Detection and mitigation of deception attacks on cloud-based industrial control systems

被引:4
|
作者
Akbarian, Fatemeh [1 ]
Tarneberg, William [1 ]
Fitzgerald, Emma [1 ]
Kihl, Maria [1 ]
机构
[1] Lund Univ, Dept Elect & Informat Technol, Lund, Sweden
关键词
Cloud control systems; Deception attack; Attack detection; Attack mitigation;
D O I
10.1109/ICIN53892.2022.9758092
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, because the cloud can provide huge advantages regarding storage and computing resources, industry has been motivated to move industrial control systems to the cloud. However, the cloud also introduces major security challenges, since moving control systems to the cloud can enable attackers to infiltrate the system and establish an attack that can lead to damages and disruptions with potentially catastrophic consequences. Therefore, intrusion detection and mitigation mechanisms are crucial for cloud-based industrial control systems. In this paper, we propose a method for detection and mitigation of deception attacks on actuator signals in cloud-based industrial control systems. We validate our solution on a real testbed and evaluate its capability by subjecting it to a set of attacks. Our proposed solution can detect the attack in a timely manner and keep the plant stable, with an acceptable performance during the attack.
引用
收藏
页码:106 / 110
页数:5
相关论文
共 50 条
  • [1] A Security Framework in Digital Twins for Cloud-based Industrial Control Systems: Intrusion Detection and Mitigation
    Akbarian, Fatemeh
    Tarneberg, William
    Fitzgerald, Emma
    Kihl, Maria
    [J]. 2021 26TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2021,
  • [2] An Anomaly Detection Technique for Deception Attacks in Industrial Control Systems
    Qassim, Q. S.
    Ahmad, A. R.
    Ismail, R.
    Bakar, Abu A.
    Rahim, Abdul F.
    Mokhtar, M. Z.
    Ramli, R.
    Mohd, Yusof B.
    Mahdi, Mohammed Najah
    [J]. 2019 IEEE 5TH INTL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / IEEE INTL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC) / IEEE INTL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2019, : 267 - 272
  • [3] Cloud-based Deception against Network Reconnaissance Attacks using SDN and NFV
    Aydeger, Abdullah
    Saputro, Nico
    Akkaya, Kemal
    [J]. PROCEEDINGS OF THE 2020 IEEE 45TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2020), 2020, : 279 - 285
  • [4] Demonstration: Cloud-Based Industrial Control Services
    Langmann, Reinhard
    Rojas-Pena, Leandro
    [J]. SMART INDUSTRY & SMART EDUCATION, 2019, 47 : 50 - 56
  • [5] Mitigation of sensor attacks on legacy industrial control systems
    Combita, Luis F.
    Cardenas, Alvaro A.
    Quijano, Nicanor
    [J]. 2017 IEEE 3RD COLOMBIAN CONFERENCE ON AUTOMATIC CONTROL (CCAC), 2017,
  • [6] Detection, reconstruction and mitigation of deception attacks in nonlinear cyber-physical systems
    Shahriari-kahkeshi, Maryam
    Alem, Sayed Amirhosein
    Shi, Peng
    [J]. INTERNATIONAL JOURNAL OF ADAPTIVE CONTROL AND SIGNAL PROCESSING, 2024, 38 (09) : 2972 - 2995
  • [7] Active Synchronous Detection of Deception Attacks in Microgrid Control Systems
    Li, Yan
    Zhang, Peng
    Zhang, Liang
    Wang, Bing
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2017, 8 (01) : 373 - 375
  • [8] Detection of Deception Attacks on the Backward Channel of Networked Control Systems
    Pang Zhonghua
    Liu Guoping
    Zhou Donghua
    [J]. PROCEEDINGS OF THE 31ST CHINESE CONTROL CONFERENCE, 2012, : 5972 - 5977
  • [9] Sequential Detection of Deception Attacks in Networked Control Systems with Watermarking
    Salimi, Somayeh
    Dey, Subhrakanti
    Ahlen, Anders
    [J]. 2019 18TH EUROPEAN CONTROL CONFERENCE (ECC), 2019, : 883 - 890
  • [10] Cloud-Based Industrial Cyber-Physical Systems
    Colombo, Armando Walter
    Karnouskos, Stamatis
    [J]. ERCIM NEWS, 2014, (97): : 15 - 16