Subscribe free to our newsletters via your
. Military Space News .




CYBER WARS
New Software Spots, Isolates Cyber-Attacks to Protect Networked Control Systems
by Staff Writers
Raleigh NC (SPX) May 16, 2013


File image.

Researchers from North Carolina State University have developed a software algorithm that detects and isolates cyber-attacks on networked control systems - which are used to coordinate transportation, power and other infrastructure across the United States.

Networked control systems are essentially pathways that connect and coordinate activities between computers and physical devices. For example, the systems that connect temperature sensors, heating systems and user controls in modern buildings are networked control systems.

But, on a much larger scale, these systems are also becoming increasingly important to national infrastructure, such as transportation and power. And, because they often rely on wireless or Internet connections, these systems are vulnerable to cyber-attacks. "Flame" and "Stuxnet" are examples of costly, high-profile attacks on networked control systems in recent years.

As networked control systems have grown increasingly large and complex, system designers have moved away from having system devices - or "agents" - coordinate their activities through a single, centralized computer hub, or brain.

Instead, designers have created "distributed network control systems" (D-NCSs) that allow all of the system agents to work together, like a bunch of mini-brains, to coordinate their activities. This allows the systems to operate more efficiently. And now these distributed systems can also operate more securely.

NC State researchers have developed a software algorithm that can detect when an individual agent in a D-NCS has been compromised by a cyber-attack. The algorithm then isolates the compromised agent, protecting the rest of the system and allowing it to continue functioning normally.

This gives D-NCSs resilience and security advantages over systems that rely on a central computer hub, because the centralized design means the entire system would be compromised if the central computer is hacked.

"In addition, our security algorithm can be incorporated directly into the code used to operate existing distributed control systems, with minor modifications," says Dr. Mo-Yuen Chow, a professor of electrical and computer engineering at NC State and co-author of a paper on the work. "It would not require a complete overhaul of existing systems."

"We have demonstrated that the system works, and are now moving forward with additional testing under various cyber-attack scenarios to optimize the algorithm's detection rate and system performance," says Wente Zeng, a Ph.D. student at NC State and lead author of the paper.

The paper, "Convergence and Recovery Analysis of the Secure Distributed Control Methodology for D-NCS," will be presented at the IEEE International Symposium on Industrial Electronics, May 28-31, in Taipei, Taiwan. The research was funded by the National Science Foundation.

.


Related Links
North Carolina State University
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Beefing Up Cyber Protections for U.S. Critical Infrastructure
Falls Church VA (SPX) May 16, 2013
Northrop Grumman has signed a memorandum of agreement with the Department of Homeland Security (DHS) that will enable the expansion of cybersecurity protections for the nation's critical infrastructure. Northrop Grumman is now starting the security accreditation process which is required before approval to operate as a commercial services provider under the DHS Enhanced Cybersecurity Servi ... read more


CYBER WARS
U.S. seeks $220 million for Israel missile defense

Pentagon requests more funding for Israel's 'Iron Dome'

Lockheed Martin PAC-3 Missile Intercepts and Destroys Tactical Ballistic Missile in New Test

Japan's missile defence plan: some facts

CYBER WARS
Lockheed Martin and the MDA Conduct Test of New Air-Launched Missile Target Prototype

ESSM intercept of high-diving threat proves expanded defensive capability

Israel 'determined' to halt Syria missile deal: minister

Raytheon, US Army complete AI3 control vehicle tests

CYBER WARS
Raytheon delivers electronic jamming capability for Gray Eagle UAS

Northrop Grumman, U.S. Navy Catapult X-47B From Carrier Into History Books

Germany cancels 'Euro Hawk' drone programme

US drone makes first catapult launch off a carrier: Navy

CYBER WARS
US Navy and Lockheed Martin Deliver Newest Secure Communications Satellite for Mobile Users

Harris picks up Brunei order for Falcon III

Department of Defense looking to allow Apple, Samsung devices

DARPA Seeks Clean-Slate Ideas For Mobile Ad Hoc Networks

CYBER WARS
Lockheed Martin's JASSM Extended Range Completes IOT and E Flight Testing

Outside View: Whetting the Spearhead

Brazil picks suppliers for electronic border fence

Blueprints for 3D handgun take refuge in Pirate Bay

CYBER WARS
Outside View: Pentagon's most perplexing challenge: People

Iran plays down US snub of UN disarmament body

Hagel announces unpaid leave for Pentagon civilians

Bulgaria launches new attempt to privatise defence group VMZ

CYBER WARS
Chinese general says Okinawa not Japan's

China's Li heads for South Asia, Europe

Dalai Lama warns of power in hands of few

'Substance' partially closes US consulate in China: official

CYBER WARS
First precise MEMS output measurement technique unveiled

Going negative pays for nanotubes

Researchers develop unique method for creating uniform nanoparticles

Dark field imaging of rattle-type silica nanorattles coated gold nanoparticles in vitro and in vivo




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement