COVERT MISAPPROPRIATION OF NETWORKED CONTROL SYSTEMS PRESENTING A FEEDBACK STRUCTURE

被引:191
作者
Smith, Roy S. [1 ,2 ]
机构
[1] Swiss Fed Inst Technol, Zurich, Switzerland
[2] Univ Calif Santa Barbara, Santa Barbara, CA 93106 USA
来源
IEEE CONTROL SYSTEMS MAGAZINE | 2015年 / 35卷 / 01期
关键词
Feedback; -; Crime;
D O I
10.1109/MCS.2014.2364723
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing availability of Internet connectivity and networked actuation and sensing components has supported the growth in control systems operated over public networks. Controllers and plants no longer need to be physically colocated as measurements and actuation signals can be sent digitally. Supervisory systems can monitor and control geographically widespread components. However, such systems are now exposed to the risk of remote interference. A feedback structure that allows an attacker to take over control of the plant while remaining hidden from the control and supervisory system(s) is presented. The objective is not to facilitate such attacks but rather to make clear the degree to which the takeover of plant control can be hidden when a sophisticated attacker has some plant knowledge and signal intervention capabilities. © 1991-2012 IEEE.
引用
收藏
页码:82 / 92
页数:11
相关论文
共 15 条
[1]   Cyber Security of Water SCADA Systems-Part II: Attack Detection Using Enhanced Hydrodynamic Models [J].
Amin, Saurabh ;
Litrico, Xavier ;
Sastry, S. Shankar ;
Bayen, Alexandre M. .
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2013, 21 (05) :1679-1693
[2]   Cyber Security of Water SCADA Systems-Part I: Analysis and Experimentation of Stealthy Deception Attacks [J].
Amin, Saurabh ;
Litrico, Xavier ;
Sastry, Shankar ;
Bayen, Alexandre M. .
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2013, 21 (05) :1963-1970
[3]  
[Anonymous], 1989, Robust Process Control
[4]  
Bologna S, 2008, P 43 INT U POW ENG C, P1
[5]  
Falliere Nicolas., 2010, W.32 Stuxnet Dossier, version 1.0
[6]   Security issues in SCADA networks [J].
Igure, Vinay M. ;
Laughter, Sean A. ;
Williams, Ronald D. .
COMPUTERS & SECURITY, 2006, 25 (07) :498-506
[7]  
Mo Y., 2013, IEEE T CONTR SYST T, V22, P1396
[8]   Attack Detection and Identification in Cyber-Physical Systems [J].
Pasqualetti, Fabio ;
Doerfler, Florian ;
Bullo, Francesco .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2013, 58 (11) :2715-2729
[9]   MIMO Smith predictor: Global and structured robust performance analysis [J].
Sanchez-Pena, Ricardo S. ;
Bolea, Yolanda ;
Puig, Vicenc .
JOURNAL OF PROCESS CONTROL, 2009, 19 (01) :163-177
[10]  
Sandberg H., 2010, 1 WORKSH SEC CONTR S, P1