Security of SCADA Systems Against Cyber-Physical Attacks

被引:60
作者
Do, Van Long [1 ]
Fillatre, Lionel [2 ]
Nikiforov, Igor [3 ]
Willett, Peter [4 ]
机构
[1] Viettel Res & Dev Inst, Viettel Bldg B1,Lot 1,Hoa Lac Hitech Pk, Hanoi, Vietnam
[2] Univ Cote Azur, CNRS, I3S, CS 40121, Sophia Antipolis, France
[3] Univ Technol Troyes, ICD, LM2S, UMR 6281,CNRS, 12 Rue Marie Curie,CS 42060, F-10004 Troyes, France
[4] Univ Connecticut, ECE Dept, 371 Fairfield Rd,U-4157, Storrs, CT 06269 USA
关键词
DATA INJECTION ATTACKS; SEQUENTIAL DETECTION; INTRUSION DETECTION; CLASSIFICATION; PERFORMANCE;
D O I
10.1109/MAES.2017.160047
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
SCADA systems have been playing a vital and an increasing role in safety-critical infrastructures of a nation, including transportation systems, electric power grids, gas pipelines, and water networks. The rapid advance of information and communication technology has rendered modern SCADA systems increasingly vulnerable to cyber-physical attacks on both physical and cyber layers. Though approaches focused on information security may provide some elements of security for SCADA systems, their scope may be limited with regards to the defense-in-depth strategy of SCADA systems against malicious attacks. The data-based approach, which does not require the physical and mathematical model of SCADA systems, consists of analyzing hidden patterns in observed data. The detection and isolation tasks can be realized by one-class classification The data-based approach, which does not require the physical and mathematical model of SCADA systems, consists of analyzing hidden patterns in observed data. The detection and isolation tasks can be realized by one-class classification. Mathematically, a semiparametric model consists of three components: a parametric model, a nonparametric model, and random noises. Then, the semiparametric model of the system under both normal operation and abnormal behavior is specified. This semiparametric approach is expected to offer better performance than data-based and model-based approaches.
引用
收藏
页码:28 / 45
页数:18
相关论文
共 115 条
  • [1] Abur A., 2004, POWER SYSTEM STATE E
  • [2] Cyber Security of Water SCADA Systems-Part II: Attack Detection Using Enhanced Hydrodynamic Models
    Amin, Saurabh
    Litrico, Xavier
    Sastry, S. Shankar
    Bayen, Alexandre M.
    [J]. IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2013, 21 (05) : 1679 - 1693
  • [3] Cyber Security of Water SCADA Systems-Part I: Analysis and Experimentation of Stealthy Deception Attacks
    Amin, Saurabh
    Litrico, Xavier
    Sastry, Shankar
    Bayen, Alexandre M.
    [J]. IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2013, 21 (05) : 1963 - 1970
  • [4] Stealthy Deception Attacks on Water SCADA Systems
    Amin, Saurabh
    Litrico, Xavier
    Sastry, S. Shankar
    Bayen, Alexandre M.
    [J]. HSSC 10: PROCEEDINGS OF THE 13TH ACM INTERNATIONAL CONFERENCE ON HYBRID SYSTEMS: COMPUTATION AND CONTROL, 2010, : 161 - 170
  • [5] Amin S, 2009, LECT NOTES COMPUT SC, V5469, P31, DOI 10.1007/978-3-642-00602-9_3
  • [6] [Anonymous], 2010, WORKING PAPER
  • [7] [Anonymous], 2004, KERNEL METHODS PATTE
  • [8] [Anonymous], 2005, Fault-Diagnosis Systems: An Introduction from Fault Detection to Fault Tolerance
  • [9] [Anonymous], 2010, TAXONOMY SECURITY SO
  • [10] [Anonymous], 2009, P WORKSH FUT DIR CYB