PRESS-NEWS.org - Press Release Distribution
PRESS RELEASES DISTRIBUTION

New software spots, isolates cyber-attacks to protect networked control systems

2013-05-14
(Press-News.org) Researchers from North Carolina State University have developed a software algorithm that detects and isolates cyber-attacks on networked control systems – which are used to coordinate transportation, power and other infrastructure across the United States.

Networked control systems are essentially pathways that connect and coordinate activities between computers and physical devices. For example, the systems that connect temperature sensors, heating systems and user controls in modern buildings are networked control systems.

But, on a much larger scale, these systems are also becoming increasingly important to national infrastructure, such as transportation and power. And, because they often rely on wireless or Internet connections, these systems are vulnerable to cyber-attacks. "Flame" and "Stuxnet" are examples of costly, high-profile attacks on networked control systems in recent years.

As networked control systems have grown increasingly large and complex, system designers have moved away from having system devices – or "agents" – coordinate their activities through a single, centralized computer hub, or brain. Instead, designers have created "distributed network control systems" (D-NCSs) that allow all of the system agents to work together, like a bunch of mini-brains, to coordinate their activities. This allows the systems to operate more efficiently. And now these distributed systems can also operate more securely.

NC State researchers have developed a software algorithm that can detect when an individual agent in a D-NCS has been compromised by a cyber-attack. The algorithm then isolates the compromised agent, protecting the rest of the system and allowing it to continue functioning normally. This gives D-NCSs resilience and security advantages over systems that rely on a central computer hub, because the centralized design means the entire system would be compromised if the central computer is hacked.

"In addition, our security algorithm can be incorporated directly into the code used to operate existing distributed control systems, with minor modifications," says Dr. Mo-Yuen Chow, a professor of electrical and computer engineering at NC State and co-author of a paper on the work. "It would not require a complete overhaul of existing systems."

"We have demonstrated that the system works, and are now moving forward with additional testing under various cyber-attack scenarios to optimize the algorithm's detection rate and system performance," says Wente Zeng, a Ph.D. student at NC State and lead author of the paper.

### The paper, "Convergence and Recovery Analysis of the Secure Distributed Control Methodology for D-NCS," will be presented at the IEEE International Symposium on Industrial Electronics, May 28-31, in Taipei, Taiwan. The research was funded by the National Science Foundation.


ELSE PRESS RELEASES FROM THIS DATE:

When green means danger: A stunning new species of palm-pitviper from Honduras

2013-05-14
A new species of green palm-pitviper of the genus Bothriechis is described from a seriously threatened cloud forest reserve in northern Honduras. Because of similarity in color pattern and scalation, the new species (Bothriechis guifarroi) was previously confused with other Honduran palm pitvipers. Genetic analysis revealed that the closest relatives of the new species are actually found over 600 km to the south, in the mountains of Costa Rica. The study was published in the open access journal Zookeys. The gorgeous new species was discovered by scientists during two ...

CWRU researcher searches for global views of nurses' end-of-life care for patients

2013-05-14
Nurses will use extreme measures to save their patients and parents; but if they were dying, they prefer less aggressive ones for themselves, according to results from an international survey on nurses' end-of-life preferences. The April issue of the International Nursing Review reported the findings about the end-of-life preferences of 1,089 nurses in the first multinational and cross-cultural view of nurses' end-of-life care choices. Two factors influenced the care of people dying: lack of knowledge about the patient's wishes and the call of duty, according to Joyce ...

Bacterium counteracts 'coffee ring effect'

2013-05-14
Ever notice how a dried coffee stain has a thicker outer rim, while the middle of the stain remains almost unsoiled? This 'coffee ring effect' also occurs in other materials. Researchers from the Departments of Chemical Engineering and Chemistry at KU Leuven have now discovered how to counteract coffee rings with 'surfactants', i.e. soap. The key to the discovery was not a kitchen towel, but a bacterium that counteracts the coffee ring effect at the microscopic level. The findings were published in a recent edition of the leading journal Nature Communications. When a ...

Crop rotation with nematode-resistant wheat can protect tomatoes

2013-05-14
In a study published online today in Crop Science, scientists describe a nematode-resistant wheat. But while the wheat carries the resistance to the pest, the benefits are actually seen in the crop that is grown after it. Root-knot nematodes cause crop losses around the world, and they can be difficult to control. In order to reproduce, nematodes need to infect a living plant root. Once they are present in soil, they can survive winter in a fallow field and infect plants during the next growing season. Trap crops – unsuitable hosts that "trick" the nematodes into starting ...

Cutting-edge bacteria research leads to more effective treatment of complex infections

2013-05-14
Bacteria are life forms, which, like all other life forms, struggle for the best living conditions for themselves. Therefore they will try to avoid getting attacked by the human immune system, and therefore they have developed various ways to protect themselves from the human immune system. When safe from the immune system, they can focus on breeding and multiplying, and if they become numerous enough, the human body will experience their presence as an infection. Some bacteria are relatively harmless, while others are fatal. The bacteria avoid being attacked by the human ...

Widespread but neglected disease a health threat in Africa, Virginia Tech researchers say

2013-05-14
The newest public health threat in developing countries may not be a cinematic-quality emerging disease but actually a disease from animals that was identified more than 100 years ago. Virginia Tech researchers have identified leptospirosis as a significant health threat in Botswana. The world's most common disease transmitted to humans by animals, according to the World Health Organization, leptospirosis is a two-phase disease that begins with flu-like symptoms but can cause meningitis, liver damage, pulmonary hemorrhage, renal failure, and even death if untreated. "The ...

Relationship troubles? Some sad music might help you feel better

2013-05-14
Consumers experiencing relationship problems are more likely to prefer aesthetic experiences that reflect their negative mood, according to a new study in the Journal of Consumer Research. "Emotional experiences of aesthetic products are important to our happiness and well-being. Music, movies, paintings, or novels that are compatible with our current mood and feelings, akin to an empathic friend, are more appreciated when we experience broken or failing relationships," write authors Chan Jean Lee (KAIST Business School), Eduardo B. Andrade (FGV School of Administration), ...

Advertising product results? Put images closer together

2013-05-14
Consumers believe a product is more effective when images of the product and its desired outcome are placed closer together in advertisements, according to a new study in the Journal of Consumer Research. "Merely changing the spatial proximity between the image of a product and its desired effect in an advertisement influences judgment of product effectiveness. Consumers tend to judge the product to be more effective when the two images are closer versus farther apart," write authors Boyoun (Grace) Chae (University of British Columbia), Xiuping Li (National University ...

University of Miami study: Companies in states with weaker economies provide investing opportunity

2013-05-14
Companies located in more economically-troubled states provide a greater opportunity for investors than companies in other states according to new research by the University of Miami School of Business Administration. The study reveals that investors in states with high unemployment and a relatively depressed housing sector tend to sell more stocks during these tough economic times, and because people invest disproportionately in companies close to home, the stock prices of firms in those states suffer disproportionately. The research, to be published in the June issue ...

Illusion of control: Why sports fans prefer 'lucky' products

2013-05-14
Consumers engage in superstitious behavior when they want to achieve something but don't have the power to make it happen, according to a new study in the Journal of Consumer Research. "Preference for lucky products (those associated with positive outcomes) increases when a strong desire for control is combined with lower perceived ability to exert control. Consumers who make superstitious choices believe they will be effective in helping them achieve the desired outcome," write authors Eric J. Hamerman (Tulane University) and Gita V. Johar (Columbia University). Sports ...

LAST 30 PRESS RELEASES:

Mathematical model illuminates how environment impacts life choices of salmon

Houston Methodist researchers shed light on increased rates of severe human infections caused by Streptococcus subspecies

Auburn University hosts 62nd Hands-On Workshop on Computational Biophysics, featuring the new VMD 2.0

The Salton Sea — an area rich with lithium — is a hot spot for child respiratory issues

University of Maryland-YouGov poll: Alsobrooks dominates Hogan, amendment to state constitution garners broad support

Exposure to particular sources of air pollution is harmful to children’s learning and memory, a USC study shows

Change of ownership in home health agencies may lead to increased Medicare spending and reduced staffing levels, according to UTHealth Houston research

More resources needed to protect birds in Germany

Mission to International Space Station launches research on brain organoids, heart muscle atrophy, and cold welding

nTIDE November 2024 Jobs Report: Disability employment remains near historic highs over past 18 months

Researchers aim to streamline cancer detection with new method for liquid biopsies

New Huntington’s treatment prevents protein aggregation

Bee gene specifies collective behavior

Jennifer Bickel, M.D., named MD Anderson Vice President and Chief Wellness Officer

Evolutionary paths vastly differ for birds, bats

Political pros no better than public in predicting which messages persuade

Investment in pediatric emergency care could save more than 2,100 young lives annually

The dynamic core of black holes

Improving energy production by boosting singlet fission process

Smoking cessation and incident cardiovascular disease

Cannabis use during early pregnancy following recreational cannabis legalization

Research shows Cleveland Clinic’s therapeutic virtual yoga program can be effective for chronic low back pain

Closing in on Parkinson’s Disease proteins in extracellular vesicles in the blood

Regional and global experts convene in Accra, Ghana to update cancer treatment guidelines for Sub-Saharan Africa

China University of Geosciences (Beijing) unveils clues to an enigmatic geological process

Fueling greener aviation with hydrogen

Education, occupation, and wealth affect the risk of cognitive impairment

Revealing causal links in complex systems

Alzheimer disease as a clinical-biological construct— an international working group recommendation

Press registration now open for the EULAR 2025 Congress in Barcelona

[Press-News.org] New software spots, isolates cyber-attacks to protect networked control systems