Identification and Localization of Cyber-Attacks in Industrial Facilities

被引:0
|
作者
Reibelt, Kathrin [1 ]
Matthes, Joerg [1 ]
Keller, Hubert B. [1 ]
Hagenmeyer, Veit [1 ]
机构
[1] Karlsruhe Inst Technol, Hermann Von Helmholtz Pl 1, D-76344 Eggenstein Leopoldshafen, Germany
关键词
cyber-security; Data Reconciliation; industry; 4.0; cyber-physical systems;
D O I
10.1016/B978-0-12-823377-1.50292-5
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
A new method for improving cyber-security of interconnected smart components of industrial systems is introduced and evaluated. Since usual informational security measures are often bypassed (in spite of existing IT security measures), the new proposed method is based on physical models for detecting manipulations resulting from cyber-attacks. The method builds on and goes beyond traditional ways of Data Reconciliation used in chemical facilities by extending it using prior knowledge on informational properties of components. Thereby, our approach is not restricted to a specific attacker model, which is a significant advantage for the detection of unknown cyber-attacks. The attack detection using the new method is demonstrated using the example of a cooling circuit - as it may be found in chemical processing facilities. Receiver operating characteristics (ROC-curves) are used to show and to quantify the improvement provided by our new method over the performance of traditional Data Reconciliation.
引用
收藏
页码:1741 / 1746
页数:6
相关论文
共 50 条
  • [1] Modeling cyber-attacks on Industrial Control Systems
    Paliath, Vivin
    Shakarian, Paulo
    [J]. IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: CYBERSECURITY AND BIG DATA, 2016, : 316 - 318
  • [2] Interval forecasting of cyber-attacks on industrial control systems
    Ivanyo, Y. M.
    Krakovsky, Y. M.
    Luzgin, A. N.
    [J]. INTERNATIONAL CONFERENCE ON MECHANICAL ENGINEERING, AUTOMATION AND CONTROL SYSTEMS 2017, 2018, 327
  • [3] Futuristic cyber-attacks
    Chakkaravarthy, S. Sibi
    Sangeetha, D.
    Rathnam, M. Venkata
    Srinithi, K.
    Vaidehi, V.
    [J]. INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2018, 22 (03) : 195 - 204
  • [4] Cyber-attacks and banking intermediation
    Boungou, Whelsy
    [J]. ECONOMICS LETTERS, 2023, 233
  • [5] Cyber-attacks and international law
    Grove, GD
    Goodman, SE
    Lukasik, SJ
    [J]. SURVIVAL, 2000, 42 (03) : 89 - +
  • [6] Predicting Consequences of Cyber-Attacks
    Datta, Prerit
    Lodinger, Natalie
    Namin, Akbar Siami
    Jones, Keith S.
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2020, : 2073 - 2078
  • [7] Integrated Approach to Diagnostics of Failures and Cyber-Attacks in Industrial Control Systems
    Syfert, Michal
    Ordys, Andrzej
    Koscielny, Jan Maciej
    Wnuk, Pawel
    Mozaryn, Jakub
    Kukielka, Krzysztof
    [J]. ENERGIES, 2022, 15 (17)
  • [8] Towards a unified approach to detection of faults and cyber-attacks in industrial installations
    Koscielny, Jan
    Syfert, Michal
    Ordys, Andrzej
    Wnuk, Pawel
    Mozaryn, Jakub
    Fajdek, Bartlomiej
    Puig, Vicenc
    Kukielka, Krzysztof
    [J]. 2021 EUROPEAN CONTROL CONFERENCE (ECC), 2021, : 1839 - 1844
  • [9] Staying ahead of cyber-attacks
    Green, John
    [J]. Network Security, 2015, 2015 (02) : 13 - 16
  • [10] Changes of Cyber-Attacks Techniques and Patterns after the Fourth Industrial Revolution
    Hur, Chang-Hoi
    Kim, Seong-Pyo
    Kim, Yoon-Soo
    Eom, Jung-Ho
    [J]. 2017 5TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW) 2017, 2017, : 69 - 74