Detection and mitigation of deception attacks on cloud-based industrial control systems

被引:4
|
作者
Akbarian, Fatemeh [1 ]
Tarneberg, William [1 ]
Fitzgerald, Emma [1 ]
Kihl, Maria [1 ]
机构
[1] Lund Univ, Dept Elect & Informat Technol, Lund, Sweden
关键词
Cloud control systems; Deception attack; Attack detection; Attack mitigation;
D O I
10.1109/ICIN53892.2022.9758092
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, because the cloud can provide huge advantages regarding storage and computing resources, industry has been motivated to move industrial control systems to the cloud. However, the cloud also introduces major security challenges, since moving control systems to the cloud can enable attackers to infiltrate the system and establish an attack that can lead to damages and disruptions with potentially catastrophic consequences. Therefore, intrusion detection and mitigation mechanisms are crucial for cloud-based industrial control systems. In this paper, we propose a method for detection and mitigation of deception attacks on actuator signals in cloud-based industrial control systems. We validate our solution on a real testbed and evaluate its capability by subjecting it to a set of attacks. Our proposed solution can detect the attack in a timely manner and keep the plant stable, with an acceptable performance during the attack.
引用
收藏
页码:106 / 110
页数:5
相关论文
共 50 条
  • [31] Attacks on Industrial Control Systems Modeling and Anomaly Detection
    Eigner, Oliver
    Kreimel, Philipp
    Tavolato, Paul
    [J]. ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, : 581 - 588
  • [32] ON CYBER ATTACKS AND SIGNATURE BASED INTRUSION DETECTION FOR MODBUS BASED INDUSTRIAL CONTROL SYSTEMS
    Gao, Wei
    Morris, Thomas H.
    [J]. JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2014, 9 (01) : 37 - 55
  • [33] Guarding the Cloud: An Effective Detection of Cloud-Based Cyber Attacks using Machine Learning Algorithms
    Rexha, Blerim
    Thaqi, Rrezearta
    Mazrekaj, Artan
    Vishi, Kamer
    [J]. INTERNATIONAL JOURNAL OF ONLINE AND BIOMEDICAL ENGINEERING, 2023, 19 (18) : 158 - 174
  • [34] Cloud-based Testbed for Simulation of Cyber Attacks
    Kouril, Daniel
    Rebok, Tomas
    Jirsik, Tomas
    Cegan, Jakub
    Drasar, Martin
    Vizvary, Martin
    Vykopal, Jan
    [J]. 2014 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (NOMS), 2014,
  • [35] Architecture for Cloud-Based Industrial Automation
    Mahmoud, Magdi S.
    [J]. THIRD INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, 2019, 797 : 51 - 62
  • [36] Edge Computing in Industrial IoT Framework for Cloud-based Manufacturing Control
    Raileanu, Silviu
    Borangiu, Theodor
    Morariu, Octavian
    Iacob, Iulia
    [J]. 2018 22ND INTERNATIONAL CONFERENCE ON SYSTEM THEORY, CONTROL AND COMPUTING (ICSTCC), 2018, : 261 - 266
  • [37] Industrial Cyberphysical Systems Realizing Cloud-Based Big Data Infrastructures
    Cheng, Bo
    Zhang, Jingyi
    Hancke, Gerhard P.
    Karnouskos, Stamatis
    Colombo, Armando Walter
    [J]. IEEE INDUSTRIAL ELECTRONICS MAGAZINE, 2018, 12 (01) : 25 - 35
  • [38] Optimizing Camera Stream Transport in Cloud-Based Industrial Robotic Systems
    Balogh, Marcell
    Vidacs, Attila
    [J]. INFOCOMMUNICATIONS JOURNAL, 2022, 14 (01): : 36 - 42
  • [39] A survey on Detection and mitigation of zombie attacks in cloud environment
    Rakshitha, C. M.
    Ashwini, B. P.
    [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2016, : 764 - 769
  • [40] Detection and Mitigation of False Data Injection Attacks in Networked Control Systems
    Sargolzaei, Arman
    Yazdani, Kasra
    Abbaspour, Alireza
    Crane, Carl D., III
    Dixon, Warren E.
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (06) : 4281 - 4292