An Investigation into the Response of a Water Treatment System to Cyber Attacks

被引:48
|
作者
Adepu, Sridhar [1 ]
Mathur, Aditya [1 ]
机构
[1] Singapore Univ Technol & Design, Ctr Cyber Secur Res, iTrust, Singapore, Singapore
来源
2016 IEEE 17TH INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE) | 2016年
关键词
Attack detection; attacker model; attack model; cyber attacks; cyber security; Cyber Physical Systems; Secure Water Treatment testbed;
D O I
10.1109/HASE.2016.14
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
An experimental investigation was undertaken to understand the impact of single-point cyber attacks on a Secure Water Treatment (SWaT) system. Cyber attacks were launched on SWaT through its SCADA server that connects to the Programmable Logic Controllers (PLCs) that in turn are connected to sensors and actuators. Attacks were designed to meet attacker objectives selected from a novel attacker model. Outcome of the experiments led to a better understanding of (a) the propagation of an attack across the system measured in terms of the number of components affected and (b) the behavior of the water treatment process in SWaT in response to the attacks. The observed response to various attacks was then used to propose attack detection mechanisms based on various physical properties measured during the treatment process.
引用
收藏
页码:141 / 148
页数:8
相关论文
共 50 条
  • [41] A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks
    Sedjelmaci, Hichem
    Senouci, Sidi Mohammed
    Ansari, Nirwan
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2018, 48 (09): : 1594 - 1606
  • [42] Monitoring system reaction in cyber-physical testbed under cyber-attacks
    Bernieri, Giuseppe
    Miciolino, Estefania Etcheves
    Pascucci, Federica
    Setola, Roberto
    COMPUTERS & ELECTRICAL ENGINEERING, 2017, 59 : 86 - 98
  • [43] Mindfulness in Cyber Security - Examining Responder Behaviors in Cyber-Attacks
    Tapanainen, Tommi
    AMCIS 2017 PROCEEDINGS, 2017,
  • [44] A Unified Cyber Response for Water Utilities: The Cyber Fortress Exercise
    Slonopas, Andre
    Mazur, Gerald A.
    Coughlin, Jessica A.
    Mcelman, Mary
    Strahan, Jacob F.
    Talmadge, Shawn G.
    JOURNAL AWWA, 2025, 117 (02): : 6 - 14
  • [45] ASSESSING THE VULNERABILITY OF A TRANSPORT MANAGEMENT SYSTEM TO CYBER ATTACKS FOR APPLICATION IN THE METHOD OF THE THREE FACTORS
    Ivanova, Yoana A.
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2019, 11 (01): : 85 - 94
  • [46] An Investigation of Cyber-Attacks and Security Mechanisms for Connected and Autonomous Vehicles
    Gupta, Sandeep
    Maple, Carsten
    Passerone, Roberto
    IEEE ACCESS, 2023, 11 : 90641 - 90669
  • [47] Secure State Estimation of Cyber-Physical System under Cyber Attacks: Q-Learning vs. SARSA
    Jin, Zengwang
    Ma, Menglu
    Zhang, Shuting
    Hu, Yanyan
    Zhang, Yanning
    Sun, Changyin
    ELECTRONICS, 2022, 11 (19)
  • [48] Attributing Cyber Attacks
    Rid, Thomas
    Buchanan, Ben
    JOURNAL OF STRATEGIC STUDIES, 2015, 38 (1-2) : 4 - 37
  • [49] Detection of cyber-attacks in electro-pneumatic positioning system with distributed control
    Nedeljkovic, Dusan M.
    Jakovljevic, Zivana B.
    Miljkovic, Zoran Dj
    Pajic, Miroslav
    2019 27TH TELECOMMUNICATIONS FORUM (TELFOR 2019), 2019, : 369 - 372
  • [50] The Vulnerability of Cyber-Physical System Under Stealthy Attacks
    Sui, Tianju
    Mo, Yilin
    Marelli, Damian
    Sun, Ximing
    Fu, Minyue
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (02) : 637 - 650