An Investigation into the Response of a Water Treatment System to Cyber Attacks

被引:48
|
作者
Adepu, Sridhar [1 ]
Mathur, Aditya [1 ]
机构
[1] Singapore Univ Technol & Design, Ctr Cyber Secur Res, iTrust, Singapore, Singapore
关键词
Attack detection; attacker model; attack model; cyber attacks; cyber security; Cyber Physical Systems; Secure Water Treatment testbed;
D O I
10.1109/HASE.2016.14
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
An experimental investigation was undertaken to understand the impact of single-point cyber attacks on a Secure Water Treatment (SWaT) system. Cyber attacks were launched on SWaT through its SCADA server that connects to the Programmable Logic Controllers (PLCs) that in turn are connected to sensors and actuators. Attacks were designed to meet attacker objectives selected from a novel attacker model. Outcome of the experiments led to a better understanding of (a) the propagation of an attack across the system measured in terms of the number of components affected and (b) the behavior of the water treatment process in SWaT in response to the attacks. The observed response to various attacks was then used to propose attack detection mechanisms based on various physical properties measured during the treatment process.
引用
收藏
页码:141 / 148
页数:8
相关论文
共 50 条
  • [21] INVESTIGATION ON CYBER-ATTACKS AGAINST IN-VEHICLE NETWORK
    Kumar, S. Vishnu
    Mary, G. Aloy Anuja
    Suresh, P.
    Uthirasamy, R.
    2021 7TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENERGY SYSTEMS (ICEES), 2021, : 305 - 311
  • [22] Coordinated cyber-physical attacks of cyber-physical power system
    Yang Y.
    Lan S.
    Qin Z.
    Liu H.
    Dianli Zidonghua Shebei/Electric Power Automation Equipment, 2020, 40 (02): : 97 - 102
  • [23] Mathematical Investigation of Cryptographic Functions and Operations Used in Cyber Attacks
    Gencoglu, Muharrem Tuncay
    2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2017, : 942 - 947
  • [24] Online Monitoring of a Cyber Physical System against Control Aware Cyber Attacks
    Gawand, Hemangi Laxman
    Bhattacharjee, A. K.
    Roy, Kallol
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON ECO-FRIENDLY COMPUTING AND COMMUNICATION SYSTEMS, 2015, 70 : 238 - 244
  • [25] System Information Comparison and Analysis Technology for Cyber Attacks
    Youn, Hyeonsu
    Kim, Duhoe
    Kim, Yong-Hyun
    Shin, Dongkyoo
    Shin, Dongil
    ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2018, 474 : 446 - 451
  • [26] High Performance Adaptive System for Cyber Attacks Detection
    Komar, Myroslav
    Kochan, Volodymyr
    Dubchak, Lesia
    Sachenko, Anatoliy
    Golovko, Vladimir
    Bezobrazov, Sergei
    Romanets, Ihor
    PROCEEDINGS OF THE 2017 9TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS (IDAACS), VOL 2, 2017, : 853 - 858
  • [27] Cyber-Attacks on Smart Grid System: A Review
    Gajanan, Linge Sagar
    Kirar, Mukesh
    Raju, More
    2022 IEEE 10TH POWER INDIA INTERNATIONAL CONFERENCE, PIICON, 2022,
  • [28] Investigating the Impact of Cyber Attacks on Power System Reliability
    Zhang, Yichi
    Wang, Lingfeng
    Sun, Weiqing
    2013 IEEE 3RD ANNUAL INTERNATIONAL CONFERENCE ON CYBER TECHNOLOGY IN AUTOMATION, CONTROL AND INTELLIGENT SYSTEMS (CYBER), 2013, : 462 - +
  • [29] MPC for the Cyber-Physical System with Deception Attacks
    Liu, Yuezhi
    Chen, Yong
    Li, Meng
    Wan, Zhi
    PROCEEDINGS OF THE 32ND 2020 CHINESE CONTROL AND DECISION CONFERENCE (CCDC 2020), 2020, : 3847 - 3852
  • [30] Cascading Failures of Power System with the Consideration of Cyber Attacks
    Tu, Haicheng
    Shen, Hui-Liang
    Xia, Yongxiang
    2020 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2020,