{"title":"网络物理系统安全分析试验台的研制","authors":"E. Basan, N. Proshkin, Mariya Shulika","doi":"10.1109/ICISCT55600.2022.10146872","DOIUrl":null,"url":null,"abstract":"The object of research is models of cyber-physical systems, including IoT devices, microcomputers, various sensors, as well as functioning through communication channels, organized by cyber-physical objects. The aim of the work is to update the problem of information security in cyber-physical systems, analyze the security of these systems, create environments for testing security and identifying new threats and vulnerabilities. During the research, full-scale models of cyber-physical systems were developed that simulate the operation of real CPS, with various types of communication and proprietary protocols used. As a result, a search for vulnerabilities was carried out and a list of possible information attacks and their consequences was identified after the exploitation of vulnerabilities, and the capabilities of individual nodes of cyber-physical systems to create information attacks or protect against them were determined.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Development of test stands of cyber-physical systems for security analysis\",\"authors\":\"E. Basan, N. Proshkin, Mariya Shulika\",\"doi\":\"10.1109/ICISCT55600.2022.10146872\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The object of research is models of cyber-physical systems, including IoT devices, microcomputers, various sensors, as well as functioning through communication channels, organized by cyber-physical objects. The aim of the work is to update the problem of information security in cyber-physical systems, analyze the security of these systems, create environments for testing security and identifying new threats and vulnerabilities. During the research, full-scale models of cyber-physical systems were developed that simulate the operation of real CPS, with various types of communication and proprietary protocols used. As a result, a search for vulnerabilities was carried out and a list of possible information attacks and their consequences was identified after the exploitation of vulnerabilities, and the capabilities of individual nodes of cyber-physical systems to create information attacks or protect against them were determined.\",\"PeriodicalId\":332984,\"journal\":{\"name\":\"2022 International Conference on Information Science and Communications Technologies (ICISCT)\",\"volume\":\"23 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-09-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Information Science and Communications Technologies (ICISCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICISCT55600.2022.10146872\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICISCT55600.2022.10146872","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Development of test stands of cyber-physical systems for security analysis
The object of research is models of cyber-physical systems, including IoT devices, microcomputers, various sensors, as well as functioning through communication channels, organized by cyber-physical objects. The aim of the work is to update the problem of information security in cyber-physical systems, analyze the security of these systems, create environments for testing security and identifying new threats and vulnerabilities. During the research, full-scale models of cyber-physical systems were developed that simulate the operation of real CPS, with various types of communication and proprietary protocols used. As a result, a search for vulnerabilities was carried out and a list of possible information attacks and their consequences was identified after the exploitation of vulnerabilities, and the capabilities of individual nodes of cyber-physical systems to create information attacks or protect against them were determined.