Page 102 - Artificial Intelligence for the Internet of Everything
P. 102

88    Artificial Intelligence for the Internet of Everything


          The reconfigurations can include modifications in the roles and procedures
          for human system operators as well as technology related adjustments. The
          monitoring subsystem(s), referred to as a Sentinel, for detection of attacks
          and derivation of potential reconfigurations must, in turn, be very highly
          secured to avoid becoming an attractive target for attacks. Resilience solu-
          tions can serve as a deterrent to attackers since they promise to reduce the
          highest risk consequences of potential cyber attacks. As an example of cyber-
          attack resiliency consider an automobile equipped with an automated
          collision-avoidance capability. A variety of cyber attacks have been demon-
          strated in which an automobile could be automatically directed toward a
          possible collision with another nearby vehicle. Monitoring the automobile’s
          sensor outputs, control system inputs and outputs, and driver inputs through
          the acceleration and brake pedals, would provide a basis for recognition of an
          inconsistency potentially caused by a cyber attack impacting the control sys-
          tem. However, the control error could also be the result of erroneous sensor
          inputs. Comparing measurements from a diverse set of sensors would pro-
          vide a basis for detecting and responding to either a failed or cyber attacked
          sensor subsystem. Integration of the alternate explanations for the control
          error provides the opportunity to automatically correct the situation or,
          alternately, provide an opportunity for the driver to respond. Note that a
          resilience solution impacts the effectiveness of a variety of possible cyber
          attacks that would create common symptoms.
             The technology-focused research effort has included a number of pro-
          totyping projects involving protection of currently available, highly auto-
          mated physical systems that are being cyber-attacked. These prototyping
          activities have served to demonstrate the importance of, and potential for,
          cyber-attack resiliency solutions. Specific operational prototyping activities
          have included: (1) a DoD-sponsored effort involving cyber defense of an
          unmanned air vehicle (UAV) conducting surveillance missions (including
          in-flight evaluations, Miller, 2014a); (2) defending automobiles (including
          Virginia State Police exercises with unsuspecting policemen driving
          cyber-attacked police cars, NBC.29, 2015; Higgins, 2015a); and (3) a
          National Institute of Standards sponsored effort involving the defense of a
          3D printer through the monitoring of its motors, temperature controllers,
          and other physical component controllers, while in the process of printing
          defective parts due to cyber attacks on the machine’s internal technology
          components. These real-world cases have served to illuminate a number
          of important and complex policy issues made visible to government and
   97   98   99   100   101   102   103   104   105   106   107