A Framework for Attack-Resilient Industrial Control Systems: Attack Detection and Controller Reconfiguration

被引:95
作者
Paridari, Kaveh [1 ,2 ]
O'Mahony, Niamh [3 ]
Mady, Alie El-Din [4 ]
Chabukswar, Rohan [4 ]
Boubekeur, Menouer [4 ]
Sandberg, Henrik [1 ,2 ]
机构
[1] KTH Royal Inst Technol, ACCESS Linnaeus Ctr, S-11428 Stockholm, Sweden
[2] KTH Royal Inst Technol, Dept Automat Control, S-11428 Stockholm, Sweden
[3] Dell EMC Res Europe, Cork, Ireland
[4] United Technol Res Ctr, Cork, Ireland
基金
瑞典研究理事会;
关键词
Artifical intelligence; building management systems; cyber-physical security; energy management; industrial control; knowledge-based systems; resilient control; SCADA systems; security analytics; stability; virtual sensor; FAULT-DIAGNOSIS;
D O I
10.1109/JPROC.2017.2725482
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Most existing industrial control systems (ICSs), such as building energy management systems (EMSs), were installed when potential security threats were only physical. With advances in connectivity, ICSs are now, typically, connected to communications networks and, as a result, can be accessed remotely. This extends the attack surface to include the potential for sophisticated cyber attacks, which can adversely impact ICS operation, resulting in service interruption, equipment damage, safety concerns, and associated financial implications. In this work, a novel cyber-physical security framework for ICSs is proposed, which incorporates an analytics tool for attack detection and executes a reliable estimation-based attack-resilient control policy, whenever an attack is detected. The proposed framework is adaptable to already implemented ICS and the stability and optimal performance of the controlled system under attack has been proved. The performance of the proposed framework is evaluated using a reduced order model of a real EMS site and simulated attacks.
引用
收藏
页码:113 / 128
页数:16
相关论文
共 41 条
  • [1] Cyber Security of Water SCADA Systems-Part I: Analysis and Experimentation of Stealthy Deception Attacks
    Amin, Saurabh
    Litrico, Xavier
    Sastry, Shankar
    Bayen, Alexandre M.
    [J]. IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2013, 21 (05) : 1963 - 1970
  • [2] [Anonymous], FUTURE GRID ENABLE S
  • [3] [Anonymous], 2016, CCS, DOI [DOI 10.1145/2976749, DOI 10.1145/2976749.2978388]
  • [4] Bezzo N, 2014, IEEE INT C INT ROBOT, P3692, DOI 10.1109/IROS.2014.6943080
  • [5] Blanke M., 2006, Diagnosis and fault-tolerant control
  • [6] Stability and performance of switching Kalman filters
    Böker, G
    Lunze, J
    [J]. INTERNATIONAL JOURNAL OF CONTROL, 2002, 75 (16-17) : 1269 - 1281
  • [7] Cardenas A., 2009, POWER ENERGY ENG C, P1
  • [8] Big Data Analytics for Security
    Cardenas, Alvaro A.
    Manadhata, Pratyusa K.
    Rajan, Sreeranga P.
    [J]. IEEE SECURITY & PRIVACY, 2013, 11 (06) : 74 - 76
  • [9] Ericson II C. A., 1999, P SYST SAF C
  • [10] Stuxnet and the Future of Cyber War
    Farwell, James P.
    Rohozinski, Rafal
    [J]. SURVIVAL, 2011, 53 (01) : 23 - 40