• Title/Summary/Keyword: Cyber-physical security

Search Result 126, Processing Time 0.024 seconds

클라우드 환경에서의 사이버물리시스템 관점에서 본 헬스 케어 보안 관련 이슈들

  • Lee, Hye Lim;Cho, Jaeyeon;Yoon, Ji Won
    • Review of KIISC
    • /
    • v.24 no.6
    • /
    • pp.7-13
    • /
    • 2014
  • 사이버 물리 시스템(Cyber physical system, CPS)은 사물인터넷(IoT)과 달리 네트워크로 이루어진 물리적 장치들 간의 제어 및 통제를 포함하는 관리 시스템이다. 사이버물리시스템의 대표적인 사례인 헬스 케어 시스템은 시스템 내에서 다뤄지는 의료정보라는 데이터의 특별한 성격으로 인하여 데이터의 저장에서 관리까지 여러 가지 보안 위협들이 존재한다. 본 논문에서는 사이버 물리 시스템으로서의 헬스 케어 시스템이 클라우드 환경으로 이루어졌을 때 어떤 위협들이 존재하며 이러한 위협들이 어떻게 분류될 수 있는지, 또한 위협을 방지하기 위해 국내외 어떤 기술 및 표준화 노력들이 있었는지 알아보고자 한다.

Design of Smart City Considering Carbon Emissions under The Background of Industry 5.0

  • Fengjiao Zhou;Rui Ma;Mohamad Shaharudin bin Samsurijan;Xiaoqin Xie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.4
    • /
    • pp.903-921
    • /
    • 2024
  • Industry 5.0 puts forward higher requirements for smart cities, including low-carbon, sustainable, and people-oriented, which pose challenges to the design of smart cities. In response to the above challenges, this study introduces the cyber-physical-social system (CPSS) and parallel system theory into the design of smart cities, and constructs a smart city framework based on parallel system theory. On this basis, in order to enhance the security of smart cities, a sustainable patrol subsystem for smart cities has been established. The intelligent patrol system uses a drone platform, and the trajectory planning of the drone is a key problem that needs to be solved. Therefore, a mathematical model was established that considers various objectives, including minimizing carbon emissions, minimizing noise impact, and maximizing coverage area, while also taking into account the flight performance constraints of drones. In addition, an improved metaheuristic algorithm based on ant colony optimization (ACO) algorithm was designed for trajectory planning of patrol drones. Finally, a digital environmental map was established based on real urban scenes and simulation experiments were conducted. The results show that compared with the other three metaheuristic algorithms, the algorithm designed in this study has the best performance.

A research on cyber target importance ranking using PageRank algorithm (PageRank 알고리즘을 활용한 사이버표적 중요성 순위 선정 방안 연구)

  • Kim, Kook-jin;Oh, Seung-hwan;Lee, Dong-hwan;Oh, Haeng-rok;Lee, Jung-sik;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.115-127
    • /
    • 2021
  • With the development of science and technology around the world, the realm of cyberspace, following land, sea, air, and space, is also recognized as a battlefield area. Accordingly, it is necessary to design and establish various elements such as definitions, systems, procedures, and plans for not only physical operations in land, sea, air, and space but also cyber operations in cyberspace. In this research, the importance of cyber targets that can be considered when prioritizing the list of cyber targets selected through intermediate target development in the target development and prioritization stage of targeting processing of cyber operations was selected as a factor to be considered. We propose a method to calculate the score for the cyber target and use it as a part of the cyber target prioritization score. Accordingly, in the cyber target prioritization process, the cyber target importance category is set, and the cyber target importance concept and reference item are derived. We propose a TIR (Target Importance Rank) algorithm that synthesizes parameters such as Event Prioritization Framework based on PageRank algorithm for score calculation and synthesis for each derived standard item. And, by constructing the Stuxnet case-based network topology and scenario data, a cyber target importance score is derived with the proposed algorithm, and the cyber target is prioritized to verify the proposed algorithm.

Improving the Efficiency of Cybersecurity Risk Analysis Methods for Nuclear Power Plant Control Systems (원전 제어시스템 사이버보안 위험 분석방법의 효율성 개선)

  • Shin-woo Lee;Jung-hee Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.537-552
    • /
    • 2024
  • Domestic nuclear power plants operate under the establishment of the "Information System Security Regulations" in accordance with the Nuclear Safety Act, introducing and implementing a cybersecurity system that encompasses organizational structure as well as technical, operational, and managerial security measures for assets. Despite attempts such as phased approaches and alternative measures for physical protection systems, the reduction in managed items has not been achieved, leading to an increased burden on security capabilities due to limited manpower at the site. In the main text, an analysis is conducted on Type A1 assets performing nuclear safety functions using Maintenance Rules (MR) and EPRI Technical Assessment Methodology (TAM) from both a maintenance perspective and considering device characteristics. Through this analysis, approaches to re-evaluate the impact of cyber intrusions on asset functionality are proposed.

A Survey on Unsupervised Anomaly Detection for Multivariate Time Series (다변량 시계열 이상 탐지 과업에서 비지도 학습 모델의 성능 비교)

  • Juwan Lim;Jaekoo Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.1
    • /
    • pp.1-12
    • /
    • 2023
  • It is very time-intensive to obtain data with labels on anomaly detection tasks for multivariate time series. Therefore, several studies have been conducted on unsupervised learning that does not require any labels. However, a well-done integrative survey has not been conducted on in-depth discussion of learning architecture and property for multivariate time series anomaly detection. This study aims to explore the characteristic of well-known architectures in anomaly detection of multivariate time series. Additionally, architecture was categorized by using top-down and bottom-up approaches. In order toconsider real-world anomaly detection situation, we trained models with dataset such as power grids or Cyber Physical Systems that contains realistic anomalies. From experimental results, we compared and analyzed the comprehensive performance of each architecture. Quantitative performance were measured using precision, recall, and F1 scores.

A Study on ICT Security Change and CPS Security System in the 4th Industry Age (4차 산업 시대의 ICT 보안 변화와 CPS 보안 시스템에 관한 연구)

  • Joo, Heon-Sik
    • Journal of Digital Contents Society
    • /
    • v.19 no.2
    • /
    • pp.293-300
    • /
    • 2018
  • This study explored the security of Industry 4.0 such as security trends and security threats in Industry 4.0, and security system in Industry 4.0. The threat elements in Industry 4.0 are changing from ICT to IoT and to CPS security, so security paradigm and security System should change accordingly. In particular, environmental and administrative security are more important to solve CPS security. The fourth industry-age security should change to customized security for individual systems, suggesting that the security technology that combines hardware and software in product production design should change from the beginning of development. The security system of the fourth industry proposes design and implementation as a CPS security system as a security system that can accommodate various devices and platforms from a security system in a single system such as a network to an individual system.

Protection Strategies Against False Data Injection Attacks with Uncertain Information on Electric Power Grids

  • Bae, Junhyung;Lee, Seonghun;Kim, Young-Woo;Kim, Jong-Hae
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.1
    • /
    • pp.19-28
    • /
    • 2017
  • False data injection attacks have recently been introduced as one of important issues related to cyber-attacks on electric power grids. These attacks aim to compromise the readings of multiple power meters in order to mislead the operation and control centers. Recent studies have shown that if a malicious attacker has complete knowledge of the power grid topology and branch admittances, s/he can adjust the false data injection attack such that the attack remains undetected and successfully passes the bad data detection tests that are used in power system state estimation. In this paper, we investigate that a practical false data injection attack is essentially a cyber-attack with uncertain information due to the attackers lack of knowledge with respect to the power grid parameters because the attacker has limited physical access to electric facilities and limited resources to compromise meters. We mathematically formulated a method of identifying the most vulnerable locations to false data injection attack. Furthermore, we suggest minimum topology changes or phasor measurement units (PMUs) installation in the given power grids for mitigating such attacks and indicate a new security metrics that can compare different power grid topologies. The proposed metrics for performance is verified in standard IEEE 30-bus system. We show that the robustness of grids can be improved dramatically with minimum topology changes and low cost.

An Approach to a Quantitative Evaluation of U-Service Survivability Reflecting Cyber-terrorism (사이버테러를 고려한 U-Service 생존성의 정량적 평가 방안)

  • Kim, Sung-Ki
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.67-72
    • /
    • 2011
  • A system that provides a ubiquitous service is a networked system that has to overcome their circumstances that the service survivability is weak. the survivability of a networked system is defined as an ability of the system that can offer their services without interruption, regardless of whether components comprising the system are under failures, crashes, or physical attacks. This paper presents an approach that end users can obtain a quantitative evaluation of U-service survivability to reflect intended cyber attacks causing the networked system to fall into byzantine failures in addition to the definition of the survivability. In this paper, a Jini system based on wireless local area networks is used as an example for quantitative evaluation of U-service survivability. This paper also presents an continuous time markov chain (CTMC) Model for evaluation of survivability of U-service that a Jini system provides, and an approach to evaluate the survivability of the U-service as a blocking probability that end users can not access U-services.

A study on the Application of Effects-based Operation in Cyberspace (사이버공간에서의 효과중심작전 적용방안 연구)

  • Jang, Won-gu;Lee, Kyun-ho
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.221-230
    • /
    • 2020
  • The effects-based operation, which would reduce unnecessary efforts and meaningless sacrifices incurred during a war and simultaneously reach the will of the enemy leadership by strategic attacks, was discarded for the reason that it was difficult to apply it to military power except for airpower. However, cyberspace, which can be thoroughly logical and calculated, can be suitable for conducting effects-based operations. This study examined a way to carry out effects-based operations in such cyberspaces. It laid the foundation for overcoming the limitations of effects-based operations revealed in previous battle cases and executing the operations in cyber battlespace where the boundary between physical and cyberspaces gradually disappeared. Futhermore, it demonstrated that effects-based operations could be carried out in cyberspace by establishing a military strategy, which could conduct the operations through an analysis of previous cyber-attack cases.

Cyber-attack and Cybersecurity Design for a Smart Work System (스마트워크 시스템을 위한 사이버 공격 및 사이버 보안 설계)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.2
    • /
    • pp.207-214
    • /
    • 2019
  • The speed of technological development is increasing, and high-performance digital devices are spreading. Wired digital devices such as PCs have been optimized for existing wired environments, but needs are shifting away from the constraints of space and space to smart work that enables efficient work anywhere and anytime. The Smart Work System security design is needed to secure integrity and availability in the face of various security threats including physical threats (lost, stolen, and damaged terminals), technical threats (data theft, DoS: denial of service), and unauthorized access outside the wired environment. In this study, we analyzed smart work network systems, wired / wireless link systems, and digital smart devices. We also studied cyber-attack analysis and cybersecurity design methods for a Smart Work wired system and a future wireless system. This study will be used as basic data for building a secure Smart Work system.