Forensic readiness of industrial control systems under stealthy attacks

被引:11
作者
Azzam, Mazen [1 ]
Pasquale, Liliana [2 ]
Provan, Gregory [3 ]
Nuseibeh, Bashar [1 ,4 ]
机构
[1] Lero Univ Limerick, Limerick V94 T9PX, Ireland
[2] Lero Univ Coll Dublin, Dublin, Ireland
[3] Lero Univ Coll Cork, Coll Rd, Cork T12 K8AF, Ireland
[4] Open Univ, Milton Keynes MK7 6AA, England
基金
英国工程与自然科学研究理事会; 爱尔兰科学基金会;
关键词
Industrial control systems; Forensic readiness; Digital forensics; Safety checking; Stealthy attacks; Value of information;
D O I
10.1016/j.cose.2022.103010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyberattacks against Industrial Control Systems (ICS) can have harmful physical impacts. Investigating such attacks can be difficult, as evidence could be lost to physical damage. This is especially true with stealthy attacks ; i.e., attacks that can evade detection. In this paper, we aim to engineer Forensic Readiness (FR) in safety-critical, geographically distributed ICS, by proactively collecting potential evidence of stealthy attacks. The collection of all data generated by an ICS at all times is infeasible due to the large volume of such data. Hence, our approach only triggers data collection when there is the possibility for a potential stealthy attack to cause damage. We determine the conditions for such an event by performing predictive, model-based, safety checks. Furthermore, we use the geographical layout of the ICS and the safety predictions to identify data that is at risk of being lost due to damage, i.e., relevant data. Finally, to reduce the control performance overhead resulting from real-time data collection, we select a subset of relevant data to collect by performing a trade-off between expected impact of the attack and the estimated cost of collection. We demonstrate these ideas using simulations of the widely-used Tennessee- Eastman Process (TEP) benchmark. We show that the proposed approach does not miss relevant data and results in a reduced control performance overhead compared to the case when all data generated by the ICS is collected. We also showcase the applicability of our approach in improving the efficiency of existing ICS forensic log analysis tools.
引用
收藏
页数:10
相关论文
共 50 条
  • [41] Finite-Horizon Strictly Stealthy Deterministic Attacks on Cyber-Physical Systems
    Cheng, Donny
    Shang, Jun
    Chen, Tongwen
    IEEE CONTROL SYSTEMS LETTERS, 2022, 6 : 1640 - 1645
  • [42] Probability-Based Stealthy Attacks for Cyber-Physical Systems with Resource Constraint
    Liu, Xiaoke
    Li, Pengyu
    Ye, Dan
    2023 IEEE 2ND INDUSTRIAL ELECTRONICS SOCIETY ANNUAL ON-LINE CONFERENCE, ONCON, 2023,
  • [43] Stealthy multiplicative attacks against cyber-physical systems: A gap metric approach
    Zhao, Zhengen
    Xu, Yunsong
    Li, Yuzhe
    Cui, Lei
    Huang, Yimin
    Zhen, Ziyang
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2022, 32 (13) : 7336 - 7347
  • [44] SCTM: A Multi-view Detecting Approach Against Industrial Control Systems Attacks
    Zhou, Ming
    Lv, Shichao
    Yin, Libo
    Chen, Xin
    Li, Hong
    Sun, Limin
    ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [45] Adversarial sample attacks and defenses based on LSTM-ED in industrial control systems
    Liu, Yaru
    Xu, Lijuan
    Yang, Shumian
    Zhao, Dawei
    Li, Xin
    COMPUTERS & SECURITY, 2024, 140
  • [46] Impact of Network Infrastructure Parameters to the Effectiveness of Cyber Attacks Against Industrial Control Systems
    Genge, B.
    Siaterlis, C.
    Hohenadel, M.
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2012, 7 (04) : 674 - 687
  • [47] A Data-Driven Framework for Verified Detection of Replay Attacks on Industrial Control Systems
    Gargoum, Sara
    Yassaie, Negar
    Al-Dabbagh, Ahmad W.
    Feng, Chen
    IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2024, : 3400 - 3415
  • [48] Detecting Cyber Attacks in Industrial Control Systems Using Spatio-Temporal Autoencoder
    Lan, Bin
    Yu, Shunzheng
    2023 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, IJCNN, 2023,
  • [49] Cost-Benefit Analysis of Kernel Tracing Systems for Forensic Readiness
    Liao, Yi-Ching
    Langweg, Hanno
    SFCS'14: PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON SECURITY AND FORENSICS IN COMMUNICATION SYSTEMS, 2014, : 25 - 35
  • [50] Hybrid Stealthy Attacks on Stochastic Event-Based Remote Estimation Under Packet Dropouts
    Lian, Zhi
    Shi, Peng
    Lim, Chee Peng
    Rudas, Imre J.
    Agarwal, Ramesh K.
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (06): : 5829 - 5838