Abstract
In this chapter, we will present a data-driven security framework for modeling the cross-domain security of cyber-physical production systems. Specifically, we will present a novel conditional generative adversarial network-based modeling approach to abstract and estimate the relations between the cyber and physical domains. Using this framework, we will demonstrate how we can determine if various security requirements such as confidentiality, availability, and integrity are met. We will analyze the proposed framework for performing a security analysis of a cyber-physical additive manufacturing system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
An MoC is a set of allowable operations used in computation and their respective costs (e.g., timing, performance, and memory overhead).
References
Monostori, L. (2014). Cyber-physical production systems: Roots, expectations and R&D challenges. In Procedia CIRP.
Cardenas, A., Amin, S., Sinopoli, B., Giani, A., Perrig, A., & Sastry, S. (2009). Challenges for securing cyber physical systems. In Workshop on future directions in cyber-physical systems security.
Washington Post. http://www.washingtonpost.com/wp-dyn/content/article/2008/06/05/AR2008060501958.html
Sztipanovits, J., Bapty, T., Neema, S., Howard, L., & Jackson, E. (2014). Openmeta: A model-and component-based design tool chain for cyber-physical systems. In From Programs to Systems. The Systems perspective in Computing (pp. 235–248). New York: Springer.
Akella, R., Tang, H., & McMillin, B. M. (2010). Analysis of information flow security in cyber–physical systems. International Journal of Critical Infrastructure Protection, 3(3), 157–173.
Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., et al. (2014). Generative adversarial nets. In Advances in Neural Information Processing Systems.
Mirza, M., & Osindero, S. (2014). Conditional generative adversarial nets. Preprint. arXiv:1411.1784.
Sturm, L., Williams, C., Camelio, J., White, J., & Parker, R. (2014). Cyber-physical vulnerabilities in additive manufacturing systems. Context.
Zeltmann, S. E., Gupta, N., Tsoutsos, N. G., Maniatakos, M., Rajendran, J., & Karri, R. (2016). Manufacturing and security challenges in 3D printing. JOM, 1–10. https://doi.org/10.1007/s11837-016-1937-7
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Rokka Chhetri, S., Al Faruque, M.A. (2020). Data-Driven Security Analysis Using Generative Adversarial Networks. In: Data-Driven Modeling of Cyber-Physical Systems using Side-Channel Analysis. Springer, Cham. https://doi.org/10.1007/978-3-030-37962-9_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-37962-9_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-37961-2
Online ISBN: 978-3-030-37962-9
eBook Packages: EngineeringEngineering (R0)