Integrated Approach to Diagnostics of Failures and Cyber-Attacks in Industrial Control Systems

被引:4
|
作者
Syfert, Michal [1 ]
Ordys, Andrzej [1 ]
Koscielny, Jan Maciej [1 ]
Wnuk, Pawel [1 ]
Mozaryn, Jakub [1 ]
Kukielka, Krzysztof [1 ]
机构
[1] Warsaw Univ Technol, Fac Mechatron, Inst Automat Control & Robot, Ul Sw A Boboli 8, PL-02525 Warsaw, Poland
关键词
failure detection; cyber-attack detection; cyber-attacks isolation; DATA-INJECTION ATTACKS; FUNCTIONAL SAFETY; FRAMEWORK; SECURITY; STUXNET; IMPACT; MODEL;
D O I
10.3390/en15176212
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
This paper is concerned with the issue of the diagnostics of process faults and the detection of cyber-attacks in industrial control systems. This problem is of significant importance to energy production and distribution, which, being part of critical infrastructure, is usually equipped with process diagnostics and, at the same time, is often subject to cyber-attacks. A commonly used approach would be to separate the two types of anomalies. The detection of process faults would be handled by a control team, often with a help of dedicated diagnostic tools, whereas the detection of cyber-attacks would be handled by an information technology team. In this article, it is postulated here that the two can be usefully merged together into one, comprehensive, anomaly detection system. For this purpose, firstly, the main types of cyber-attacks and the main methods of detecting cyber-attacks are being reviewed. Subsequently, in the analogy to "process fault"-a term well established in process diagnostics-the term "cyber-fault" is introduced. Within this context a cyber-attack is considered as a vector containing a number of cyber-faults. Next, it is explained how methods used in process diagnostics for fault detection and isolation can be applied to the detection of cyber-attacks and, in some cases, also to isolation of the components of such attacks, i.e., cyber-faults. A laboratory stand and a simulator have been developed to test the proposed approach. Some test results are presented, demonstrating that, similarly to equipment/process faults, residua can be established and cyber-faults can be identified based on the mismatch between the real data from the system and the outputs of the simulation model.
引用
收藏
页数:24
相关论文
共 50 条
  • [1] Integrated protection of industrial control systems from cyber-attacks: the ATENA approach
    Adamsky, F.
    Aubigny, M.
    Battisti, F.
    Carli, M.
    Cimorelli, F.
    Cruz, T.
    Di Giorgio, A.
    Foglietta, C.
    Galli, A.
    Giuseppi, A.
    Liberati, F.
    Neri, A.
    Panzieri, S.
    Pascucci, F.
    Proenca, J.
    Pucci, P.
    Rosa, L.
    Soua, R.
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2018, 21 : 72 - 82
  • [2] Modeling cyber-attacks on Industrial Control Systems
    Paliath, Vivin
    Shakarian, Paulo
    [J]. IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: CYBERSECURITY AND BIG DATA, 2016, : 316 - 318
  • [3] Interval forecasting of cyber-attacks on industrial control systems
    Ivanyo, Y. M.
    Krakovsky, Y. M.
    Luzgin, A. N.
    [J]. INTERNATIONAL CONFERENCE ON MECHANICAL ENGINEERING, AUTOMATION AND CONTROL SYSTEMS 2017, 2018, 327
  • [4] Key Vulnerabilities of Industrial Automation and Control Systems and Recommendations to Prevent Cyber-Attacks
    Calvo, I.
    Etxeberria-Agiriano, I.
    Inigo, M. A.
    Gonzalez-Nalda, P.
    [J]. INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2016, 12 (01) : 9 - 16
  • [5] ExtHT: A hybrid tracing method for cyber-attacks in power industrial control systems
    Chen, Yang-Rong
    Wang, Yu
    Huang, Gui-Rong
    Li, Jun-E
    [J]. ISA TRANSACTIONS, 2023, 136 : 1 - 15
  • [6] Securing Industrial Control Systems From Cyber-Attacks: A Stacked Neural-Network-Based Approach
    Jagtap, Sujeet S.
    Sriram, V. S. Shankar
    Subramaniyaswamy, V.
    Kotecha, Ketan
    [J]. IEEE CONSUMER ELECTRONICS MAGAZINE, 2024, 13 (01) : 30 - 38
  • [7] Detecting network cyber-attacks using an integrated statistical approach
    Bouyeddou, Benamar
    Harrou, Fouzi
    Kadri, Benamar
    Sun, Ying
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (02): : 1435 - 1453
  • [8] Understanding Indicators of Compromise against Cyber-attacks in Industrial Control Systems: A Security Perspective
    Asiri, Mohammed
    Saxena, Neetesh
    Gjomemo, Rigel
    Burnap, Pete
    [J]. ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS, 2023, 7 (02)
  • [9] CNN based method for the development of cyber-attacks detection algorithms in industrial control systems
    Nedeljkovic, Dusan
    Jakovljevic, Zivana
    [J]. COMPUTERS & SECURITY, 2022, 114
  • [10] CNN based method for the development of cyber-attacks detection algorithms in industrial control systems
    Nedeljkovic, Dusan
    Jakovljevic, Zivana
    [J]. Computers and Security, 2022, 114