Detection and Differentiation of Replay Attack and Equipment Faults in SCADA Systems

被引:46
作者
Li, Dan [1 ]
Gebraeel, Nagi [1 ]
Paynabar, Kamran [1 ]
机构
[1] Georgia Inst Technol, Dept Ind & Syst Engn, Atlanta, GA 30332 USA
基金
美国国家科学基金会;
关键词
Computer crime; SCADA systems; State-space methods; Measurement uncertainty; Linear systems; Time measurement; Attack detection; cybersecurity; fault diagnosis; replay attack (RA); supervisory control and data acquisition (SCADA);
D O I
10.1109/TASE.2020.3013760
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Supervisory control and data acquisition (SCADA) systems are widely used for industrial control of critical infrastructures, such as power plants and manufacturing systems. There is abundant evidence of SCADA systems being subject to cyberattacks. With increasing interest in industrial digitization, the cybersecurity of SCADA systems is poised to be even more important. Equipment faults and cyberattacks can manifest themselves in a similar fashion, i.e., they can exhibit similar signatures. This article focuses on methods that are capable of distinguishing equipment faults from bona fide cyberattacks. Especially, we consider a relatively sophisticated form of cyberattack known as the "replay attack" (RA). We derive mathematical formalisms that distinguish the RA from several classes of equipment faults and verify our methodology through an extensive numerical study. Note to Practitioners-This article is motivated by the problem of detecting replay cyberattacks in industrial control systems and differentiating it from equipment faults. Existing approaches mainly focus on the detection aspect but usually ignore the importance of differentiation. We an ensembled statistical process monitoring approach based on five statistical metrics. The statistical metrics are derived based on a theoretical analysis that shows the data characteristics under each system anomaly, including replay attack (RA), controller fault, and plant fault. We mathematically prove that the signatures generated by the derived metrics can be used to differentiate an RA from the equipment faults. We conduct a sensitivity analysis of the detection delay of our method regarding the magnitude of the cyberattack. Physical experiments on a rotating machinery setup show that the proposed approach applies to some simple real-world settings. In future research, we will address the scalability issue of our method as well as more generalized nonlinear system settings.
引用
收藏
页码:1626 / 1639
页数:14
相关论文
共 33 条
[1]  
Anderson B. D. O., 1979, Optimal filtering
[2]  
[Anonymous], 2011, ASIACCS
[4]  
Case D.U, 2016, Electricity Information Sharing and Analysis Center (EISAC), V388
[5]   Coordinated Cyber-Attacks on the Measurement Function in Hybrid State Estimation [J].
Chakhchoukh, Yacine ;
Ishii, Hideaki .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2015, 30 (05) :2487-2497
[6]  
Dán G, 2010, INT CONF SMART GRID, P214, DOI 10.1109/SMARTGRID.2010.5622046
[7]   An approach to cyber-physical vulnerability assessment for intelligent manufacturing systems [J].
DeSmit, Zach ;
Elhabashy, Ahmad E. ;
Wells, Lee J. ;
Camelio, Jaime A. .
JOURNAL OF MANUFACTURING SYSTEMS, 2017, 43 :339-351
[8]   Detecting False Data Injection Attacks in AC State Estimation [J].
Gu Chaojun ;
Jirutitijaroen, Panida ;
Motani, Mehul .
IEEE TRANSACTIONS ON SMART GRID, 2015, 6 (05) :2476-2483
[9]  
Hoehn A, 2016, P AMER CONTR CONF, P302, DOI 10.1109/ACC.2016.7524932
[10]   An Online Detection Framework for Cyber Attacks on Automatic Generation Control [J].
Huang, Tong ;
Satchidanandan, Bharadwaj ;
Kumar, P. R. ;
Xie, Le .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2018, 33 (06) :6816-6827