Security and Defense of Cyber-Physical Systems
1Chengdu University of Information Technology, Chengdu, China
2National University of Singapore, Singapore
3University of Electronic Science and Technology of China, Chengdu, China
Security and Defense of Cyber-Physical Systems
Description
Cyber-physical systems (CPS), relate to a set of physical devices (‘hardware’) controlled by computer-based algorithms, mostly software, and are becoming increasingly important in information technology. However, CPS are prone to various cyber and physical security threats, attacks and challenges, due to their heterogeneous nature, reliance on private and sensitive data, and large-scale deployment. In recent years, common network attacks have assaulted both the software and hardware of CPS as well as data in systems by utilizing the vulnerability and security defects of a network. At the same time, advanced attackers can adopt sophisticated viruses, worms, and other malicious programs and disguise these attacks. Attack initiators may use various novel attack methods, including phishing attacks, water hole attacks etc., in addition to social engineering methods, and in doing so, breach security defense devices deployed in a system, and gradually gain access to an organization.
After penetrating a network, many attackers remain dormant for a long time and collect various information until crucial intelligence has been found. These kinds of behaviors can cause significant economic losses to individuals, companies, and countries. Customized advanced attacks pose an even greater risk and may target cover energy, electricity, finance, national defense, other infrastructure related to a national economy and people’s livelihood, and even a country’s core interests. These attacks threaten to undermine existing international partnerships. In conclusion, advanced attacks, multiple attacks, joint attacks, and customized attack detection in CPS are generating increasing interest in academia.
Thus, this Special Issue is dedicated to showcasing original research and critical articles focusing on innovations and improvements in the areas of advanced attacks, system security, privacy, and trust technology in CPS. We especially welcome submissions relating to detection and defense schemes based on artificial intelligence and big data, including but not limited to theory, design, modeling, configuration, representation, data processing, data analysis, and their applications in CPS. Both original research and review articles are welcome.
Potential topics include but are not limited to the following:
- Evolvable and scalable CPS architecture
- Trustworthiness and convergence of large-scale routing in CPS
- Complex autonomous network management of cross-domain access by CPS users
- Network intrusion detection and information transmission security
- Defense technology of intelligent sensor systems
- Artificial intelligence technology for improvement of network security and efficiency
- Collaborative learning for network service optimization
- Cyberspace data security and privacy protection
- Anonymous communication systems
- Network protocol vulnerability analysis and mining
- Host-based intrusion detection system IDS