWS52686.2021.9611798","DOIUrl":"https://doi.org/10.1109/RWS52686.2021.9611798","url":null,"abstract":"For successful design and operation of advanced monitoring and control systems, engineers rely on high quality sensor signals that are simultaneously accurate, representative, voluminous, and timely. Unfortunately, sensor faults are common and lead to short-lived symptoms, such as outliers and spikes as well as long-lived symptoms, such as sensor drift. Sensor drift belongs to the category of incipient faults. These are particularly challenging to detect, diagnose, and correct as the time scales of these faults are typically longer than the time scales of the system dynamics that are of interest. Moreover, if sensor drift occurs as a result of exposure to measured medium, then it is likely that multiple sensors will exhibit similar drift rates, thus challenging fault management strategies based on redundancy. In this contribution, we present a first method that can handle this unique challenge.","PeriodicalId":294639,"journal":{"name":"2021 Resilience Week (RWS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126779252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extensive resilience analysis of function models of complex systems","authors":"Yann Guillouët, Oliver Keszöcze, F. S. Torres","doi":"10.1109/RWS52686.2021.9611802","DOIUrl":"https://doi.org/10.1109/RWS52686.2021.9611802","url":null,"abstract":"The knowledge about the responses to hazardous events is of importance throughout the whole life cycle of a complex system, regardless whether during design or operation phases. These responses also allow to draw conclusions about the resilience of the system. Consequently, there is a need for an extensive consideration of all possible hazardous events a system can be exposed to. This work presents a method for determining the hazards with the most critical system response in terms of resilience. Therefore, we introduce a method for modeling failure propagation under consideration of dynamic behavior in function models. This method is then extended for assessing resilience for random hazard scenarios. Finally, we propose two solutions for determining the most critical hazard scenarios, and thus, provide a base for improvements of the system.","PeriodicalId":294639,"journal":{"name":"2021 Resilience Week (RWS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115657920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploration of Time-Based Resilience Measurements for Next Generation Combat Vehicle Teams","authors":"H. Graham, Glenn J. Lematta, Nancy J. Cooke","doi":"10.1109/RWS52686.2021.9611812","DOIUrl":"https://doi.org/10.1109/RWS52686.2021.9611812","url":null,"abstract":"This study explored how task assignment may influence resilience for next generation combat vehicle (NGCV) teams in overcoming novel events. An experiment was carried out with 22 teams, each comprised of three participants. Teams completed NGCV -like missions via Minecraft. The first manipulation was between subjects with teams having the tasks pre-assigned (procedural) or being afforded the latitude to assign the tasks themselves (exploratory). A second manipulation was within subjects comparing responses to two novel events. To measure resilience four time-based measurements were used. Performance was shown to vary across the two novel event types for all four measurements and offered insight into how these measurements may apply to various novel events. Only the implementation time-based resilience measurement was significantly different between the task assignment conditions. A smaller percentage of time was required to implement a solution for those given the exploratory condition.","PeriodicalId":294639,"journal":{"name":"2021 Resilience Week (RWS)","volume":"444 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116584961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kaveri Mahapatra, D. Sebastian-Cardenas, Sri Nikhil Gupta Gourisetti, James O'Brien, James Ogle
{"title":"Novel Data Driven Noise Emulation Framework using Deep Neural Network for Generating Synthetic PMU Measurements","authors":"Kaveri Mahapatra, D. Sebastian-Cardenas, Sri Nikhil Gupta Gourisetti, James O'Brien, James Ogle","doi":"10.1109/RWS52686.2021.9611789","DOIUrl":"https://doi.org/10.1109/RWS52686.2021.9611789","url":null,"abstract":"Sensors play a critical role in supporting day-to-day grid operations and they are essential to operator's decision-making process. Furthermore, sensors and sensor behaviors need to be emulated with grid simulations to perform modeling studies and to design cutting edge power systems applications. Ensuring the accurate behavior of these applications requires accurate emulation of sensors and pertinent signals. However, most grid simulators and modeling tools assume either zero error scenarios or simplistic noise models that may not always correlate to realworld sensors. To address the above issue, this work presents an initial study on the noise characteristics of phasor measurement units (PMUs), along with models for recreating their unique noise signatures. The proposed methods (both analytical and machine-learning-based) provide a substantial increase in a sensor's model fidelity, a feature that can be leveraged by an end-user application to yield more accurate system representations. The proposed methods were then applied to micro PMU data from the EPFL microgrid campus to extract sensor noise profiles. This data was used to train a deep learning model, which was tested to emulate the noise characteristics present in actual signals. Based on the observed results and the employed data-driven methodology, the proposed methods may be adapted to replicate the behavior of other grid sensors and power new applications capable of detecting sensor degradation and eventual device failures in near real-time.","PeriodicalId":294639,"journal":{"name":"2021 Resilience Week (RWS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125521755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Eman M. Hammad, A. Nag, Anitha Chennamaneni, M. Aghashahi, Erdogan Dogdu
{"title":"A Deep-Defense Approach for Next -Gen Cyber - Resilient Inter-Dependent Critical Infrastructure Systems","authors":"Eman M. Hammad, A. Nag, Anitha Chennamaneni, M. Aghashahi, Erdogan Dogdu","doi":"10.1109/RWS52686.2021.9611790","DOIUrl":"https://doi.org/10.1109/RWS52686.2021.9611790","url":null,"abstract":"Recent adversarial incidents highlight the inherent vulnerabilities in multiple targeted critical infrastructures cyber-physical systems. Next-Gen critical infrastructures will continue evolving to be more distributed, inter-connected, and interdependent. Significant negative consequences could be inflected by threat actors exploiting those characteristics, requiring a more comprehensive and systematic approach. This work proposes a data-based hierarchical framework to identify, detect, and mitigate cyber and/or physical attacks through enriched dynamic situational awareness encompassing individual and interdependent critical infrastructures.","PeriodicalId":294639,"journal":{"name":"2021 Resilience Week (RWS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115028029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tyler C. OBrien, Steven Foster, Emily L. Tucker, Sudeep Hegde
{"title":"COVID Response: A Blended Approach to Studying Sanitizer Station Deployment at a Large Public University","authors":"Tyler C. OBrien, Steven Foster, Emily L. Tucker, Sudeep Hegde","doi":"10.1109/RWS52686.2021.9611795","DOIUrl":"https://doi.org/10.1109/RWS52686.2021.9611795","url":null,"abstract":"We present a blended approach to integrate qualitative human factors and quantitative operations research modeling to understand how Clemson University adapted to the challenges of the COVID-19 pandemic. We focus primarily on the strategic deployment of hand sanitizer stations to reduce transmission of the virus. We identify key adaptations and effective coordination amongst various departments during the crisis. We describe how the qualitative data influenced our development of a discrete facility location covering model and use the model to select optimal locations for dispenser stations. Future plans include further model development, providing model-informed redeployment recommendations in preparation for the Fall 2021 semester, and tactical planning. The blended approach can be broadly applied to understand and improve resiliency decisions in other contexts.","PeriodicalId":294639,"journal":{"name":"2021 Resilience Week (RWS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133549554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Sebastian-Cardenas, S. Gourisetti, M. Mylrea, A. Moralez, G. Day, V. Tatireddy, C. Allwardt, R. Singh, R. Bishop, Karambir Kaur, J. Plummer, G. Raymond, B. Johnson, A. Chawla
{"title":"Digital data provenance for the power grid based on a Keyless Infrastructure Security Solution","authors":"D. Sebastian-Cardenas, S. Gourisetti, M. Mylrea, A. Moralez, G. Day, V. Tatireddy, C. Allwardt, R. Singh, R. Bishop, Karambir Kaur, J. Plummer, G. Raymond, B. Johnson, A. Chawla","doi":"10.1109/RWS52686.2021.9611800","DOIUrl":"https://doi.org/10.1109/RWS52686.2021.9611800","url":null,"abstract":"In this work a data provenance system for grid-oriented applications is presented. The proposed Keyless Infrastructure Security Solution (KISS) provides mechanisms to store and maintain digital data fingerprints that can later be used to validate and assert data provenance using a time-based, hash tree mechanism. The developed solution has been designed to satisfy the stringent requirements of the modern power grid including execution time and storage necessities. Its applicability has been tested using a lab-scale, proof-of-concept deployment that secures an energy management system against the attack sequence observed on the 2016 Ukrainian power grid cyberattack. The results demonstrate a strong potential for enabling data provenance in a wide array of applications, including speed-sensitive applications such as those found in control room environments.","PeriodicalId":294639,"journal":{"name":"2021 Resilience Week (RWS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131964455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}