A Cybersecurity Detection Framework for Supervisory Control and Data Acquisition Systems

被引:99
作者
Cruz, Tiago [1 ]
Rosa, Luis [1 ]
Proenca, Jorge [1 ]
Maglaras, Leandros [2 ]
Aubigny, Matthieu [3 ]
Lev, Leonid [4 ]
Jiang, Jianmin [5 ]
Simoes, Paulo [1 ]
机构
[1] Univ Coimbra, Dept Informat Engn, P-3030290 Coimbra, Portugal
[2] De Montfort Univ, Dept Comp Technol, Leicester LE1 9BH, Leics, England
[3] Itrust Consulting, L-6831 Berbourg, Luxembourg
[4] Israel Elect Corp Ltd, IL-31000 Haifa, Israel
[5] Shenzhen Univ, Shenzhen 518060, Peoples R China
关键词
Critical infrastructure (CI) protection; industrial control systems (ICS); intrusion detection systems (IDS); supervisory control and data acquisition (SCADA); INTRUSION DETECTION; SCADA SYSTEMS; SECURITY; CHALLENGES; NETWORKS; OCSVM;
D O I
10.1109/TII.2016.2599841
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a distributed intrusion detection system (DIDS) for supervisory control and data acquisition (SCADA) industrial control systems, which was developed for the CockpitCI project. Its architecture was designed to address the specific characteristics and requirements for SCADA cybersecurity that cannot be adequately fulfilled by techniques from the information technology world, thus requiring a domain-specific approach. DIDS components are described in terms of their functionality, operation, integration, and management. Moreover, system evaluation and validation are undertaken within an especially designed hybrid testbed emulating the SCADA system for an electrical distribution grid.
引用
收藏
页码:2236 / 2246
页数:11
相关论文
共 25 条
[1]  
[Anonymous], 2007, ANSIISA9900012007
[2]  
[Anonymous], 2013, CIP002009 NERC
[3]   Cyberphysical Security and Dependability Analysis of Digital Control Systems in Nuclear Power Plants [J].
Cho, Chi-Shiang ;
Chung, Wei-Ho ;
Kuo, Sy-Yen .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2016, 46 (03) :356-369
[4]  
Cruz T, 2015, PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM), P878, DOI 10.1109/INM.2015.7140399
[5]   Challenges in power system information security [J].
Dán, György ;
Sandberg, Henrik ;
Ekstedt, Mathias ;
Björkman, Gunnar .
IEEE Security and Privacy, 2012, 10 (04) :62-70
[6]  
Dept. Homeland Security ICS-CERT, 2012, SCHNEID EL MOD QUANT
[7]  
Gao W., 2010, 2010 ECRIME RES SUMM, P1, DOI DOI 10.1109/ECRIME.2010.5706699
[8]   Intrusion Detection in Cyber-Physical Systems: Techniques and Challenges [J].
Han, Song ;
Xie, Miao ;
Chen, Hsiao-Hwa ;
Ling, Yun .
IEEE SYSTEMS JOURNAL, 2014, 8 (04) :1049-1059
[9]   Proposal strategies of key management for data encryption in SCADA network of electric power systems [J].
Kang, D. J. ;
Lee, J. J. ;
Kim, B. H. ;
Hur, D. .
INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2011, 33 (09) :1521-1526
[10]   TRUSTWORTHY HARDWARE: IDENTIFYING AND CLASSIFYING HARDWARE TROJANS [J].
Karri, Ramesh ;
Rajendran, Jeyavijayan ;
Rosenfeld, Kurt ;
Tehranipoor, Mohammad .
COMPUTER, 2010, 43 (10) :39-46