An Investigation into the Response of a Water Treatment System to Cyber Attacks

被引:48
|
作者
Adepu, Sridhar [1 ]
Mathur, Aditya [1 ]
机构
[1] Singapore Univ Technol & Design, Ctr Cyber Secur Res, iTrust, Singapore, Singapore
来源
2016 IEEE 17TH INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE) | 2016年
关键词
Attack detection; attacker model; attack model; cyber attacks; cyber security; Cyber Physical Systems; Secure Water Treatment testbed;
D O I
10.1109/HASE.2016.14
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
An experimental investigation was undertaken to understand the impact of single-point cyber attacks on a Secure Water Treatment (SWaT) system. Cyber attacks were launched on SWaT through its SCADA server that connects to the Programmable Logic Controllers (PLCs) that in turn are connected to sensors and actuators. Attacks were designed to meet attacker objectives selected from a novel attacker model. Outcome of the experiments led to a better understanding of (a) the propagation of an attack across the system measured in terms of the number of components affected and (b) the behavior of the water treatment process in SWaT in response to the attacks. The observed response to various attacks was then used to propose attack detection mechanisms based on various physical properties measured during the treatment process.
引用
收藏
页码:141 / 148
页数:8
相关论文
共 50 条
  • [31] Cyber Attacks on Protective Relays in Digital Substations and Impact Analysis
    Rajkumar, Vetrivel Subramaniam
    Tealane, Marko
    Stefanov, Alexandru
    Palensky, Peter
    2020 8TH WORKSHOP ON MODELING AND SIMULATION OF CYBER-PHYSICAL ENERGY SYSTEMS, 2020,
  • [32] Bibliographical review on cyber attacks from a control oriented perspective
    Sanchez, Helem S.
    Rotondo, Damiano
    Escobet, Teresa
    Puig, Vicenc
    Quevedo, Joseba
    ANNUAL REVIEWS IN CONTROL, 2019, 48 : 103 - 128
  • [33] Communications Network Analysis in a SCADA System Testbed Under Cyber-Attacks
    Miciolino, Estefania Etcheves
    Bernieri, Giuseppe
    Pascucci, Federica
    Setola, Roberto
    2015 23RD TELECOMMUNICATIONS FORUM TELFOR (TELFOR), 2015, : 341 - 344
  • [34] High Performance Adaptive System for Cyber Attacks Detection
    Komar, Myroslav
    Kochan, Volodymyr
    Dubchak, Lesia
    Sachenko, Anatoliy
    Golovko, Vladimir
    Bezobrazov, Sergei
    Romanets, Ihor
    PROCEEDINGS OF THE 2017 9TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS (IDAACS), VOL 2, 2017, : 853 - 858
  • [35] Risk Assessment for Cyber Attacks in Feeder Automation System
    Dai, Qiangsheng
    Shi, Libao
    Ni, Yixin
    2018 IEEE POWER & ENERGY SOCIETY GENERAL MEETING (PESGM), 2018,
  • [36] MODELLING THE DYNAMIC ELECTRICAL SYSTEM IN THE CONTEXT OF CYBER ATTACKS
    Dogaru, Delia Ioana
    Dumitrache, Joan
    UNIVERSITY POLITEHNICA OF BUCHAREST SCIENTIFIC BULLETIN SERIES C-ELECTRICAL ENGINEERING AND COMPUTER SCIENCE, 2018, 80 (02): : 3 - 16
  • [37] Investigating the Impact of Cyber Attacks on Power System Reliability
    Zhang, Yichi
    Wang, Lingfeng
    Sun, Weiqing
    2013 IEEE 3RD ANNUAL INTERNATIONAL CONFERENCE ON CYBER TECHNOLOGY IN AUTOMATION, CONTROL AND INTELLIGENT SYSTEMS (CYBER), 2013, : 462 - +
  • [38] An Empirical Study on Automotive Cyber Attacks
    Singh, Aman
    Singh, Madhusudan
    2018 IEEE 4TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2018, : 47 - 50
  • [39] Neutralizing Cyber Attacks: Techniques of Neutralization and Willingness to Commit Cyber Attacks
    Bossler, Adam M.
    AMERICAN JOURNAL OF CRIMINAL JUSTICE, 2021, 46 (06) : 911 - 934
  • [40] Neutralizing Cyber Attacks: Techniques of Neutralization and Willingness to Commit Cyber Attacks
    Adam M. Bossler
    American Journal of Criminal Justice, 2021, 46 : 911 - 934