NoiSense Print: Detecting Data Integrity Attacks on Sensor Measurements Using Hardware-based Fingerprints

被引:19
|
作者
Ahmed, Chuadhry Mujeeb [1 ]
Mathur, Aditya P. [1 ]
Ochoa, Martin [1 ,2 ]
机构
[1] Singapore Univ Technol & Design, 8 Somapah Rd, Singapore, Singapore
[2] AppGate Inc, Dallas, TX USA
关键词
Cyber physical systems; CPS security; ICS security; sensors security; device fingerprinting; physical attacks; sensor fingerprinting; attack detection; sensor noise; process noise; CPS threat modeling; challenge response protocol; machine learning-based intrusion detection; PHYSICAL DEVICE;
D O I
10.1145/3410447
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fingerprinting of various physical and logical devices has been proposed for uniquely identifying users or devices of mainstream IT systems such as PCs, laptops, and smart phones. However, the application of such techniques in Industrial Control Systems (ICS) is less explored for reasons such as a lack of direct access to such systems and the cost of faithfully reproducing realistic threat scenarios. This work addresses the feasibility of using fingerprinting techniques in the context of realistic ICS related to water treatment and distribution systems. A model-free sensor fingerprinting scheme (NoiSense) and a model-based sensor fingerprinting scheme (NoisePrint) are proposed. Using extensive experimentation with sensors, it is shown that noise patterns due to microscopic imperfections in hardware manufacturing can uniquely identify sensors with accuracy as high as 97%. The proposed technique can be used to detect physical attacks, such as the replacement of legitimate sensors by faulty or manipulated sensors. For NoisePrint, a combined fingerprint for sensor and process noise is created. The difference (called residual), between expected and observed values, i.e., noise, is used to derive a model of the system. It was found that in steady state the residual vector is a function of process and sensor noise. Data from experiments reveals that a multitude of sensors can be uniquely identified with a minimum accuracy of 90% based on NoisePrint. Also proposed is a novel challenge-response protocol that exposes more powerful cyber-attacks, including replay attacks.
引用
收藏
页数:35
相关论文
共 38 条
  • [1] Technique for detecting hardware-based Trojans using a convolutional neural network
    Ravichandran, C.
    Nagalakshmi, T. J.
    Bharathi, P. Shyamala
    Sivakumaran, C.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2024, 23 (03)
  • [2] Counteracting Modeling Attacks using Hardware-based Dynamic Physical Unclonable Function
    Rajput, Shailesh
    Dofe, Jaya
    [J]. 2023 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2023, : 586 - 591
  • [3] Detecting Data Integrity Attacks on SCADA Systems Using Limited PMUs
    Pal, Seemita
    Sikdar, Biplab
    Chow, Joe
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2016,
  • [4] Sensor validation using hardware-based on-line learning neural networks
    Napolitano, MR
    Silvestri, G
    Windon, DA
    Casanova, JL
    Innocenti, M
    [J]. IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS, 1998, 34 (02) : 456 - 468
  • [5] Detecting data manipulation attacks on physiological sensor measurements in wearable medical systems
    Cai H.
    Venkatasubramanian K.K.
    [J]. Venkatasubramanian, Krishna K. (kven@wpi.edu), 2018, Springer International Publishing (2018)
  • [6] Towards Trusted Software-Defined Networks using a Hardware-based Integrity Measurement Architecture
    Jacquin, Ludovic
    Shaw, Adrian L.
    Dalton, Chris
    [J]. 2015 1ST IEEE CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT), 2015,
  • [7] Secure Multiparty Data Sharing in the Cloud using Hardware-based TPM Devices
    Thilakanathan, Danan
    Calvo, Rafael A.
    Chen, Shiping
    Nepal, Surya
    Liu, Dongxi
    Zic, John
    [J]. 2014 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2014, : 224 - 231
  • [8] USING A HARDWARE-BASED RELATIONAL DATA MANAGEMENT-SYSTEM TO MANAGE EPIDEMIOLOGIC SURVEY DATA
    DICKINSON, P
    GATEWOOD, L
    HUBER, J
    [J]. CONTROLLED CLINICAL TRIALS, 1988, 9 (03): : 274 - 274
  • [9] Hardware-Based Model of Node Clustering Using Q-Learning for Wireless Sensor Networks
    Delos Santos Manarang, Gienel Francheska
    Rodriguez Mina, Rusty John Lloyd
    Reyes Salvador, Mikko Chino
    Gusad De Leon, Maria Theresa
    Jagunap Densing, Chris Vincent
    Driz Rosales, Marc
    Ballesil Alvarez, Anastacia
    [J]. PROCEEDINGS OF TENCON 2018 - 2018 IEEE REGION 10 CONFERENCE, 2018, : 1673 - 1678
  • [10] Detecting DDoS Attacks within Milliseconds by Using FPGA-based Hardware Acceleration
    Nagy, Balazs
    Orosz, Peter
    Tothfalusi, Tamas
    Kovacs, Laszlo
    Varga, Pal
    [J]. NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,