Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Adaptive Framework for Security Attack Monitoring in Cyber-Physical Systems
Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
2025 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

The dissertation presents an adaptive security framework for cyber-physicalsystems (CPSs) to address the growing challenges posed by evolving cyberattacks. CPSs rely on seamless integration between computational and physical components, making security breaches potentially catastrophic. Traditional methods often fail to keep pace with rapidly advancing threats. The proposed framework leverages real-time monitoring and adaptive model predictive control to dynamically adjust defences based on the threat type, frequency, and severity. By forecasting the impact of various strategies, the system identifies optimal responses to enhance resilience and mitigate risks. The approach strengthens CPS security by adapting to the continuously evolving threat landscape and safeguarding system integrity and functionality.

Place, publisher, year, edition, pages
Stockholm: Department of Computer and Systems Sciences, Stockholm University , 2025. , p. 118
Series
Report Series / Department of Computer & Systems Sciences, ISSN 1101-8526 ; 25-007
Keywords [en]
Cyber-Physical Systems, Adaptive Security, Cybersecurity, Cyber Threat Intelligence, Critical Infrastructure Protection, Resilience Engineering
National Category
Computer Sciences Software Engineering Security, Privacy and Cryptography
Research subject
Computer and Systems Sciences
Identifiers
URN: urn:nbn:se:su:diva-245872ISBN: 978-91-8107-364-5 (print)ISBN: 978-91-8107-365-2 (electronic)OAI: oai:DiVA.org:su-245872DiVA, id: diva2:1991274
Public defence
2025-09-30, L30, NOD-huset, Borgarfjordsgatan 12 and online via Zoom, public link is available at the department website, Kista, 14:00 (English)
Opponent
Supervisors
Available from: 2025-09-05 Created: 2025-08-22 Last updated: 2025-08-29Bibliographically approved
List of papers
1. Towards Security Attack Event Monitoring for Cyber Physical-Systems
Open this publication in new window or tab >>Towards Security Attack Event Monitoring for Cyber Physical-Systems
2023 (English)In: Proceedings of the 9th International Conference on Information Systems Security and Privacy (ICIISSP 2023) / [ed] Paolo Mori; Gabriele Lenzini; Steven Furnell, SciTePress , 2023, p. 723-733Conference paper, Published paper (Refereed)
Abstract [en]

In today’s software systems, security is one of the major issues that need to be considered when designing Cyber Physical-Systems(CPS). CPS are engineered systems built from, and depend upon, the seamless integration of computational algorithms and physical components. Security breaches are on the rise, and CPS are challenged by catastrophic damage, which resulted in billions of losses. Security Solutions to the Cyber Physical-Systems that we have are likely to become obsolete. Even though security agents issue new sets of vulnerability indicators and patches to address the security breach, these vulnerability indicators change over time, which is a perpetual process. We argue that any security solution for the Cyber Physical-Systems should be adaptive, based on the type of attacks and their frequency. The security solution should monitor its environment continuously to defend itself from a cyber-attack by modifying its defensive mechanism. We propose a framework for modelling, analyzing and monitoring security attacks (events) in the social, cyber and physical infrastructure realms of CPS. The framework is evaluated using security attack scenarios from a recognized security knowledge repository.

Place, publisher, year, edition, pages
SciTePress, 2023
Series
Proceedings of the International Conference on Information Systems Security and Privacy (ICISSP), E-ISSN 2184-4356
Keywords
Cyber Physical-Systems, Industrial Internet of Things, Security Requirements, Goal Model, Attack Pattern, Domain Assumption
National Category
Computer Sciences
Research subject
Computer and Systems Sciences
Identifiers
urn:nbn:se:su:diva-222629 (URN)10.5220/0011803400003405 (DOI)2-s2.0-85176324274 (Scopus ID)978-989-758-624-8 (ISBN)
Conference
The 9th International Conference on Information Systems Security and Privacy (ICIISSP 2023), 22–24 February 2023, Lisbon, Portugal
Available from: 2023-10-13 Created: 2023-10-13 Last updated: 2025-08-22Bibliographically approved
2. Evaluation of Asfalia, a Security Attack Event Monitoring Framework
Open this publication in new window or tab >>Evaluation of Asfalia, a Security Attack Event Monitoring Framework
2024 (English)In: Procedia Computer Science, E-ISSN 1877-0509, Vol. 237, p. 793-802Article in journal (Refereed) Published
Abstract [en]

Cyber security has been a growing concern for large organizations, especially financial and governmental institutions, as security breaches in the systems they depend on have repeatedly resulted in losses of billions of dollars per year, and this cost is on the rise. A primary reason for these breaches is that the systems in question are cyber-physical - a mix of people, processes, technology, and infrastructure. However, existing security solutions for cyber-physical systems are likely to become obsolete; even though security agents issue new sets of vulnerability indicators and patches to address security breaches, these vulnerability indicators change over time, which is a never-ending process. To tackle this problem, a multi-realm security attack event monitoring framework was proposed to monitor, model, and analyse security events in social(business process), cyber, and physical infrastructure components of cyber-physical systems. In this paper, we evaluate this security attack event monitoring framework. The evaluation was performed by using a large-scale case study on a medical emergency response system.

 

Place, publisher, year, edition, pages
Elsevier B.V., 2024
Keywords
attack pattern, cyber physical-systems, cyber security, Domain Assumption, industrial Internet of Things, runtime model
National Category
Computer Systems
Identifiers
urn:nbn:se:su:diva-236089 (URN)10.1016/j.procs.2024.05.167 (DOI)2-s2.0-85195398483 (Scopus ID)
Conference
International conference on industry sciences and computer science innovation
Available from: 2024-11-28 Created: 2024-11-28 Last updated: 2025-08-22Bibliographically approved
3. Security Attack Behavioural Pattern Analysis for Critical Service Providers
Open this publication in new window or tab >>Security Attack Behavioural Pattern Analysis for Critical Service Providers
2024 (English)In: Journal of Cybersecurity and Privacy, E-ISSN 2624-800X, Vol. 4, no 1, p. 55-75Article in journal (Refereed) Published
Abstract [en]

Identifying potential system attacks that define security requirements is crucial to building secure cyber systems. Moreover, the attack frequency makes their subsequent analysis challenging and arduous in cyber–physical systems (CPS). Since CPS include people, organisations, software, and infrastructure, a thorough security attack analysis must consider both strategic (social and organisa- tional) aspects and technical (software and physical infrastructure) aspects. Studying cyberattacks and their potential impact on internal and external assets in cyberspace is essential for maintaining cyber security. The importance is reflected in the work of the Swedish Civil Contingencies Agency (MSB), which receives IT incident reports from essential service providers mandated by the NIS direc- tive of the European Union and Swedish government agencies. To tackle this problem, a multi-realm security attack event monitoring framework was proposed to monitor, model, and analyse security events in social(business process), cyber, and physical infrastructure components of cyber–physical systems. This paper scrutinises security attack patterns and the corresponding security solutions for Swedish government agencies and organisations within the EU’s NIS directive. A pattern analysis was conducted on 254 security incident reports submitted by critical service providers. A total of five critical security attacks, seven vulnerabilities (commonly known as threats), ten attack patterns, and ten parallel attack patterns were identified. Moreover, we employed standard mitigation techniques obtained from recognised repositories of cyberattack knowledge, namely, CAPEC and Mitre, in order to conduct an analysis of the behavioural patterns.

Keywords
Security pattern, IT-incidents, societal safety, cyber–physical systems, essential services, NIS-directive, socio-technical system, cyberattack
National Category
Computer Sciences
Research subject
Computer and Systems Sciences
Identifiers
urn:nbn:se:su:diva-225867 (URN)10.3390/jcp4010004 (DOI)2-s2.0-85188965873 (Scopus ID)
Note

Special Issue, Secure Software Engineering

Available from: 2024-01-24 Created: 2024-01-24 Last updated: 2025-08-22Bibliographically approved
4. An Automated Adaptive Security Framework for Cyber-Physical Systems
Open this publication in new window or tab >>An Automated Adaptive Security Framework for Cyber-Physical Systems
2024 (English)In: The International Conference on Information Systems Security and Privacy (ICISSP 2024) / [ed] Gabriele Lenzini, Paolo Mori, Steven Furnell, SciTePress , 2024, p. 242-253Conference paper, Published paper (Refereed)
Abstract [en]

The paper promotes the notion that any security solution for cyber-physical systems (CPS) should be adaptive and based on the type of attacks and their frequency. Namely, the solution should monitor its environment continuously to defend itself from a cyber-attack by modifying its defensive mechanism. Moreover, the research provides analyses of situations where the environment changes dynamically over time, requiring the designated adaptation to contemplate and respond adequately to these changes. In particular, it explores applying adaptive model predictive control concepts derived from control theory to develop specific adaptive security solutions. These systems can make decisions by forecasting their future performance for various modes or options of adaptation. Using quantitative information, the software then selects the adaptations that minimise the cost associated with security failures. This is highly significant considering that CPS are engineered systems built from and depend upon the seamless integration of computational algorithms and physical components. Moreover, security breaches are rising, and CPS are challenged by catastrophic damage, resulting in billions of losses making many of today’s solutions obsolete. While security agents issue new sets of vulnerability indicators and patches to address security breaches, these changes are continuous processes ad infinitum. A case study on a medical emergency response system illustrates the essential and salient futures of the proposed adaptive security framework for CPS.

Place, publisher, year, edition, pages
SciTePress, 2024
Series
Proceedings of the International Conference on Information Systems Security and Privacy (ICISSP), E-ISSN 2184-4356
Keywords
Security Engineering, Control Theory, Adaptive Systems, Security Solution, Multiple Failure, Cyber-Physical Systems
National Category
Computer Sciences
Research subject
Computer and Systems Sciences
Identifiers
urn:nbn:se:su:diva-237088 (URN)10.5220/0012469100003648 (DOI)2-s2.0-85190838421 (Scopus ID)978-989-758-683-5 (ISBN)
Conference
The 10th International Conference on Information Systems Security and Privacy (ICISSP 2024), 26-28 February 2024, Rome, Italy.
Available from: 2024-12-10 Created: 2024-12-10 Last updated: 2025-08-22Bibliographically approved
5. XA4AS: Adaptive Security for Multi-Stage Attacks
Open this publication in new window or tab >>XA4AS: Adaptive Security for Multi-Stage Attacks
2024 (English)In: Proceedings of the 9th International Conference on Internet of Things, Big Data and Security IoTBDS - Volume 1, Science and Technology Publications, Lda , 2024, p. 284-293Conference paper, Published paper (Refereed)
Abstract [en]

Identifying potential system threats that define security requirements is vital to designing secure cyber systems. Furthermore, the high frequency of attacks poses an enormous obstacle in analysing cyber-physical systems (CPS). The paper argues for the idea that any security solution for cyber-physical systems (CPS) should be adaptive and tailored to the specific types of threats and their frequency. Specifically, the solution should consistently monitor its surroundings in order to protect itself from a cyber-attack by adjusting its defensive measures. Understanding cyberattacks and their potential consequences on both internal and external assets in cyberspace is essential for preserving cyber security. The importance appears in the work of the Swedish Civil Contingencies Agency (MSB), which collects IT incident reports from vital service providers required by the NIS directive of the European Union and Swedish government agencies. The proposed solution is the Adaptive security framework, which aims to simplify the development of analytical models for implementing model predictive control and adaptive security solutions in the field of CPS. This study analyses security attacks and corresponding security measures for Swedish government agencies and organisations under the European Union’s NIS mandate. A thorough analysis of adaptive security was conducted on 254 security incident reports provided by vital service providers. As a result, an overall total of five security measures were identified.

Place, publisher, year, edition, pages
Science and Technology Publications, Lda, 2024
Series
International Conference on Internet of Things, Big Data and Security, IoTBDS - Proceedings, E-ISSN 2184-4976
Keywords
Adaptive Systems, Control Theory, Cyber-Physical Systems, Multiple Failure, Security Engineering, Security Solution
National Category
Other Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:su:diva-236104 (URN)10.5220/0012707400003705 (DOI)2-s2.0-85193957828 (Scopus ID)978-989-758-699-6 (ISBN)
Conference
Proceedings of the 9th International Conference on Internet of Things, Big Data and Security IoTBDS, Angers, France, 2024
Available from: 2024-12-02 Created: 2024-12-02 Last updated: 2025-08-22Bibliographically approved
6. Cyber Resilience Using ASFA: DORA-Compliant Threat-Led Penetration Testing
Open this publication in new window or tab >>Cyber Resilience Using ASFA: DORA-Compliant Threat-Led Penetration Testing
2025 (English)In: Critical Information Infrastructures Security: 19th International Conference, CRITIS 2024, Rome, Italy, September 18–20, 2024, Revised Selected Papers / [ed] Gabriele Oliva, Stefano Panzieri, Bernhard Hämmerli, Federica Pascucci, Luca Faramondi, Springer Nature , 2025, p. 269-288Conference paper, Published paper (Refereed)
Abstract [en]

The financial sector is experiencing an increase in cyber incidents, prompting numerous firms to outsource IT infrastructure management. A primary factor contributing to these breaches is that the impacted systems are socio-technical systems (STSs), which include not only technical components such as software and hardware but also physical elements (e.g., robotics, mobility) and social components (e.g., human actors, business processes, and organizational units). Evaluating STS security breaches requires a holistic approach, considering human, organizational, software, and infrastructural elements. The study involves combining strategic factors, including social and organizational dynamics, with technical components such as software and physical infrastructure.

In our previous work, we developed a security attack-monitoring system to tackle these challenges. This framework was developed to monitor, analyze, and model security incidents across the social, cyber, and physical dimensions of cyber-physical systems (CPS). This paper employs the framework to conduct threat-led penetration testing in accordance with the Digital Operational Resilience Act (DORA), thus improving the financial sector’s capacity to address information and communication crises. This study provides important insights into cyberattacks and their impact on the financial sector by examining security breaches reported to the Swedish Civil Contingencies Agency (MSB) by critical service providers. The experiment was performed in collaboration with a prominent Swedish financial institution.

Place, publisher, year, edition, pages
Springer Nature, 2025
Series
Lecture Notes in Computer Science (LNCS), ISSN 0302-9743, E-ISSN 1611-3349
Keywords
Incident Reporting, DORA, Cybersecurity, Cyber-Resilience, Risk Management, Penetration Testing
National Category
Computer Sciences
Research subject
Computer and Systems Sciences
Identifiers
urn:nbn:se:su:diva-240585 (URN)10.1007/978-3-031-84260-3_16 (DOI)2-s2.0-105000827523 (Scopus ID)978-3-031-84260-3 (ISBN)978-3-031-84259-7 (ISBN)
Conference
The 19th International Conference on Critical Information Infrastructures Security (CRITIS 2024), September 18–20, 2024, Rome, Italy.
Available from: 2025-03-10 Created: 2025-03-10 Last updated: 2025-08-22Bibliographically approved

Open Access in DiVA

Adaptive Framework for Security Attack Monitoring in Cyber-Physical Systems(2457 kB)176 downloads
File information
File name FULLTEXT01.pdfFile size 2457 kBChecksum SHA-512
10dc346c51cf81b94c6439387c58d0dc69ffc0bb65273a17e3feff01006f3d7b1a70e1eaa515935aa0fcf2752417d53f7c5ade6a3ee2fd3ab365adc22015ade2
Type fulltextMimetype application/pdf

Authority records

Seid, Elias

Search in DiVA

By author/editor
Seid, Elias
By organisation
Department of Computer and Systems Sciences
Computer SciencesSoftware EngineeringSecurity, Privacy and Cryptography

Search outside of DiVA

GoogleGoogle Scholar
Total: 176 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 975 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf