146 research outputs found

    Intrusion Detection for Cyber-Physical Attacks in Cyber-Manufacturing System

    Get PDF
    In the vision of Cyber-Manufacturing System (CMS) , the physical components such as products, machines, and tools are connected, identifiable and can communicate via the industrial network and the Internet. This integration of connectivity enables manufacturing systems access to computational resources, such as cloud computing, digital twin, and blockchain. The connected manufacturing systems are expected to be more efficient, sustainable and cost-effective. However, the extensive connectivity also increases the vulnerability of physical components. The attack surface of a connected manufacturing environment is greatly enlarged. Machines, products and tools could be targeted by cyber-physical attacks via the network. Among many emerging security concerns, this research focuses on the intrusion detection of cyber-physical attacks. The Intrusion Detection System (IDS) is used to monitor cyber-attacks in the computer security domain. For cyber-physical attacks, however, there is limited work. Currently, the IDS cannot effectively address cyber-physical attacks in manufacturing system: (i) the IDS takes time to reveal true alarms, sometimes over months; (ii) manufacturing production life-cycle is shorter than the detection period, which can cause physical consequences such as defective products and equipment damage; (iii) the increasing complexity of network will also make the detection period even longer. This gap leaves the cyber-physical attacks in manufacturing to cause issues like over-wearing, breakage, defects or any other changes that the original design didn’t intend. A review on the history of cyber-physical attacks, and available detection methods are presented. The detection methods are reviewed in terms of intrusion detection algorithms, and alert correlation methods. The attacks are further broken down into a taxonomy covering four dimensions with over thirty attack scenarios to comprehensively study and simulate cyber-physical attacks. A new intrusion detection and correlation method was proposed to address the cyber-physical attacks in CMS. The detection method incorporates IDS software in cyber domain and machine learning analysis in physical domain. The correlation relies on a new similarity-based cyber-physical alert correlation method. Four experimental case studies were used to validate the proposed method. Each case study focused on different aspects of correlation method performance. The experiments were conducted on a security-oriented manufacturing testbed established for this research at Syracuse University. The results showed the proposed intrusion detection and alert correlation method can effectively disclose unknown attack, known attack and attack interference that causes false alarms. In case study one, the alarm reduction rate reached 99.1%, with improvement of detection accuracy from 49.6% to 100%. The case studies also proved the proposed method can mitigate false alarms, detect attacks on multiple machines, and attacks from the supply chain. This work contributes to the security domain in cyber-physical manufacturing systems, with the focus on intrusion detection. The dataset collected during the experiments has been shared with the research community. The alert correlation methodology also contributes to cyber-physical systems, such as smart grid and connected vehicles, which requires enhanced security protection in today’s connected world

    A new algorithm for computation of horizontal-well pressure in Laplace domain

    Get PDF
    The effect of wellbore pressure drop on horizontal well pressure response is relatively important when flow velocity is high or the surface of horizontal wellbore is rough. The objective of this study is to develop a stable and robust algorithm in Laplace domain to analyze horizontal-well pressure with pressure drop along the wellbore. Based on the novel definitions of horizontal well permeability and conductivity, the equation of fluid flow along a horizontal wellbore with pressure drop has the same form as that of fluid flow in a varying-conductivity fracture. A new dimension transformation has been used to change the varying-conductivity model into a constant-conductivity model, and then an iterative procedure has been introduced to obtain the pressure. This algorithm is developed in Laplace domain and eliminates the need for computations in the time domain. Besides, the skin effect and wellbore storage is easily to be taken into consideration.Cited as: Wu, M., Luo, W., Wang, X. A new algorithm for computation of horizontal-well pressure in Laplace domain. Advances in Geo-Energy Research, 2018, 2(4): 393-403, doi: 10.26804/ager.2018.04.0

    Phase Structures and Transitions of Born-Infeld Black Holes in a Grand Canonical Ensemble

    Full text link
    To make a Born-Infeld (BI) black hole thermally stable, we consider two types of boundary conditions, i.e., the asymptotically anti-de Sitter (AdS) space and a Dirichlet wall placed in the asymptotically flat space. The phase structures and transitions of these two types of BI black holes, namely BI-AdS black holes and BI black holes in a cavity, are investigated in a grand canonical ensemble, where the temperature and the potential are fixed. For BI-AdS black holes, the globally stable phases can be the thermal AdS space. For small values of the potential, there is a Hawking-Page-like first order phase transition between the BI-AdS black holes and the thermal-AdS space. However, the phase transition becomes zeroth order when the values of the potential are large enough. For BI black holes in a cavity, the globally stable phases can be a naked singularity or an extremal black hole with the horizon merging with the wall, which both are on the boundaries of the physical parameter region. The thermal flat space is never globally preferred. Besides a first order phase transition, there is a second order phase transition between the globally stable phases. Thus, it shows that the phase structures and transitions of BI black holes with these two different boundary conditions have several dissimilarities.Comment: 29 pages, 22 figures. arXiv admin note: text overlap with arXiv:1901.0621

    Detecting Attacks in CyberManufacturing Systems: Additive Manufacturing Example

    Full text link
    CyberManufacturing System is a vision for future manufacturing where physical components are fully integrated with computational processes in a connected environment. However, realizing the vision requires that its security be adequately ensured. This paper presents a vision-based system to detect intentional attacks on additive manufacturing processes, utilizing machine learning techniques. Particularly, additive manufacturing systems have unique vulnerabilities to malicious attacks, which can result in defective infills but without affecting the exterior. In order to detect such infill defects, the research uses simulated 3D printing process images as well as actual 3D printing process images to compare accuracies of machine learning algorithms in classifying, clustering and detecting anomalies on different types of infills. Three algorithms - (i) random forest, (ii) k nearest neighbor, and (iii) anomaly detection - have been adopted in the research and shown to be effective in detecting such defects

    Architecture engineering of carbonaceous anodes for high‐rate potassium‐ion batteries

    Get PDF
    The limited lithium resource in earth's crust has stimulated the pursuit of alternative energy storage technologies to lithium‐ion battery. Potassium‐ion batteries (KIBs) are regarded as a kind of promising candidate for large‐scale energy storage owing to the high abundance and low cost of potassium resources. Nevertheless, further development and wide application of KIBs are still challenged by several obstacles, one of which is their fast capacity deterioration at high rates. A considerable amount of effort has recently been devoted to address this problem by developing advanced carbonaceous anode materials with diverse structures and morphologies. This review presents and highlights how the architecture engineering of carbonaceous anode materials gives rise to high‐rate performances for KIBs, and also the beneficial conceptions are consciously extracted from the recent progress. Particularly, basic insights into the recent engineering strategies, structural innovation, and the related advances of carbonaceous anodes for high‐rate KIBs are under specific concerns. Based on the achievements attained so far, a perspective on the foregoing, and proposed possible directions, and avenues for designing high‐rate anodes, are presented finally

    Review of exploration and production technology of natural gas hydrate

    Get PDF
    Natural gas hydrate is an ice-like substance which is sometimes called “combustible ice” since it can literally be lighted on ïŹre and burned as fuel. Natural gas hydrate is characterized by widespread distribution, large reserves and little pollution. This paper introduced the distributions of hydrate, hydrate reserves and properties of hydrate. The main exploration methods, such as geophysical exploration and geochemical exploration have been presented. In addition, the main production techniques of natural gas hydrate including depressurization, thermal stimulation and chemical injection have been summed up. Finally, the challenges and outlooks of natural gas hydrate production have been proposed.Cited as: Cui, Y., Lu, C., Wu, M., Peng, Y., Yao, Y., Luo, W. Review of exploration and production technology of natural gas hydrate. Advances in Geo-Energy Research, 2018, 2(1): 53-62, doi: 10.26804/ager.2018.01.0

    Comparison of Non-human Primate versus Human Induced Pluripotent Stem Cell-Derived Cardiomyocytes for Treatment of Myocardial Infarction.

    Get PDF
    Non-human primates (NHPs) can serve as a human-like model to study cell therapy using induced pluripotent stem cell-derived cardiomyocytes (iPSC-CMs). However, whether the efficacy of NHP and human iPSC-CMs is mechanistically similar remains unknown. To examine this, RNU rats received intramyocardial injection of 1 × 107 NHP or human iPSC-CMs or the same number of respective fibroblasts or PBS control (n = 9-14/group) at 4 days after 60-min coronary artery occlusion-reperfusion. Cardiac function and left ventricular remodeling were similarly improved in both iPSC-CM-treated groups. To mimic the ischemic environment in the infarcted heart, both cultured NHP and human iPSC-CMs underwent 24-hr hypoxia in vitro. Both cells and media were collected, and similarities in transcriptomic as well as metabolomic profiles were noted between both groups. In conclusion, both NHP and human iPSC-CMs confer similar cardioprotection in a rodent myocardial infarction model through relatively similar mechanisms via promotion of cell survival, angiogenesis, and inhibition of hypertrophy and fibrosis
    • 

    corecore