PRESS-NEWS.org - Press Release Distribution
PRESS RELEASES DISTRIBUTION

New software spots, isolates cyber-attacks to protect networked control systems

2013-05-14
(Press-News.org) Researchers from North Carolina State University have developed a software algorithm that detects and isolates cyber-attacks on networked control systems – which are used to coordinate transportation, power and other infrastructure across the United States.

Networked control systems are essentially pathways that connect and coordinate activities between computers and physical devices. For example, the systems that connect temperature sensors, heating systems and user controls in modern buildings are networked control systems.

But, on a much larger scale, these systems are also becoming increasingly important to national infrastructure, such as transportation and power. And, because they often rely on wireless or Internet connections, these systems are vulnerable to cyber-attacks. "Flame" and "Stuxnet" are examples of costly, high-profile attacks on networked control systems in recent years.

As networked control systems have grown increasingly large and complex, system designers have moved away from having system devices – or "agents" – coordinate their activities through a single, centralized computer hub, or brain. Instead, designers have created "distributed network control systems" (D-NCSs) that allow all of the system agents to work together, like a bunch of mini-brains, to coordinate their activities. This allows the systems to operate more efficiently. And now these distributed systems can also operate more securely.

NC State researchers have developed a software algorithm that can detect when an individual agent in a D-NCS has been compromised by a cyber-attack. The algorithm then isolates the compromised agent, protecting the rest of the system and allowing it to continue functioning normally. This gives D-NCSs resilience and security advantages over systems that rely on a central computer hub, because the centralized design means the entire system would be compromised if the central computer is hacked.

"In addition, our security algorithm can be incorporated directly into the code used to operate existing distributed control systems, with minor modifications," says Dr. Mo-Yuen Chow, a professor of electrical and computer engineering at NC State and co-author of a paper on the work. "It would not require a complete overhaul of existing systems."

"We have demonstrated that the system works, and are now moving forward with additional testing under various cyber-attack scenarios to optimize the algorithm's detection rate and system performance," says Wente Zeng, a Ph.D. student at NC State and lead author of the paper.

### The paper, "Convergence and Recovery Analysis of the Secure Distributed Control Methodology for D-NCS," will be presented at the IEEE International Symposium on Industrial Electronics, May 28-31, in Taipei, Taiwan. The research was funded by the National Science Foundation.


ELSE PRESS RELEASES FROM THIS DATE:

When green means danger: A stunning new species of palm-pitviper from Honduras

2013-05-14
A new species of green palm-pitviper of the genus Bothriechis is described from a seriously threatened cloud forest reserve in northern Honduras. Because of similarity in color pattern and scalation, the new species (Bothriechis guifarroi) was previously confused with other Honduran palm pitvipers. Genetic analysis revealed that the closest relatives of the new species are actually found over 600 km to the south, in the mountains of Costa Rica. The study was published in the open access journal Zookeys. The gorgeous new species was discovered by scientists during two ...

CWRU researcher searches for global views of nurses' end-of-life care for patients

2013-05-14
Nurses will use extreme measures to save their patients and parents; but if they were dying, they prefer less aggressive ones for themselves, according to results from an international survey on nurses' end-of-life preferences. The April issue of the International Nursing Review reported the findings about the end-of-life preferences of 1,089 nurses in the first multinational and cross-cultural view of nurses' end-of-life care choices. Two factors influenced the care of people dying: lack of knowledge about the patient's wishes and the call of duty, according to Joyce ...

Bacterium counteracts 'coffee ring effect'

2013-05-14
Ever notice how a dried coffee stain has a thicker outer rim, while the middle of the stain remains almost unsoiled? This 'coffee ring effect' also occurs in other materials. Researchers from the Departments of Chemical Engineering and Chemistry at KU Leuven have now discovered how to counteract coffee rings with 'surfactants', i.e. soap. The key to the discovery was not a kitchen towel, but a bacterium that counteracts the coffee ring effect at the microscopic level. The findings were published in a recent edition of the leading journal Nature Communications. When a ...

Crop rotation with nematode-resistant wheat can protect tomatoes

2013-05-14
In a study published online today in Crop Science, scientists describe a nematode-resistant wheat. But while the wheat carries the resistance to the pest, the benefits are actually seen in the crop that is grown after it. Root-knot nematodes cause crop losses around the world, and they can be difficult to control. In order to reproduce, nematodes need to infect a living plant root. Once they are present in soil, they can survive winter in a fallow field and infect plants during the next growing season. Trap crops – unsuitable hosts that "trick" the nematodes into starting ...

Cutting-edge bacteria research leads to more effective treatment of complex infections

2013-05-14
Bacteria are life forms, which, like all other life forms, struggle for the best living conditions for themselves. Therefore they will try to avoid getting attacked by the human immune system, and therefore they have developed various ways to protect themselves from the human immune system. When safe from the immune system, they can focus on breeding and multiplying, and if they become numerous enough, the human body will experience their presence as an infection. Some bacteria are relatively harmless, while others are fatal. The bacteria avoid being attacked by the human ...

Widespread but neglected disease a health threat in Africa, Virginia Tech researchers say

2013-05-14
The newest public health threat in developing countries may not be a cinematic-quality emerging disease but actually a disease from animals that was identified more than 100 years ago. Virginia Tech researchers have identified leptospirosis as a significant health threat in Botswana. The world's most common disease transmitted to humans by animals, according to the World Health Organization, leptospirosis is a two-phase disease that begins with flu-like symptoms but can cause meningitis, liver damage, pulmonary hemorrhage, renal failure, and even death if untreated. "The ...

Relationship troubles? Some sad music might help you feel better

2013-05-14
Consumers experiencing relationship problems are more likely to prefer aesthetic experiences that reflect their negative mood, according to a new study in the Journal of Consumer Research. "Emotional experiences of aesthetic products are important to our happiness and well-being. Music, movies, paintings, or novels that are compatible with our current mood and feelings, akin to an empathic friend, are more appreciated when we experience broken or failing relationships," write authors Chan Jean Lee (KAIST Business School), Eduardo B. Andrade (FGV School of Administration), ...

Advertising product results? Put images closer together

2013-05-14
Consumers believe a product is more effective when images of the product and its desired outcome are placed closer together in advertisements, according to a new study in the Journal of Consumer Research. "Merely changing the spatial proximity between the image of a product and its desired effect in an advertisement influences judgment of product effectiveness. Consumers tend to judge the product to be more effective when the two images are closer versus farther apart," write authors Boyoun (Grace) Chae (University of British Columbia), Xiuping Li (National University ...

University of Miami study: Companies in states with weaker economies provide investing opportunity

2013-05-14
Companies located in more economically-troubled states provide a greater opportunity for investors than companies in other states according to new research by the University of Miami School of Business Administration. The study reveals that investors in states with high unemployment and a relatively depressed housing sector tend to sell more stocks during these tough economic times, and because people invest disproportionately in companies close to home, the stock prices of firms in those states suffer disproportionately. The research, to be published in the June issue ...

Illusion of control: Why sports fans prefer 'lucky' products

2013-05-14
Consumers engage in superstitious behavior when they want to achieve something but don't have the power to make it happen, according to a new study in the Journal of Consumer Research. "Preference for lucky products (those associated with positive outcomes) increases when a strong desire for control is combined with lower perceived ability to exert control. Consumers who make superstitious choices believe they will be effective in helping them achieve the desired outcome," write authors Eric J. Hamerman (Tulane University) and Gita V. Johar (Columbia University). Sports ...

LAST 30 PRESS RELEASES:

Devastation of island land snails, especially in the Pacific

Microwaves help turn sugar industry waste into high-performance biochar

From craft dust to green gold: Turning palm handicraft waste into high value bio based chemicals

New roadmap shows how to turn farm nitrogen models into real world water quality gains

Heart damage is common after an operation and often goes unnoticed, but patients who see a cardiologist may be less likely to die or suffer heart disease as a result

New tool exposes scale of fake research flooding cancer science

Researchers identify new blood markers that may detect early pancreatic cancer

Scientists uncover why some brain cells resist Alzheimer's disease

The Lancet: AI-supported mammography screening results in fewer aggressive and advanced breast cancers, finds full results from first randomized controlled trial

New AI tool improves treatment of cancer patients after heart attack

Kandahar University highlights global disparities in neurosurgical workforce and access to care

Research spotlight: Discovering risk factors for long-term relapse in alcohol use disorder

As fossil fuel use declines, experts urge planning and coordination to prevent chaotic collapse

Scientists identify the antibody's hinge as a structural "control hub"

Late-breaking study establishes new risk model for surgery after TAVR

To reduce CO2 emissions, policy on carbon pricing, taxation and investment in renewable energy is key

Kissing the sun: Unraveling mysteries of the solar wind

Breathing new life into nanotubes for a cooler planet

Machine learning reveals how to maximize biochar yield from algae

Inconsistent standards may be undermining global tracking of antibiotic resistance

Helping hands: UBCO research team develops brace to reduce tremors

MXene nanomaterials enter a new dimension

Hippocampus does more than store memories: it predicts rewards, study finds

New light-based nanotechnology could enable more precise, less harmful cancer treatment

The heritability of human lifespan is roughly 50%, once external mortality is addressed

Tracking Finland’s ice fishers reveals how social information guides foraging decisions

DNA-protein crosslinks promote inflammation-linked premature aging and embryonic lethality in mice

Accounting for fossil energy’s “minimum viable scale” is central to decarbonization

Immunotherapy reduces plaque in arteries of mice

Using AI to retrace the evolution of genetic control elements in the brain

[Press-News.org] New software spots, isolates cyber-attacks to protect networked control systems