Detection of Deception Attacks in Supervisory Control Systems Using Bond Graph

被引:2
|
作者
Zerdazi, I. [1 ,2 ]
Fezari, M. [1 ]
Ouziala, M. [2 ,3 ]
机构
[1] Badji Mokhtar Annaba Univ, Dept Elect, Lab Automat & Signals Annaba LASA, Annaba 23000, Algeria
[2] Lille Univ, Polytech Lille, Ctr Rech Informat Signal & Automat Lille CRIStAL, UMR CNRS 9189, F-59655 Villeneuve Dascq, France
[3] MHamed Bougara Boumerdes Univ, Fac Engn Sci, Lab Mech & Solid Syst LMSS, Boumerdes 30000, Algeria
关键词
SCADA; cyber-attacks; bond graph; deception attack; analytical redundancy relation;
D O I
10.3103/S0146411620020091
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Supervisory Control and Data Acquisition (SCADA) systems can be subject to cyber-attacks due to their extensive connectivity to information and communication technologies. Those communications are used to connect sensors, actuators, and programmable logic controllers (PLCs) to monitor and control the process. The use of communication networks enlarges the vulnerability of SCADA to cyber-attacks that can drive the system to unsafe states. A variety of approaches in the field of attack detection have been proposed, however they are characterized very expensive, low detection rate or are system specific. One of the powerful cyber-attacks targeting SCADA systems is deception attack, where the attacker can change sensor reading parameters. In this work, we propose a new defense strategy that detects parameter changes generated by deception attacks in the sensor and control part in supervisory control systems. To do so, we use the bond graph (BG) modeling tool.
引用
收藏
页码:156 / 167
页数:12
相关论文
共 50 条
  • [1] Detection of Deception Attacks in Supervisory Control Systems Using Bond Graph
    I. Zerdazi
    M. Fezari
    M. Ouziala
    Automatic Control and Computer Sciences, 2020, 54 : 156 - 167
  • [2] An Anomaly Detection Technique for Deception Attacks in Industrial Control Systems
    Qassim, Q. S.
    Ahmad, A. R.
    Ismail, R.
    Bakar, Abu A.
    Rahim, Abdul F.
    Mokhtar, M. Z.
    Ramli, R.
    Mohd, Yusof B.
    Mahdi, Mohammed Najah
    2019 IEEE 5TH INTL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / IEEE INTL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC) / IEEE INTL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2019, : 267 - 272
  • [3] Detection and mitigation of classes of attacks in supervisory control systems
    Carvalho, Lilian Kawakami
    Wu, Yi-Chin
    Kwong, Raymond
    Lafortune, Stephane
    AUTOMATICA, 2018, 97 : 121 - 133
  • [4] Active Synchronous Detection of Deception Attacks in Microgrid Control Systems
    Li, Yan
    Zhang, Peng
    Zhang, Liang
    Wang, Bing
    IEEE TRANSACTIONS ON SMART GRID, 2017, 8 (01) : 373 - 375
  • [5] Detection and mitigation of deception attacks on cloud-based industrial control systems
    Akbarian, Fatemeh
    Tarneberg, William
    Fitzgerald, Emma
    Kihl, Maria
    25TH CONFERENCE ON INNOVATION IN CLOUDS, INTERNET AND NETWORKS (ICIN 2022), 2022, : 106 - 110
  • [6] Security Against Network Attacks in Supervisory Control Systems
    Lima, Public M.
    Alves, Marcos V. S.
    Carvalho, Lilian K.
    Moreira, Marcos V.
    IFAC PAPERSONLINE, 2017, 50 (01): : 12333 - 12338
  • [7] Real-time detection of deception attacks in cyber-physical systems
    Feiyang Cai
    Xenofon Koutsoukos
    International Journal of Information Security, 2023, 22 : 1099 - 1114
  • [8] Real-time detection of deception attacks in cyber-physical systems
    Cai, Feiyang
    Koutsoukos, Xenofon
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (05) : 1099 - 1114
  • [9] SCADA Attack Modeling Using Bond Graph
    Zerdazi, Imene
    Fezari, Mohamed
    2019 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES FOR DISASTER MANAGEMENT (ICT-DM 2019), 2019,
  • [10] Adaptive Control of Second-Order Nonlinear Systems With Injection and Deception Attacks
    Yang, Yue
    Huang, Jiangshuai
    Su, Xiaojie
    Wang, Kai
    Li, Guoqi
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 52 (01): : 574 - 581