Information Flow for Security in Control Systems

被引:0
作者
Weerakkody, Sean [1 ]
Sinopoli, Bruno [1 ]
Kar, Soummya [1 ]
Datta, Anupam [1 ]
机构
[1] Carnegie Mellon Univ, Dept Elect & Comp Engn, Pittsburgh, PA 15213 USA
来源
2016 IEEE 55TH CONFERENCE ON DECISION AND CONTROL (CDC) | 2016年
基金
美国国家科学基金会;
关键词
DETECTING INTEGRITY ATTACKS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper considers the development of information flow analyses to support resilient design and active detection of adversaries in cyber physical systems (CPS). CPS security, though well studied, suffers from fragmentation. In this paper, we consider control systems as an abstraction of CPS. Here, we use information flow analysis, a well established set of methods developed in software security, to obtain a unified framework that captures and extends results in control system security. Specifically, we propose the Kullback Liebler (KL) divergence as a causal measure of information flow, which quantifies the effect of adversarial inputs on sensor outputs. We show that the proposed measure characterizes the resilience of control systems to specific attack strategies by relating the KL divergence to optimal detection. We then relate information flows to stealthy attack scenarios where an adversary can bypass detection. Finally, this article examines active detection mechanisms where a defender intelligently manipulates control inputs or the system itself to elicit information flows from an attacker's malicious behavior. In all previous cases, we demonstrate an ability to investigate and extend existing results through the proposed information flow analyses.
引用
收藏
页码:5065 / 5072
页数:8
相关论文
共 29 条
[1]  
[Anonymous], THESIS
[2]  
[Anonymous], 1968, INFORM THEORY STAT
[3]  
Bai C.-Z., 2015, AM CONTR C ACC 2015
[4]   Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems [J].
Cardenas, Alvaro A. ;
Roosta, Tanya ;
Sastry, Shankar .
AD HOC NETWORKS, 2009, 7 (08) :1434-1447
[5]  
Cover T. M., 2006, WIHY SERIES TELECOMM
[6]  
Datta A., 2016, 37 IEEE S SEC PRIV
[7]   CERTIFICATION OF PROGRAMS FOR SECURE INFORMATION-FLOW [J].
DENNING, DE ;
DENNING, PJ .
COMMUNICATIONS OF THE ACM, 1977, 20 (07) :504-513
[8]  
Goguen J. A., 1982, Proceedings of the 1982 Symposium on Security and Privacy, P11
[9]  
Kalman RE., 1960, J BASIC ENG, V82, P35, DOI [DOI 10.1115/1.3662552, 10.1115/1.3662552]
[10]  
Langner Ralph, 2013, KILL CENTRIFUGE TECH