Page 102 - Artificial Intelligence for the Internet of Everything
P. 102
88 Artificial Intelligence for the Internet of Everything
The reconfigurations can include modifications in the roles and procedures
for human system operators as well as technology related adjustments. The
monitoring subsystem(s), referred to as a Sentinel, for detection of attacks
and derivation of potential reconfigurations must, in turn, be very highly
secured to avoid becoming an attractive target for attacks. Resilience solu-
tions can serve as a deterrent to attackers since they promise to reduce the
highest risk consequences of potential cyber attacks. As an example of cyber-
attack resiliency consider an automobile equipped with an automated
collision-avoidance capability. A variety of cyber attacks have been demon-
strated in which an automobile could be automatically directed toward a
possible collision with another nearby vehicle. Monitoring the automobile’s
sensor outputs, control system inputs and outputs, and driver inputs through
the acceleration and brake pedals, would provide a basis for recognition of an
inconsistency potentially caused by a cyber attack impacting the control sys-
tem. However, the control error could also be the result of erroneous sensor
inputs. Comparing measurements from a diverse set of sensors would pro-
vide a basis for detecting and responding to either a failed or cyber attacked
sensor subsystem. Integration of the alternate explanations for the control
error provides the opportunity to automatically correct the situation or,
alternately, provide an opportunity for the driver to respond. Note that a
resilience solution impacts the effectiveness of a variety of possible cyber
attacks that would create common symptoms.
The technology-focused research effort has included a number of pro-
totyping projects involving protection of currently available, highly auto-
mated physical systems that are being cyber-attacked. These prototyping
activities have served to demonstrate the importance of, and potential for,
cyber-attack resiliency solutions. Specific operational prototyping activities
have included: (1) a DoD-sponsored effort involving cyber defense of an
unmanned air vehicle (UAV) conducting surveillance missions (including
in-flight evaluations, Miller, 2014a); (2) defending automobiles (including
Virginia State Police exercises with unsuspecting policemen driving
cyber-attacked police cars, NBC.29, 2015; Higgins, 2015a); and (3) a
National Institute of Standards sponsored effort involving the defense of a
3D printer through the monitoring of its motors, temperature controllers,
and other physical component controllers, while in the process of printing
defective parts due to cyber attacks on the machine’s internal technology
components. These real-world cases have served to illuminate a number
of important and complex policy issues made visible to government and