DETECTING CYBER ATTACKS ON NUCLEAR POWER PLANTS

被引:0
|
作者
Rrushi, Julian [1 ]
Campbell, Roy [1 ]
机构
[1] Univ Illinois, Dept Comp Sci, 1304 W Springfield Ave, Urbana, IL 61801 USA
来源
关键词
Nuclear plants; intrusion detection; stochastic activity networks;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes an unconventional anomaly detection approach that provides digital instrumentation and control (I&C) systems in a nuclear power plant (NPP) with the capability to probabilistically discern between legitimate protocol frames and attack frames. The stochastic activity network (SAN) formalism is used to model the fusion of protocol activity in each digital I&C system and the operation of physical components of all NPP. SAN models are employed to analyze links between protocol frames as streams of bytes, their semantics in terms of NPP operations, control data as stored in the memory of I&C systems, the operations of I&C systems on NPP components, and NPP processes. Reward rates and impulse rewards are defined in the SAN models based on the activity-marking reward structure to estimate NPP operation profiles. These profiles are then used to probabilistically estimate the legitimacy of the semantics and payloads of protocol frames received by I&C systems.
引用
收藏
页码:41 / +
页数:3
相关论文
共 50 条
  • [31] A Linguistic Analysis Metric in Detecting Ransomware Cyber-attacks
    Florea, Diana
    Patterson, Wayne
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (11) : 517 - 522
  • [32] An attack-norm separation approach for detecting cyber attacks
    Ye, Nong
    Farley, Toni
    Lakshminarasimhan, Deepak
    [J]. INFORMATION SYSTEMS FRONTIERS, 2006, 8 (03) : 163 - 177
  • [33] A Method of Synchrophasor Technology for Detecting and Analyzing Cyber-Attacks
    Al-Sarray, Muthanna
    McCann, Roy A.
    [J]. 2016 NORTH AMERICAN POWER SYMPOSIUM (NAPS), 2016,
  • [34] Alert Correlation for Detecting Cyber-Manufacturing Attacks and Intrusions
    Wu, Mingtao
    Moon, Young B.
    [J]. JOURNAL OF COMPUTING AND INFORMATION SCIENCE IN ENGINEERING, 2020, 20 (01)
  • [35] Detecting Distributed Cyber Attacks in SDN Based on Automatic Thresholding
    Komiya, Ryousuke
    Feng, Yaokai
    Sakurai, Kouichi
    [J]. 2018 SIXTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS (CANDARW 2018), 2018, : 417 - 423
  • [36] A rule-based approach for detecting heartbleed cyber attacks
    Amodei, A.
    Capriglione, D.
    Ferrigno, L.
    Miele, G.
    Tomasso, G.
    Cerro, G.
    [J]. 2022 IEEE INTERNATIONAL SYMPOSIUM ON MEASUREMENTS & NETWORKING (M&N 2022), 2022,
  • [37] Detecting covert channel attacks on cyber-physical systems
    Li, Hongwei
    Chasaki, Danai
    [J]. IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2023, 9 (03) : 228 - 237
  • [38] Adversarial Regression for Detecting Attacks in Cyber-Physical Systems
    Ghafouri, Amin
    Vorobeychik, Yevgeniy
    Koutsoukos, Xenofon
    [J]. PROCEEDINGS OF THE TWENTY-SEVENTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2018, : 3769 - 3775
  • [39] A Tutorial on Detecting Security Attacks on Cyber-Physical Systems
    Griffioen, Paul
    Weerakkody, Sean
    Ozel, Omur
    Mo, Yilin
    Sinopoli, Bruno
    [J]. 2019 18TH EUROPEAN CONTROL CONFERENCE (ECC), 2019, : 979 - 984
  • [40] From Design to Invariants: Detecting Attacks on Cyber Physical Systems
    Adepu, Sridhar
    Mathur, Aditya
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C), 2017, : 533 - 540