Identifying False Data Injection Attacks in Industrial Control Systems using Artificial Neural Networks

被引:0
作者
Potluri, Sasanka [1 ]
Diedrich, Christian [1 ]
Sangala, Girish Kumar Reddy [2 ]
机构
[1] Otto von Guericke Univ, Inst Automat Engn, Magdeburg, Germany
[2] FIAtec GmbH, Magdebrug, Germany
来源
2017 22ND IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA) | 2017年
关键词
False Data Injection Attacks; Cyber-attacks; Industrial Control Systems; Cyber security; Artificial Neural Networks; ANOMALY DETECTION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-attacks on Industrial Control Systems (ICS) are growing in recent years. Existing IT-security technologies are not sufficient enough to protect the ICS from the novel attacks. Among several attack types on industrial networks, False Data Injection Attacks (FDIA) are considered as an important class of cyber-attacks against ICS. FDIA injects forged measurement into the control system in hope of misguiding the control algorithm. This abnormal behavior of a single control device or a sensor value in a plant can lead to a huge loss to the company or a disaster in plant environment. Hence, a prior identification of these injected attacks is very important. In this paper, we give an overview about different possible cyber-attacks on ICS followed by the importance and challenges in identifying FDIA w.r.t other attack types. A simulated ICS use case is developed to generate the sensor and actuator signals. An attack injection tool is developed and used to simulate the attacks on to the ICS network. The generated data with injected attacks is used to train and test the performance of the Artificial Neural Networks (ANN) for identifying FDIA. The evaluation of performance parameters shows promising detection accuracies.
引用
收藏
页数:8
相关论文
共 27 条
  • [1] Anwar A, 2014, GREEN ENERGY TECHNOL, P411, DOI 10.1007/978-981-4585-27-9_17
  • [2] Baig Z. A., 2013, ANAL SMART GRID ATTA, V8
  • [3] Brasso B., 2016, Cyber attacks against critical infrastructure are no longer just theories
  • [4] Internet tomography
    Coates, M
    Hero, AO
    Nowak, R
    Yu, B
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2002, 19 (03) : 47 - 65
  • [5] Computing M., 2015, COMPREHENSIVE SURVEY, V8
  • [6] Coppeliarobotics, JOINT TYP OP
  • [7] Esmalifalak M., 2014, DETECTING STEALTHY F, P1
  • [8] Eurobots, ABB IRB 2400 M94A
  • [9] Federal Office for Information Security Germany, 2016, IND CONTR SYST SEC
  • [10] Hao J., 2015, SPARSE MALICIOUS FAL, V3203, P1