Forensic readiness of industrial control systems under stealthy attacks

被引:11
|
作者
Azzam, Mazen [1 ]
Pasquale, Liliana [2 ]
Provan, Gregory [3 ]
Nuseibeh, Bashar [1 ,4 ]
机构
[1] Lero Univ Limerick, Limerick V94 T9PX, Ireland
[2] Lero Univ Coll Dublin, Dublin, Ireland
[3] Lero Univ Coll Cork, Coll Rd, Cork T12 K8AF, Ireland
[4] Open Univ, Milton Keynes MK7 6AA, England
基金
爱尔兰科学基金会; 英国工程与自然科学研究理事会;
关键词
Industrial control systems; Forensic readiness; Digital forensics; Safety checking; Stealthy attacks; Value of information;
D O I
10.1016/j.cose.2022.103010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyberattacks against Industrial Control Systems (ICS) can have harmful physical impacts. Investigating such attacks can be difficult, as evidence could be lost to physical damage. This is especially true with stealthy attacks ; i.e., attacks that can evade detection. In this paper, we aim to engineer Forensic Readiness (FR) in safety-critical, geographically distributed ICS, by proactively collecting potential evidence of stealthy attacks. The collection of all data generated by an ICS at all times is infeasible due to the large volume of such data. Hence, our approach only triggers data collection when there is the possibility for a potential stealthy attack to cause damage. We determine the conditions for such an event by performing predictive, model-based, safety checks. Furthermore, we use the geographical layout of the ICS and the safety predictions to identify data that is at risk of being lost due to damage, i.e., relevant data. Finally, to reduce the control performance overhead resulting from real-time data collection, we select a subset of relevant data to collect by performing a trade-off between expected impact of the attack and the estimated cost of collection. We demonstrate these ideas using simulations of the widely-used Tennessee- Eastman Process (TEP) benchmark. We show that the proposed approach does not miss relevant data and results in a reduced control performance overhead compared to the case when all data generated by the ICS is collected. We also showcase the applicability of our approach in improving the efficiency of existing ICS forensic log analysis tools.
引用
收藏
页数:10
相关论文
共 50 条
  • [21] PEM: Remote forensic acquisition of PLC memory in industrial control systems
    Zubair, Nauman
    Ayub, Adeen
    Yoo, Hyunguk
    Ahmed, Irfan
    FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2022, 40
  • [22] A Prototype Forensic Toolkit for Industrial-Control-Systems Incident Response
    Carr, Nicholas B.
    Rowe, Neil C.
    CYBER SENSING 2015, 2015, 9458
  • [23] Understanding Indicators of Compromise against Cyber-attacks in Industrial Control Systems: A Security Perspective
    Asiri, Mohammed
    Saxena, Neetesh
    Gjomemo, Rigel
    Burnap, Pete
    ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS, 2023, 7 (02)
  • [24] ANALYZING CYBER-PHYSICAL ATTACKS ON NETWORKED INDUSTRIAL CONTROL SYSTEMS
    Genge, Bela
    Fovino, Igor Nai
    Siaterlis, Christos
    Masera, Marcelo
    CRITICAL INFRASTRUCTURE PROTECTION V, 2011, 367 : 167 - 183
  • [25] Adversarial attacks on machine learning cybersecurity defences in Industrial Control Systems
    Anthi, Eirini
    Williams, Lowri
    Rhode, Matilda
    Burnap, Pete
    Wedgbury, Adam
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [26] Analysis of Consensus-Based Distributed Economic Dispatch Under Stealthy Attacks
    Zhao, Chengcheng
    He, Jianping
    Cheng, Peng
    Chen, Jiming
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2017, 64 (06) : 5107 - 5117
  • [27] Probability-Based Stochastic Stealthy Attacks in Cyber-Physical Systems
    Ye, Dan
    Liu, Xiaoke
    Li, Pengyu
    IEEE SYSTEMS JOURNAL, 2024, 18 (02): : 1288 - 1295
  • [28] Design of Stealthy Attacks Against Interval Estimation for Cyber-Physical Systems
    Li, Zhi-Hui
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (02): : 2215 - 2222
  • [29] Resilient Control of Stochastic Cyber-Physical Systems Against Stealthy Attacks: Complex Dynamical Networks Encryption Strategy
    Wang, Jun-Lan
    Li, Xiao-Jian
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2025, 55 (02): : 1078 - 1091
  • [30] Opportunities for Early Detection and Prediction of Ransomware Attacks against Industrial Control Systems
    Gazzan, Mazen
    Sheldon, Frederick T.
    FUTURE INTERNET, 2023, 15 (04):