3 June 2014 Cyber threat impact assessment and analysis for space vehicle architectures
Author Affiliations +
This paper covers research into an assessment of potential impacts and techniques to detect and mitigate cyber attacks that affect the networks and control systems of space vehicles. Such systems, if subverted by malicious insiders, external hackers and/or supply chain threats, can be controlled in a manner to cause physical damage to the space platforms. Similar attacks on Earth-borne cyber physical systems include the Shamoon, Duqu, Flame and Stuxnet exploits. These have been used to bring down foreign power generation and refining systems. This paper discusses the potential impacts of similar cyber attacks on space-based platforms through the use of simulation models, including custom models developed in Python using SimPy and commercial SATCOM analysis tools, as an example STK/SOLIS. The paper discusses the architecture and fidelity of the simulation model that has been developed for performing the impact assessment. The paper walks through the application of an attack vector at the subsystem level and how it affects the control and orientation of the space vehicle. SimPy is used to model and extract raw impact data at the bus level, while STK/SOLIS is used to extract raw impact data at the subsystem level and to visually display the effect on the physical plant of the space vehicle.
© (2014) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Robert M. McGraw, Robert M. McGraw, Mark J. Fowler, Mark J. Fowler, David Umphress, David Umphress, Richard A. MacDonald, Richard A. MacDonald, } "Cyber threat impact assessment and analysis for space vehicle architectures", Proc. SPIE 9085, Sensors and Systems for Space Applications VII, 90850K (3 June 2014); doi: 10.1117/12.2055242; https://doi.org/10.1117/12.2055242

Back to Top