Real-Time SCADA Attack Detection by means of Formal Methods

被引:19
|
作者
Mercaldo, Francesco [1 ]
Martinelli, Fabio [1 ,2 ]
Santone, Antonella [2 ]
机构
[1] CNR, Ist Informat & Telemat, Pisa, Italy
[2] Univ Molise, Dept Biosci & Terr, Pesche, IS, Italy
关键词
SCADA; model checking; formal methods; timed automaton; temporal logic; critical infrastructure; security; safety;
D O I
10.1109/WETICE.2019.00057
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
SCADA control systems use programmable logic controller to interface with critical machines. SCADA systems are used in critical infrastructures, for instance, to control smart grid, oil pipelines, water distribution and chemical manufacturing plants: an attacker taking control of a SCADA system could cause various damages, both to the infrastructure but also to people (for instance, adding chemical substances into a water distribution systems). In this paper we propose a method to detect attacks targeting SCADA systems. We exploit model checking, in detail we model logs from SCADA systems into a network of timed automata and, through timed temporal logic, we characterize the behaviour of a SCADA system under attack. Experiments performed on a SCADA water distribution system confirmed the effectiveness of the proposed method.
引用
收藏
页码:231 / 236
页数:6
相关论文
共 50 条
  • [41] Stealthy Sensor Attack Detection and Real-Time Performance Recovery for Resilient CPS
    Kim, Sangjun
    Eun, Yongsoon
    Park, Kyung-Joon
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (11) : 7412 - 7422
  • [42] Real-Time Cyber Attack Detection Over HoneyPi Using Machine Learning
    Alhan, Birkan
    Gonen, Serkan
    Karacayilmaz, Gokce
    Bariskan, Mehmet Ali
    Yilmaz, Ercan Nurcan
    TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2022, 29 (04): : 1394 - 1401
  • [43] AN INTELLIGENT METHOD FOR REAL-TIME DETECTION OF DDOS ATTACK BASED ON FUZZY LOGIC
    Wang Jiangtao Yang Geng* (College of Computer
    JournalofElectronics(China), 2008, (04) : 511 - 518
  • [44] The New Real-time Debug Interface for Efficient Code Reuse Attack Detection
    Lee, Yongje
    Heo, Ingoo
    Hwang, Dongil
    Kim, Kyungmin
    Paek, Yunheung
    2015 INTERNATIONAL SOC DESIGN CONFERENCE (ISOCC), 2015, : 93 - 94
  • [45] An automatic and real-time detection method of IoT in-the-wild vulnerability attack
    He Q.
    Wang L.
    Chen Y.
    Wang X.
    Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2024, 50 (07): : 2195 - 2205
  • [46] Real-time DDoS attack detection based on Complex Event Processing for IoT
    Cardoso, Adeilson M. da S.
    Lopes, Rafael Fernandes
    Teles, Ariel Soares
    Veras Magalhaes, Fernando B.
    2018 IEEE/ACM THIRD INTERNATIONAL CONFERENCE ON INTERNET-OF-THINGS DESIGN AND IMPLEMENTATION (IOTDI 2020), 2018, : 273 - 274
  • [47] Real-time anomaly attack detection based on an improved variable length model
    Liu, Xiaomei
    Yue, Jianlong
    JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2023, 23 (03) : 1179 - 1195
  • [48] CloudRadar: A Real-Time Side-Channel Attack Detection System in Clouds
    Zhang, Tianwei
    Zhang, Yinqian
    Lee, Ruby B.
    RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, RAID 2016, 2016, 9854 : 118 - 140
  • [49] Real-Time Detection and Estimation of Denial of Service Attack in Connected Vehicle Systems
    Biron, Zoleikha Abdollahi
    Dey, Satadru
    Pisu, Pierluigi
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2018, 19 (12) : 3893 - 3902
  • [50] Feature extraction methods for real-time face detection and classification
    Masip, D
    Bressan, M
    Vitrià, J
    EURASIP JOURNAL ON APPLIED SIGNAL PROCESSING, 2005, 2005 (13) : 2061 - 2071