False Logic Attacks on SCADA Control System

被引:5
作者
Li, Weize [1 ]
Xie, Lun [1 ]
Liu, Daqian [1 ]
Wang, Zhiliang [1 ]
机构
[1] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing, Peoples R China
来源
2014 ASIA-PACIFIC SERVICES COMPUTING CONFERENCE (APSCC) | 2014年
基金
中国国家自然科学基金;
关键词
SCADA; security; cyber-physical attack; false logic attack; INTRUSION DETECTION; SECURITY;
D O I
10.1109/APSCC.2014.27
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A cyber security incident in SCADA systems can cause the disruption of physical process, and may result in significant economic loss, environmental disasters or even human casualties. To exploit the feature of the physical process and find the potential attacks, this paper presents and analyzes a new class of cyber-physical attacks, named false logic attacks, against the logic of control process in SCADA systems. In addition, it proposes a model for false logic attacks, which is useful for analyzing how attacks can affect the physical system. An experiment is performed to illustrate the concepts, and the effect of false logic attacks are also discussed.
引用
收藏
页码:136 / 140
页数:5
相关论文
共 24 条
  • [1] [Anonymous], 2011, P 6 ACM S INF COMP C, DOI DOI 10.1145/1966913.1966959
  • [2] Barbosa RRR, 2010, LECT NOTES COMPUT SC, V6155, P163, DOI 10.1007/978-3-642-13986-4_23
  • [3] Bigham J, 2003, LECT NOTES COMPUT SC, V2776, P171
  • [4] Security for Process Control Systems An Overview
    Brandle, Markus
    Naedele, Martin
    [J]. IEEE SECURITY & PRIVACY, 2008, 6 (06) : 24 - 29
  • [5] A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems
    Carcano, A.
    Coletta, A.
    Guglielmi, M.
    Masera, M.
    Fovino, I. Nai
    Trombetta, A.
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2011, 7 (02) : 179 - 186
  • [6] Carcano A, 2010, LECT NOTES COMPUT SC, V6027, P138
  • [7] Modbus/DNP3 State-based Intrusion Detection System
    Fovino, Igor Nai
    Carcano, Andrea
    Murel, Thibault De lacheze
    Trombetta, Alberto
    Masera, Marcelo
    [J]. 2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, : 729 - 736
  • [8] Garitano I, 2011, ADV INTEL SOFT COMPU, V87, P357
  • [9] Understanding the physical and economic consequences of attacks on control systems
    Huang, Yu-Lun
    Cardenas, Alvaro A.
    Amin, Saurabh
    Lin, Zong-Syun
    Tsai, Hsin-Yi
    Sastry, Shankar
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2009, 2 (03) : 73 - 83
  • [10] Security issues in SCADA networks
    Igure, Vinay M.
    Laughter, Sean A.
    Williams, Ronald D.
    [J]. COMPUTERS & SECURITY, 2006, 25 (07) : 498 - 506