Covert Attacks in Cyber-Physical Control Systems

被引:89
作者
de Sa, Alan Oliveira [1 ,2 ]
Rust da Costa Carmo, Luiz F. [1 ,3 ]
Machado, Raphael C. S. [3 ,4 ]
机构
[1] Univ Fed Rio de Janeiro, NCE Tercio Pacitti Inst, Inst Math, Rio De Janeiro, Brazil
[2] Brazilian Navy, Admiral Wandenkolk Instruct Ctr, Rio De Janeiro, Brazil
[3] Natl Inst Metrol Qual & Technol INMETRO, Rio De Janeiro, Brazil
[4] Fed Ctr Technol Educ Rio de Janeiro CEFET RJ, Rio De Janeiro, Brazil
关键词
Cyber-physical systems; networked control systems (NCSs); security; NETWORKED CONTROL;
D O I
10.1109/TII.2017.2676005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The advantages of using communication networks to interconnect controllers and physical plants motivate the increasing number of networked control systems in industrial and critical infrastructure facilities. However, this integration also exposes such control systems to new threats, typical of the cyber domain. In this context, studies have been conducted, aiming to explore vulnerabilities and propose security solutions for cyber-physical systems. In this paper, a covert attack for service degradation is proposed, which is planned based on the intelligence gathered by another attack, herein proposed, referred as system identification attack. The simulation results demonstrate that the joint operation of the two attacks is capable to affect, in a covert and accurate way, the physical behavior of a system.
引用
收藏
页码:1641 / 1651
页数:11
相关论文
共 38 条
[1]   Cyber Security of Water SCADA Systems-Part II: Attack Detection Using Enhanced Hydrodynamic Models [J].
Amin, Saurabh ;
Litrico, Xavier ;
Sastry, S. Shankar ;
Bayen, Alexandre M. .
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2013, 21 (05) :1679-1693
[2]   Cyber Security of Water SCADA Systems-Part I: Analysis and Experimentation of Stealthy Deception Attacks [J].
Amin, Saurabh ;
Litrico, Xavier ;
Sastry, Shankar ;
Bayen, Alexandre M. .
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2013, 21 (05) :1963-1970
[3]  
[Anonymous], 2012, APPL STAT HDB TECHNI
[4]  
[Anonymous], 2015, 2015 INT C CYB SEC S
[5]  
[Anonymous], 2011, IFAC P
[6]  
[Anonymous], 2012, THESIS
[7]   Network-based control systems: A tutorial [J].
Chow, MY ;
Tipsuwan, Y .
IECON'01: 27TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, VOLS 1-3, 2001, :1593-1602
[8]   Backtracking Search Optimization Algorithm for numerical optimization problems [J].
Civicioglu, Pinar .
APPLIED MATHEMATICS AND COMPUTATION, 2013, 219 (15) :8121-8144
[9]   Network control system applied to a large pressurized heavy water reactor [J].
Das, Monotosh ;
Ghosh, Ratna ;
Goswami, Bhaswati ;
Gupta, Amitava ;
Tiwari, A. P. ;
Balasubrmanian, R. ;
Chandra, A. K. .
IEEE TRANSACTIONS ON NUCLEAR SCIENCE, 2006, 53 (05) :2948-2956
[10]   Networked Control of a Large Pressurized Heavy Water Reactor (PHWR) With Discrete Proportional-Integral-Derivative (PID) Controllers [J].
Dasgupta, Soumya ;
Routh, Avijit ;
Banerjee, Shohan ;
Agilageswari, K. ;
Balasubramanian, R. ;
Bhandarkar, S. G. ;
Chattopadhyay, Sujit ;
Kumar, Manoj ;
Gupta, Amitava .
IEEE TRANSACTIONS ON NUCLEAR SCIENCE, 2013, 60 (05) :3879-3888