Published: October 24, 2016
Author(s)
David Urbina (University of Texas at Dallas), Jairo Giraldo (University of Texas at Dallas), Álvaro Cárdenas (University of Texas at Dallas), Nils Tippenhauer (Singapore University of Technology and Design), Junia Valente (University of Texas at Dallas), Mustafa Faisal (University of Texas at Dallas), Justin Ruths (University of Texas at Dallas), Richard Candell (NIST), Henrik Sandberg (KTH Royal Institute of Technology)
Conference
Name: 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16)
Dates: 10/24/2016 - 10/28/2016
Location: Vienna, Austria
Citation: CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security,
While attacks on information systems have for most practical purposes binary outcomes (information was manipulated/eavesdropped, or not), attacks manipulating the sensor or control signals of Industrial Control Systems (ICS) can be tuned by the attacker to cause a continuous spectrum in damages. Attackers that want to remain undetected can attempt to hide their manipulation of the system by following closely the expected behavior of the system, while injecting just enough false information at each time step to achieve their goals. In this work, we study if attack-detection can limit the impact of such stealthy attacks. We start with a comprehensive review of related work on attack detection schemes in the security and control systems community. We then show that many of those works use detection schemes that are not limiting the impact of stealthy attacks. We propose a new metric to measure the impact of stealthy attacks and how they relate to our selection on an upper bound on false alarms. We finally show that the impact of such attacks can be mitigated in several cases by the proper combination and configuration of detection schemes. We demonstrate the effectiveness of our algorithms through simulations and experiments using real ICS testbeds and real ICS systems.
While attacks on information systems have for most practical purposes binary outcomes (information was manipulated/eavesdropped, or not), attacks manipulating the sensor or control signals of Industrial Control Systems (ICS) can be tuned by the attacker to cause a continuous spectrum in damages....
See full abstract
While attacks on information systems have for most practical purposes binary outcomes (information was manipulated/eavesdropped, or not), attacks manipulating the sensor or control signals of Industrial Control Systems (ICS) can be tuned by the attacker to cause a continuous spectrum in damages. Attackers that want to remain undetected can attempt to hide their manipulation of the system by following closely the expected behavior of the system, while injecting just enough false information at each time step to achieve their goals. In this work, we study if attack-detection can limit the impact of such stealthy attacks. We start with a comprehensive review of related work on attack detection schemes in the security and control systems community. We then show that many of those works use detection schemes that are not limiting the impact of stealthy attacks. We propose a new metric to measure the impact of stealthy attacks and how they relate to our selection on an upper bound on false alarms. We finally show that the impact of such attacks can be mitigated in several cases by the proper combination and configuration of detection schemes. We demonstrate the effectiveness of our algorithms through simulations and experiments using real ICS testbeds and real ICS systems.
Hide full abstract
Keywords
attack detection; cybersecurity; ICS; industrial control systems
Control Families
None selected