Industrial control systems (ICS) include systems that control industrial processes in critical infrastructure such as electric grids, nuclear power plants, manufacturing plans, water treatment systems, pharmaceutical plants, and building automation systems. ICS represent complex systems that contain an abundance of unique devices all of which may hold different types of software, including applications, firmware and operating systems. Due to their ability to control physical infrastructure, ICS have more and more become targets of cyber-attacks, increasing the risk of serious damage, negative financial impact, disruption to business operations, disruption to communities, and even the loss of life. Ethical hacking represents onemore »
COMPARISON OF DESIGN- AND DATACENTRIC METHODS FOR DISTRIBUTED ATTACK DETECTION IN CYBERPHYSICAL SYSTEMS
Cyber-physical systems are vulnerable to a variety of cyber, physical
and cyber-physical attacks. The security of cyber-physical systems can
be enhanced beyond what can be achieved through firewalls and trusted
components by building trust from observed and/or expected behaviors.
These behaviors can be encoded as invariants. Information flows that
do not satisfy the invariants are used to identify and isolate malfunctioning
devices and cyber intrusions. However, the distributed architectures
of cyber-physical systems often contain multiple access points
that are physically and/or digitally linked. Thus, invariants may be
difficult to determine and/or computationally prohibitive to check in
real time. Researchers have employed various methods for determining
the invariants by analyzing the designs of and/or data generated
by cyber-physical systems such as water treatment plants and electric
power grids. This chapter compares the effectiveness of detecting attacks
on a water treatment plant using design-centric invariants versus
data-centric rules, the latter generated using a variety of data mining
methods. The methods are compared based on the maximization of
true positives and minimization of false positives.
- Award ID(s):
- 1837472
- Publication Date:
- NSF-PAR ID:
- 10190268
- Journal Name:
- Critical Infrastructure Protection XIV
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
Reconnaissance is critical for adversaries to prepare attacks causing physical damage in industrial control systems (ICS) like smart power grids. Disrupting reconnaissance is challenging. The state-of-the-art moving target defense (MTD) techniques based on mimicking and simulating system behaviors do not consider the physical infrastructure of power grids and can be easily identified. To overcome these challenges, we propose physical function virtualization (PFV) that “hooks” network interactions with real physical devices and uses these real devices to build lightweight virtual nodes that follow the actual implementation of network stacks, system invariants, and physical state variations in the real devices. On topmore »
-
Reconnaissance is critical for adversaries to prepare attacks causing physical damage in industrial control systems (ICS) like smart power grids. Disrupting the reconnaissance is challenging. The state-of-the-art moving target defense (MTD) techniques based on mimicking and simulating system behaviors do not consider the physical infrastructure of power grids and can be easily identified. To overcome those challenges, we propose physical function virtualization (PFV) that ``hooks'' network interactions with real physical devices and uses them to build lightweight virtual nodes following the actual implementation of network stacks, system invariants, and physical state variations of real devices. On top of PFV, wemore »
-
Controllers of security-critical cyber-physical systems, like the power grid, are a very important class of computer systems. Attacks against the control code of a power-grid system, especially zero-day attacks, can be catastrophic. Earlier detection of the anomalies can prevent further damage. However, detecting zero-day attacks is extremely challenging because they have no known code and have unknown behavior. Furthermore, if data collected from the controller is transferred to a server through networks for analysis and detection of anomalous behavior, this creates a very large attack surface and also delays detection. In order to address this problem, we propose Reconstruction Errormore »
-
Industrial Control Systems (ICS) are used to control physical processes in critical infrastructure. These systems are used in a wide variety of operations such as water treatment, power generation and distribution, and manufacturing. While the safety and security of these systems are of serious concern, recent reports have shown an increase in targeted attacks aimed at manipulating physical processes to cause catastrophic consequences. This trend emphasizes the need for algorithms and tools that provide resilient and smart attack detection mechanisms to protect ICS. In this paper, we propose an anomaly detection framework for ICS based on a deep neural network.more »