IT disaster recovery, cloud computing and information security news

New control architecture defends complex interconnected systems against cyber attacks

Researchers have developed a novel control architecture that defends complex, interconnected systems previously vulnerable to cyber attacks. Details were published in the IEEE/CAA Journal of Automatica Sinica.

Distributed systems are becoming more and more essential in everyday life. From power plants to autonomous vehicles, modular, interconnected systems, colloquially referred to as cyber-physical systems (CPS), provide crucial services and capabilities while being technologically cost effective.

While well-suited for many applications, these architectures are particularly vulnerable to cyber attacks. These systems typically operate via an open communication structure, allowing the individual components to rapidly communicate with each other in order to maintain stability and precise control. Due to the nature of this network topology and the frequent connections necessary for optimal operation, CPS are particularly vulnerable to denial of service (DoS) attacks. DoS attacks can infect a portion of a CPS and through the open communication structure subsequently cascade through the entire system, degrading overall performance and even causing total failure.

Through clever implementation of a set theory-based, novel control paradigm, researchers from Italy and Canada have found a way to mitigate these particularly damaging cyber attacks by implementing a ‘Leader-Follower’ approach. This approach uses one portion of the network to manage communications to the rest of the network. By assigning different roles to different portions of a CPS, the team was able to design an algorithm that can detect when and where a DoS attack occurs in the network. Upon detection, the algorithm is then able to cut off the infected portion of the network to prevent large-scale degradation while also dynamically adapting to the now-modified network structure. The algorithm can even assign new roles to different portions of the network in response to infection, increasing the robustness of the system against targeted DoS attacks.

"Organizing the distributed controllers in a Leader-Follower paradigm allows us to reduce the data exchange and provide the entire system with a modular capability so that it is possible to disconnect the attacked sub-subsystems without affecting the global operations" said Dr. Francesco Tedesco of the University of Calabria, corresponding author of the study. "Therefore, the success chance of the adversary attack can be significantly mitigated."

Tedesco goes on to say that the algorithm is not only secure; it is computationally efficient. "The required computational resources - CPUs power, memory resources and bandwidth requirements - are modest which clearly leads to a low economic impact."

As for what's next, the team is working to detect and apply more specific actions to counter cyber attacks based on predictive ideas, decreasing response time and further dampening the undesirable cascading effect of cyberattacks against interconnected systems.

Read the paper ‘A Resilient Control Strategy for Cyber-Physical Systems Subject to Denial of Service Attacks: A Leader-Follower Set-Theoretic Approach.



Want news and features emailed to you?

Signup to our free newsletters and never miss a story.

A website you can trust

The entire Continuity Central website is scanned daily by Sucuri to ensure that no malware exists within the site. This means that you can browse with complete confidence.

Business continuity?

Business continuity can be defined as 'the processes, procedures, decisions and activities to ensure that an organization can continue to function through an operational interruption'. Read more about the basics of business continuity here.

Get the latest news and information sent to you by email

Continuity Central provides a number of free newsletters which are distributed by email. To subscribe click here.