42 research outputs found

    A general real-time control approach of intrusion response for industrial automation systems

    Get PDF
    Intrusion response is a critical part of security protection. Compared with IT systems, industrial automation systems (IASs) have greater timeliness and availability demands. Real-time security policy enforcement of intrusion response is a challenge facing intrusion response for IASs. Inappropriate enforcement of the security policy can influence normal operation of the control system, and the loss caused by this security policy may even exceed that caused by cyberattacks. However, existing research about intrusion response focuses on security policy decisions and ignores security policy execution. This paper proposes a general, real-time control approach based on table-driven scheduling of intrusion response in IASs to address the problem of security policy execution. Security policy consists of a security service group, with each type of security service supported by a realization task set. Realization tasks from several task sets can be combined to form a response task set. In the proposed approach, first, a response task set is generated by a nondominated sorting genetic algorithm (GA) II with joint consideration of security performance and cost. Then, the system is reconfigured through an integrated scheduling scheme where system tasks and response tasks are mapped and scheduled together based on a GA. Furthermore, results from both numerical simulations and a real-application simulation show that the proposed method can implement the security policy in time with little effect on the system

    Cyber-physical system security for networked industrial processes

    No full text
    Cyber-physical systems (CPSs) are integrations of networks, computation and physical processes, where embedded computing devices continually sense, monitor, and control the physical processes through networks. Networked industrial processes combining internet, real-time computer control systems and industrial processes together are typical CPSs. With the increasingly frequent cyber-attack, security issues have gradually become key problems for CPSs. In this paper, a cyber-physical system security protection approach for networked industrial processes, i.e., industrial CPSs, is proposed. In this approach, attacks are handled layer by layer from general information technology (IT) security protection, to active protection, then to intrusion tolerance and physical security protection. The intrusion tolerance implemented in real-time control systems is the most critical layer because the real time control system directly affects the physical layer. This novel intrusion tolerance scheme with a closed loop defense framework takes into account the special requirements of industrial CPSs. To illustrate the effectiveness of the CPS security protection approach, a networked water level control system is described as a case study in the architecture analysis and design language (AADL) environment. Simulation results show that 3 types of injected attacks can be quickly defended by using the proposed protection approach

    Transient fault tolerant control for vehicle brake-by-wire systems

    No full text
    Brakebywire (BBW) systems that have nomechanical linkage between the brake pedal and the brake mechanism are expected to improve vehicle safety through better braking capability. However, transient faults in BBW systems can cause dangerous driving situations. Most existing research in this area focuses on the brake control mechanism, but very few studies try to solve the problem associated with transient fault propagation and evolution in the brake control system hierarchy. In this paper, a hierarchical transient fault tolerant scheme with embedded intelligence and resilient coordination for BBW system is proposed base don the analysis of transient fault propagation characteristics. In this scheme, most transient faults are tackled rapidly by a signature-based detection method at the node level, and the remaining transient faults, which cannot be detected directly at the node level and could degrade the system performance through fault propagation and evolution, are detected and recovered through function and structure models at the system level. To jointly accommodate these BBW transient faults at the system level, a sliding mode control algorithm and at ask reallocation strategy are designed. A simulation platform based on Architecture Analysis and Design Language(AADL) is established to evaluate the task reallocation strategy, and a hardware-in-the-loop simulation is carried out to validate the proposed scheme systematically. Experimental results show the effectiveness of this new approach to BBW systems

    Design and analysis of multimodel-based anomaly intrusion detection systems in industrial process automation

    No full text
    Industrial process automation is undergoing an increased use of information communication technologies due to high flexibility interoperability and easy administration. But it also induces new security risks to existing and future systems. Intrusion detection is a key technology for security protection. However, traditional intrusion detection systems for the IT domain are not entirely suitable for industrial process automation. In this paper, multiple models are constructed by comprehensively analyzing the multidomain knowledge of field control layers in industrial process automation, with consideration of two aspects: physics and information. And then, a novel multimodel-based anomaly intrusion detection system with embedded intelligence and resilient coordination for the field control system in industrial process automation is designed. In the system, an anomaly detection based on multimodel is proposed, and the corresponding intelligent detection algorithms are designed. Furthermore, to overcome the disadvantages of anomaly detection, a classifier based on an intelligent hidden Markov model, is designed to differentiate the actual attacks from faults. Finally, based on a combination simulation platform using optimized performance network engineering tool, the detection accuracy and the real-Time performance of the proposed intrusion detection system are analyzed in detail. Experimental results clearly demonstrate that the proposed system has good performance in terms of high precision and good real-Time capability

    Additional file 1: Figure S1. of FGF19/FGFR4 signaling contributes to the resistance of hepatocellular carcinoma to sorafenib

    No full text
    Representative images of sorafenib-induced ROS-associated cell apoptosis. HCC cell lines were treated with Sora (4 μM for MHCC97L, MHCC97H and SMCC-7721, and 6 μM for HepG2) over a series of time points. Apoptosis was determined by DAPI staining (A), and ROS generation was determined by DCFH-DA staining (B). (TIF 4418 kb

    Additional file 5: Figure S5. of FGF19/FGFR4 signaling contributes to the resistance of hepatocellular carcinoma to sorafenib

    No full text
    FGF19 knockdown in sorafenib-resistant HepG2 cells enhances ROS-associated apoptosis by sorafenib. (A) The knockdown effect of FGF19 in Sora-resistant HepG2 (HepG2 Sora-R) cells. (B–E) The effect of FGF19 knockdown on Sora-induced apoptosis in HepG2 Sora-R cells. FGF19 was knocked down in HepG2 Sora-R cells by lentiviral shRNA. FGF19 knockdown cells (shFGF19) and the control cells (shNC) were treated with different doses of Sora for 24 h. Cell viability was determined by MTS assays (B); apoptosis was determined by DAPI staining (C); ROS generation was determined by DCFH-DA staining (D), and O2 •− generation was determined by electrochemical biosensor (E). In A, expression levels were normalized against actin and reported relative to controls (fold changes shown below each lane). * p < 0.05; ** p < 0.01

    Additional file 4: Figure S4. of FGF19/FGFR4 signaling contributes to the resistance of hepatocellular carcinoma to sorafenib

    No full text
    Sorafenib-resistant MHCC97H cells highly resistant to sorafenib-induced apoptosis and ROS generation. (A–F) The effect of Sora-resistant cells on Sora-induced HCC cell apoptosis and ROS generation. Sora-naive (WT) and Sora-resistant MHCC97H (MHCC97H Sora-R) cells were exposed to 20 μM of Sora over a series of time points before analysis. Morphological changes of cells were observed under microscope (A); cell viability was determined by MTS assays (B); apoptosis was determined by DAPI staining (C) and Western blot of c-PARP (D); ROS generation was determined by DCFH-DA staining (E); and O2 •− generation was determined by electrochemical biosensor (F). In C, expression levels were normalized against actin and reported relative to controls (fold changes shown below each lane).* p < 0.05; ** p < 0.01

    Curcumin Improves the Tumoricidal Effect of Mitomycin C by Suppressing ABCG2 Expression in Stem Cell-Like Breast Cancer Cells

    No full text
    <div><p>Cancer cells with stem cell–like properties contribute to the development of resistance to chemotherapy and eventually to tumor relapses. The current study investigated the potential of curcumin to reduce breast cancer stem cell (BCSC) population for sensitizing breast cancer cells to mitomycin C (MMC) both in vitro and in vivo. Curcumin improved the sensitivity of paclitaxel, cisplatin, and doxorubicin in breast cancer cell lines MCF-7 and MDA-MB-231, as shown by the more than 2-fold decrease in the half-maximal inhibitory concentration of these chemotherapeutic agents. In addition, curcumin sensitized the BCSCs of MCF-7 and MDA-MB-231 to MMC by 5- and 15-fold, respectively. The BCSCs could not grow to the fifth generation in the presence of curcumin and MMC. MMC or curcumin alone only marginally reduced the BCSC population in the mammospheres; however, together, they reduced the BCSC population in CD44<sup>+</sup>CD24<sup>−/low</sup> cells by more than 75% (29.34% to 6.86%). Curcumin sensitized BCSCs through a reduction in the expression of ATP-binding cassette (ABC) transporters ABCG2 and ABCC1. We demonstrated that fumitremorgin C, a selective ABCG2 inhibitor, reduced BCSC survival to a similar degree as curcumin did. Curcumin sensitized breast cancer cells to chemotherapeutic drugs by reducing the BCSC population mainly through a reduction in the expression of ABCG2.</p></div
    corecore