An Enhanced Multi-Stage Semantic Attack Against Industrial Control Systems

被引:5
|
作者
Hu, Yan [1 ]
Sun, Yuyan [2 ,3 ]
Wang, Youcheng [4 ]
Wang, Zhiliang [1 ]
机构
[1] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing 100083, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing Key Lab IoT Informat Secur, Beijing 100195, Peoples R China
[3] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100195, Peoples R China
[4] Beijing Electromech Engn Inst, Sci & Technol Complex Syst Control & Intelligent, Beijing 100074, Peoples R China
来源
IEEE ACCESS | 2019年 / 7卷
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Integrated circuits; Intrusion detection; Protocols; Semantics; Industrial control; Industrial control systems; multi-stage semantic attacks; state transition; stealthy attacks; SECURITY;
D O I
10.1109/ACCESS.2019.2949645
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Industrial Control Systems (ICS) play a very important role in national critical infrastructures. However, the growing interaction between the modern ICS and the Internet has made ICS more vulnerable to cyber attacks. In order to protect ICS from malicious attacks, intrusion detection technology emerges. By analyzing the network meta data or the industrial process data, Intrusion Detection Systems (IDS) can identify attacks that violate communication protocols or system specifications. However, the existing intrusion detection technology is not omnipotent, which opens up a back door for some more advanced attacks. In this work, we design an enhanced multi-stage semantic attack against ICS, which is undetectable by existing IDS. By hijacking the communication channels between the Human Machine Interface (HMI) and the remote Programmable Logic Controllers (PLCs), the attacker can manipulate the measurement data and control instructions simultaneously. The fake measurement data deceives the human operator into making wrong decisions. Furthermore, the attacker can strategically manipulate the semantic meaning of control instructions according to system state transition rules. In the meanwhile, a fake view of measurement data is presented to the HMI to conceal the on-going malicious attack. This attack is totally stealthy since the message sizes and timing, the command sequences, and the system state values are all legitimate. Consequently, this attack can secretly bring the system into critical states. Experimental results have verified the strong attack ability of the proposed attack.
引用
收藏
页码:156871 / 156882
页数:12
相关论文
共 50 条
  • [31] Optimized multi-stage baffle design for enhanced pollutant interception in rainwater harvesting systems
    Zhang, Qionghua
    Gao, Shiyi
    Gao, Zan
    Zhang, Haoming
    Dzakpasu, Mawuli
    JOURNAL OF WATER PROCESS ENGINEERING, 2025, 70
  • [32] Tube-enhanced multi-stage model predictive control for flexible robust control of constrained linear systems with additive and parametric uncertainties
    Subramanian, Sankaranarayanan
    Lucia, Sergio
    Paulen, Radoslav
    Engell, Sebastian
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2021, 31 (09) : 4458 - 4487
  • [33] Uncertain bang-bang control problem for multi-stage switched systems
    Yan, Hongyan
    Jin, Ting
    Sun, Yun
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2020, 551
  • [34] Optimal control for multi-stage and continuous-time linear singular systems
    Shu, Yadong
    Zhu, Yuanguo
    INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 2018, 49 (07) : 1419 - 1434
  • [35] Study on Lead Time Control Chart in Multi-stage Manufacturing Systems_
    Zhang Meng
    Liu Ya-fen
    2015 27TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC), 2015, : 2009 - 2012
  • [36] Optimizing multi-stage shrimp production systems
    Wang, JK
    Leiman, J
    AQUACULTURAL ENGINEERING, 2000, 22 (04) : 243 - 254
  • [37] Modeling and Design of Multi-stage Separation Systems
    Wolf, Malima I.
    Colledani, Marcello
    Gershwin, Stanley B.
    Gutowski, Timothy G.
    PROCEEDINGS OF THE 2010 IEEE INTERNATIONAL SYMPOSIUM ON SUSTAINABLE SYSTEMS AND TECHNOLOGY (ISSST), 2010,
  • [38] Training and Deploying Multi-Stage Recommender Systems
    Ak, Ronay
    Schifferer, Benedikt
    Rabhi, Sara
    Moreira, Gabriel De Souza P.
    PROCEEDINGS OF THE 16TH ACM CONFERENCE ON RECOMMENDER SYSTEMS, RECSYS 2022, 2022, : 706 - 707
  • [39] Quality costs in multi-stage manufacturing systems
    Chang, SJ
    Hyun, PY
    Park, EH
    COMPUTERS & INDUSTRIAL ENGINEERING, 1996, 31 (1-2) : 115 - 118
  • [40] Lead time control in multi-class multi-stage assembly systems with finite capacity
    Yaghoubi, Saeed
    Noori, Siamak
    Azaron, Amir
    COMPUTERS & INDUSTRIAL ENGINEERING, 2013, 66 (04) : 808 - 817