A Graph-Based Technique for Securing the Distributed Cyber-Physical System Infrastructure

Sensors (Basel). 2023 Oct 26;23(21):8724. doi: 10.3390/s23218724.

Abstract

Spreading digitalization, flexibility, and autonomy of technological processes in cyber-physical systems entails high security risks corresponding to negative consequences of the destructive actions of adversaries. The paper proposes a comprehensive technique that represents a distributed functional cyber-physical system's infrastructure as graphs: a functional dependencies graph and a potential attacks graph. Graph-based representation allows us to provide dynamic detection of the multiple compromised nodes in the functional infrastructure and adapt it to rolling intrusions. The experimental modeling with the proposed technique has demonstrated its effectiveness in the use cases of advanced persistent threats and ransomware.

Keywords: adaptation; attack graph; cyber-physical system; functional dependencies graph; functional infrastructure; security; virtual isolated network.

Grants and funding

The research is funded by the Ministry of Science and Higher Education of the Russian Federation as part of the World-class Research Center program: Advanced Digital Technologies (contract No. 075-15-2022-311 dated 20 April 2022).