Prerequisites will include at least one course in operating systems, and one course in networking. Prior familiarity with preliminaries of cyber security would be helpful but not required. With the instructor's permission, one or both prerequisites can be waived provided the instructor feels that the student has adequate exposure to the relevant topics in those courses.
Having successfully completed this course, the student will be able to:
The students will be exposed to the following topics:
The course will consist of instructor presentations, student presentations, guest lectures, and group discussions. This course will be quite research focused, and the goal of the course will be to enable students to find research topics in the domain of cyber-security of critical infrastructure.
Module |
Topic |
No. of Lectures |
Introduction |
Critical Infrastructures such as Power Grid, Railways Systems, Transportation Systems, Water/Sewage Systems and their automation architecture, Vulnerabilities, and Past Cases of Cyber Security Compromises and Trends Stuxnet Case Study, and Reaction through US Presidential Executive Order |
4 |
Industry Automation and SCADA Systems |
SCADA Based Control, Sensors (IEDs, PLCs), field network and its protocols (profibus, DNP3 etc) |
8 |
Modeling SCADA Systems as a Cyber Physical System Model |
Cyber Physical System Modeling, Plant Models, Feed Back Control Model, and Anomaly Detection Models |
2 |
Cyber Threat Modeling |
Various Types of Cyber Threats to Industrial Critical System Modeled in a 3 dimensional Attack Space in terms of adversary Model and Understanding various attacks in this Model |
6 |
Cyber Threat Mitigation |
Various Techniques to mitigate various attacks such as replay attack, zero-dynamics attack, stealthy attacks etc |
4 |
Virtual SCADA Simulation Platform |
Virtual SCADA Simulation Platform to be used in Projects and Homeworks, Its architecture, implementation, and instruction on installation |
4 |
Machine Learning Techniques |
Cyber Physical Systems under attacks and study of their physical dynamics to distinguish between a normal behavior vs. behavior under attack, use of machine learning techniques to distinguish and detect in real-time |
10 |
Game Theoretic formulation |
Modeling an attacker vs. Defender game, Nash Equilibrium criteria, and understanding advantages of game theoretic modeling |
4 |
Semester grades will be based on the following weights.
Handbook on Securing Cyber-Physical Critical Infrastructure, Sajal K. Das, Krishna Kant, Nan Zhang, Morgan Kaufmann (Elsevier), ISBN 978-0-12-415815-3, Publication: 2012.
Journal articles, conference papers, reports, advanced texts, and/or personal notes will be provided.