Detecting Multi-Point Attacks in a Water Treatment System Using Intermittent Control Actions

被引:4
作者
Adepu, Sridhar [1 ]
Mathur, Aditya [1 ]
机构
[1] Singapore Univ Technol & Design, iTrust, Ctr Res Cyber Secur, Singapore, Singapore
来源
PROCEEDINGS OF THE SINGAPORE CYBER-SECURITY CONFERENCE (SG-CRC) 2016: CYBER-SECURITY BY DESIGN | 2016年 / 14卷
关键词
Attack detection; multi-point cyber attacks; cyber security; design parameters for resilience; Industrial Control Systems; Intermittent Control Actions; Secure Water Treatment testbed;
D O I
10.3233/978-1-61499-617-0-59
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A novel technique for detecting multi-point attacks on an Industrial Control System (ICS) is described. The technique, referred to as Intermittent Control Actions (ICA), sends control signals intermittently to selected components to monitor the system using a process invariant. ICA was assessed experimentally for its effectiveness in an operational water treatment testbed. The experiments revealed (a) multi-point attack scenarios where ICA succeeds or fails to detect an attack, (b) issues in the design of key ICS components to ensure that the control actions in ICA do not lead to undesirable process behavior, and (c) constraints on the design of the physical system for safe use of ICA.
引用
收藏
页码:59 / 74
页数:16
相关论文
共 19 条
[1]  
[Anonymous], 2011, ACM S INF COMP COMM
[2]  
[Anonymous], 2004, MODB APPL PROT SPEC
[3]  
Barford J. K., 2002, P ACM SIGCOMM IMW FR, P71
[4]   Specification-based Intrusion Detection for Advanced Metering Infrastructures [J].
Berthier, Robin ;
Sanders, William H. .
2011 IEEE 17TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2011, :184-193
[5]   Detecting Stealthy False Data Injection Using Machine Learning in Smart Grid [J].
Esmalifalak, Mohammad ;
Liu, Lanchao ;
Nguyen, Nam ;
Zheng, Rong ;
Han, Zhu .
IEEE SYSTEMS JOURNAL, 2017, 11 (03) :1644-1652
[6]  
Hadziosmanovic D., 2014, P 30 ANN COMP SEC AP, P126, DOI [10.1145/2664243.2664277, DOI 10.1145/2664243.2664277]
[7]   Intrusion Detection in Cyber-Physical Systems: Techniques and Challenges [J].
Han, Song ;
Xie, Miao ;
Chen, Hsiao-Hwa ;
Ling, Yun .
IEEE SYSTEMS JOURNAL, 2014, 8 (04) :1049-1059
[8]  
Krotofil M., 2015, ASIACCS 2015 P 10 AC, P133, DOI DOI 10.1145/2714576.2714599
[9]   Monitoring Security of Networked Control Systems: It's the Physics [J].
McParland, Chuck ;
Peisert, Sean ;
Scaglione, Anna .
IEEE SECURITY & PRIVACY, 2014, 12 (06) :32-39
[10]   Secure Control Against Replay Attacks [J].
Mo, Yilin ;
Sinopoli, Bruno .
2009 47TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1 AND 2, 2009, :911-918