428
Views
3
CrossRef citations to date
0
Altmetric
Articles

Development of testbed for cyber-manufacturing security issues

, , , , , , , , & show all
Pages 302-320 | Received 06 Jun 2019, Accepted 20 Feb 2020, Published online: 15 Mar 2020

References

  • Alves, T. R., M. Buratto, F. M. De Souza, and T. V. Rodrigues. 2014. “OpenPLC: An Open Source Alternative to Automation.” Proceedings of the 4th IEEE Global Humanitarian Technology Conference, GHTC 2014, 585–589. doi:10.1109/GHTC.2014.6970342.
  • Barth, A., C. Jackson, and J. C. Mitchell. 2008. “Robust Defenses for Cross-Site Request Forgery.” Proceedings of the 15th ACM Conference on Computer and Communications Security CCS 08, 75. doi:10.1145/1455770.1455782.
  • Belikovetsky, S., M. Yampolskiy, J. Toh, and Y. Elovici. 2017b. “Cyber-Physical Attack with Additive Manufacturing.” In 11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17). http://arxiv.org/abs/1609.00133
  • Belikovetsky, S., Y. Solewicz, M. Yampolskiy, J. Toh, and Y. Elovici. 2017a. “Detecting Cyber-Physical Attacks in Additive Manufacturing Using Digital Audio Signing.” http://arxiv.org/abs/1705.06454
  • Boyle, R. J., and R. R. Panko. 2013. Corporate Computer Security. Upper Saddle River, NJ: Prentice Hall Press.
  • Bracho, A., C. Saygin, H. Wan, Y. Lee, and A. Zarreh. 2018. “A Simulation-Based Platform for Assessing the Impact of Cyber-Threats on Smart Manufacturing Systems.” Procedia Manufacturing 26: 1116–1127. doi:10.1016/j.promfg.2018.07.148.
  • Chhetri, S. R., A. Canedo, and M. A. Al Faruque. 2016. “KCAD: Kinetic Cyber-Attack Detection Method for Cyber-Physical Additive Manufacturing Systems.” Proceedings of the 35th International Conference on Computer-Aided Design - ICCAD ’16, 1–8. doi:10.1145/2966986.2967050.
  • Cintuglu, M. H., O. A. Mohammed, K. Akkaya, and A. S. Uluagac. 2017. “A Survey on Smart Grid Cyber-Physical System Testbeds.” IEEE Communications Surveys and Tutorials 19 (1): 446–464. doi:10.1109/COMST.2016.2627399.
  • Cuppens, F., and A. Miège. 2002 January. “Alert Correlation in a Cooperative Intrusion Detection Framework.” Proceedings - IEEE Symposium on Security and Privacy, 202–215. doi:10.1109/SECPRI.2002.1004372.
  • Du, W. 2019. Computer Security: A Hands-on Approach. Wenliang Du Publisher.
  • Ehrenfeld, J. M. 2017. “WannaCry, Cybersecurity and Health Information Technology: A Time to Act.” Journal of Medical Systems 41 (7): 10916. doi:10.1007/s10916-017-0752-1.
  • Flanagan, C., and S. N. Freund. 2001. “Detecting Race Conditions in Large Programs.” In Proceedings of the 2001 ACM SIGPLAN-SIGSOFT, 90–96. doi:10.1145/379605.379687.
  • Gates, D. 2018. “Boeing Hit by WannaCry Virus, but Says Attack Caused Little Damage.” The Seattle Times. https://www.seattletimes.com/business/boeing-aerospace/boeing-hit-by-wannacry-virus-fears-it-could-cripple-some-jet-production/
  • Goldenberg, N., and A. Wool. 2013. “Accurate Modeling of Modbus/TCP for Intrusion Detection in SCADA Systems.” International Journal of Critical Infrastructure Protection 6 (2): 63–75. doi:10.1016/j.ijcip.2013.05.001.
  • Gupta, N., K. Srivastava, and A. Sharma. 2016. “Reducing False Positive in Intrusion Detection System: A Survey.”International Journal of Computer Science and Information Technologies 7 (3): 1600–1603. https://pdfs.semanticscholar.org/4a2c/0b466170af931e75ef5a0f03805807cebf2e.pdf
  • IBM-Security. 2017. “Security Trends in the Manufacturing Industry.” IBM. https://www-01.ibm.com/common/ssi/cgi-bin/ssialias?htmlfid=SEL03123USEN&
  • Jung, J. H., J. Y. Kim, H. C. Lee, and J. H. Yi. 2013. “Repackaging Attack on Android Banking Applications and Its Countermeasures.” Wireless Personal Communications 73 (4): 1421–1437. doi:10.1007/s11277-013-1258-x.
  • Kemmerer, R. A., and G. Vigna. 2002. “Intrusion Detection: A Brief History and Overview.” Computer 35 (4): supl27–30. doi:10.1109/MC.2002.1012428.
  • Khamphakdee, N., N. Benjamas, and S. Saiyod. 2014 May. “Improving Intrusion Detection System Based on Snort Rules for Network Probe Attack Detection.” 2014 2nd International Conference on Information and Communication Technology, ICoICT 2014, 69–74. doi:10.1109/ICoICT.2014.6914042.
  • Lab, K. 2017. “The State of Industrial Cybersecurity 2017.” Business Advantage Group Limited.
  • Langner, R. 2011. “Stuxnet: Dissecting a Cyberwarfare Weapon.” IEEE Security and Privacy 9 (3): 49–51. doi:10.1109/MSP.2011.67.
  • Lee, R. M., M. J. Assante, and T. Conway. 2014. “German Steel Mill Cyber Attack.” Industrial Control Systems, 1–15. http://ics3.sans.org/media/ICS-CPPE-case-Study-2-German-Steelworks_Facility.pdf
  • Leens, F. 2009. “An Introduction to I2C and SPI Protocols.” IEEE Instrumentation and Measurement Magazine 12 (1): 8–13. doi:10.1109/MIM.2009.4762946.
  • Lippmann, R. P., D. J. Fried, I. Graf, J. W. Haines, K. R. Kendall, D. McClung, D. Weber, S. E. Webster, D. Wyschogrod, R. K. Cunningham, and M. A, Zissman. 2000. “Evaluating Intrusion Detection Systems: The 1998 DARPA off-Line Intrusion Detection Evaluation.” Proceedings - DARPA Information Survivability Conference and Exposition, DISCEX 2000, 2014 August 2, 12–26. doi:10.1109/DISCEX.2000.821506.
  • Mahoney, M. V., and P. K. Chan. 2003. “An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection.” In Proceedings of the Sixth International Symposium on Recent Advances in Intrusion Detection, 220–237. 2820 (Ll). doi:10.1007/b13476.
  • Mary, A. C. 2015. “Shellshock Attack on Linux Systems – Bash.” International Research Journal of Engineering and Technology 2: 1322–1325.
  • Minnick, J. 2016. “The Biggest Cybersecurity Problems Facing Manufacturing In 2016.” http://www.mbtmag.com/article/2016/01/biggest-cybersecurity-problems-facing-manufacturing-2016
  • Moore, S. B., J. Gatlin, S. Belikovetsky, M. Yampolskiy, W. E. King, and Y. Elovici. 2017. “Power Consumption-Based Detection of Sabotage Attacks in Additive Manufacturing,” 1–19. http://arxiv.org/abs/1709.01822
  • National Research Council. 2014. At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues. Washington, D.C: National Academies Press.
  • NIST. 2016. “Smart Manufacturing Systems (SMS) Test Bed.” National Institute of Standards and Technology. https://www.nist.gov/laboratories/tools-instruments/smart-manufacturing-systems-sms-test-bed
  • Pan, Y., J. White, D. Schmidt, A. Elhabashy, L. Sturm, J. Camelio, and C. Williams. 2017. “Taxonomies for Reasoning about Cyber-Physical Attacks in IoT-Based Manufacturing Systems.” International Journal of Interactive Multimedia and Artificial Intelligence 4 (3): 45. doi:10.9781/ijimai.2017.437.
  • Qassim, Q. S., N. Jamil, R. Jidin, M. E. Rusli, M. N. Ahmad Zawawi, M. Z. Jamaludin, M. R. Z’aba, and W. A. W. Kamarulzaman. 2018. “A Review: Towards Practical Attack Taxonomy for Industrial Control Systems.” International Journal of Engineering and Technology(UAE) 7 (2.14 Speci): 145–152. doi:10.14419/ijet.v7i2.14.12815.
  • Song, J., and Y. B. Moon. 2019. “A Secure Cyber-Manufacturing System Augmented by the Blockchain.” In Proceedings of the ASME 2019 International Mechanical Engineering Congress and Exposition, 1–8, Salt Lake City, UT.
  • Song, Z., and Y. Moon. 2016a. “Assessing Sustainability Benefits of Cybermanufacturing Systems.” International Journal of Advanced Manufacturing Technology 1–18. doi:10.1007/s00170-016-9428-0.
  • Song, Z., and Y. B. Moon. 2016b. “Performance Analysis of CyberManufacturing Systems: A Simulation Study.” IFIP Advances in Information and Communication Technology 492 (May): 592–605. doi:10.1007/978-3-319-54660-5_53.
  • Stacy, C. 2018. “‘Big Red Flag’: Automakers’ Trade Secrets Exposed in Data Leak - the New York Times.” The New York Times. https://www.nytimes.com/2018/07/20/business/suppliers-data-leak-automakers.html
  • Sturm, L. D., C. B. Williams, J. A. Camelio, J. White, and R. Parker. 2014. “Cyber-Physical Vulnerabilities in Additive Manufacturing Systems.” In International Solid Freeform Fabrication Symposium, 951–963. http://sffsymposium.engr.utexas.edu/sites/default/files/2014-075-Sturm.pdf
  • Timofte, J. 2008. “Intrusion Detection Using Open Source Tools.” Informatica Economica Journal XII 2 2 (2): 75–79. http://www.revistaie.ase.ro/content/46/Timofte.pdf
  • Turner, H., J. White, J. A. Camelio, C. Williams, B. Amos, and R. Parker. 2015. “Bad Parts: Are Our Manufacturing Systems at Risk of Silent Cyberattacks?.” IEEE Security and Privacy 13 (3): 40–47. doi:10.1109/MSP.2015.60.
  • Valeur, F., G. Vigna, C. Kruegel, and R. A. Kemmerer. 2004. “A Comprehensive Approach to Intrusion Detection Alert Correlation.” IEEE Transactions on Dependable and Secure Computing 1 (3): 146–168. doi:10.1109/TDSC.2004.21.
  • Vincent, H., L. Wells, P. Tarazaga, and J. Camelio. 2015. “Trojan Detection and Side-Channel Analyses for Cyber-Security in Cyber-Physical Manufacturing Systems.” Procedia Manufacturing 1: 77–85. doi:10.1016/j.promfg.2015.09.065.
  • Wan, J., J. Li, M. Imran, and D. Li. 2019. “A Blockchain-Based Solution for Enhancing Security and Privacy in Smart Factory.” IEEE Transactions on Industrial Informatics 15 (6): 3652–3660. doi:10.1109/TII.2019.2894573.
  • Wu, M., H. Zhou, L. L. Lin, B. Silva, Z. Song, J. Cheung, and Y. B. Moon. 2016. “Detecting Attacks in Cyber Manufacturing Systems: Additive Manufacturing Example.” In the 3rd International Conference on Mechanical, Materials and Manufacturing, 1–4, October 26–29, Savannah, GA.
  • Wu, M., V. V. Phoha, Y. B. Moon, and A. K. Belman. 2016. “Detecting Malicious Defects in 3D Printing Process Using Machine Learning and Image Classification.” In Proceedings of the ASME 2016 International Mechanical Engineering Congress and Exposition, 4–9. Phoenix, Arizona. doi:10.3389/fncom.2016.00004.
  • Wu, M., and Y. B. Moon. 2017a. “DACDI (Define, Audit, Correlate, Disclose, and Improve) Framework to Address Cyber-Manufacturing Attacks and Intrusions.” Manufacturing Letters. doi:10.1016/j.mfglet.2017.12.009.
  • Wu, M., and Y. B. Moon. 2017b. “Taxonomy of Cross-Domain Attacks on CyberManufacturing System.” Procedia Computer Science 114: 367–374. doi:10.1016/j.procs.2017.09.050.
  • Wu, M., and Y. B. Moon. 2018. “Taxonomy for Secure CyberManufacturing System.” In Proceedings of the ASME 2018 International Mechanical Engineering Congress and Exposition, 1–9. Pittsburgh, PA.
  • Wu, M., Z. Song, and Y. B. Moon. 2019. “Detecting Cyber-Physical Attacks in CyberManufacturing Systems with Machine Learning Methods.” Journal of Intelligent Manufacturing 30 (3): 1111–1123. doi:10.1007/s10845-017-1315-5.
  • Yampolskiy, M., A. Skjellum, M. Kretzschmar, R. A. Overfelt, K. R. Sloan, and A. Yasinsac. 2016. “Using 3D Printers as Weapons.” International Journal of Critical Infrastructure Protection 14: 58–71. doi:10.1016/j.ijcip.2015.12.004.
  • Yampolskiy, M., W. E. King, J. Gatlin, S. Belikovetsky, A. Brown, A. Skjellum, and Y. Elovici. 2018. “Security of Additive Manufacturing: Attack Taxonomy and Survey.” Additive Manufacturing 21 (March): 431–457. doi:10.1016/j.addma.2018.03.015.
  • Yang, W., and S. Takakuwa. 2017 December 3–6. “Simulation-Based Dynamic Shop Floor Scheduling for a Flexible Manufacturing System in the Industry 4.0 Environment.” 2017 Winter Simulation Conference (WSC), Vol. 6, 3908–3916, Las Vegas, NV.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.