Cyber Security of Water SCADA Systems-Part I: Analysis and Experimentation of Stealthy Deception Attacks

被引:239
作者
Amin, Saurabh [1 ]
Litrico, Xavier [2 ]
Sastry, Shankar [3 ]
Bayen, Alexandre M. [3 ,4 ]
机构
[1] MIT, Dept Civil & Environm Engn, Cambridge, MA 02139 USA
[2] Res & Dev Ctr Lyonnaise Eaux, F-33300 Bordeaux, France
[3] Univ Calif Berkeley, Dept Elect Engn & Comp Sci, Berkeley, CA 94720 USA
[4] Univ Calif Berkeley, Dept Civil & Environm Engn, Berkeley, CA 94720 USA
基金
美国国家科学基金会;
关键词
Delay systems; fault diagnosis; intrusion detection; supervisory control and data acquisition (SCADA) systems; supervisory control; UNKNOWN INPUT OBSERVERS;
D O I
10.1109/TCST.2012.2211873
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This brief aims to perform security threat assessment of networked control systems with regulatory and supervisory control layers. We analyze the performance of a proportional-integral controller (regulatory layer) and a model-based diagnostic scheme (supervisory layer) under a class of deception attacks. We adopt a conservative approach by assuming that the attacker has knowledge of: 1) the system dynamics; 2) the parameters of the diagnostic scheme; and 3) the sensor-control signals. The deception attack presented here can enable remote water pilfering from automated canal systems. We also report a field-operational test attack on the Gignac canal system located in Southern France.
引用
收藏
页码:1963 / 1970
页数:8
相关论文
共 15 条
[1]   Cyber Security of Water SCADA Systems-Part II: Attack Detection Using Enhanced Hydrodynamic Models [J].
Amin, Saurabh ;
Litrico, Xavier ;
Sastry, S. Shankar ;
Bayen, Alexandre M. .
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2013, 21 (05) :1679-1693
[2]  
[Anonymous], 2011, P 6 ACM S INF COMP C, DOI DOI 10.1145/1966913.1966959
[3]  
[Anonymous], 2010, SYMANTEC SECURITY RE
[4]  
Attorney U., 2007, Willows man arrested for hacking into Tehama Colusa Canal Authority computer system
[5]   Algorithms for leak detection, estimation, isolation and localization in open water channels [J].
Bedjaoui, Nadia ;
Weyer, Erik .
CONTROL ENGINEERING PRACTICE, 2011, 19 (06) :564-573
[6]   Control of large-scale irrigation networks [J].
Cantoni, Michael ;
Weyer, Erik ;
Li, Yuping ;
Ooi, Su Ki ;
Mareels, Iven ;
Ryan, Matthew .
PROCEEDINGS OF THE IEEE, 2007, 95 (01) :75-91
[7]  
Cardenas A., 2008, HOTSEC, P1
[8]   Unknown input observers and residual generators for linear time delay systems [J].
Conte, G ;
Perdon, AM .
CURRENT TRENDS IN NONLINEAR SYSTEMS AND CONTROL: IN HONOR OF PETAR KOKOTOVIC AND TURI NICOSIA, 2006, :15-+
[9]   FULL-ORDER OBSERVERS FOR LINEAR-SYSTEMS WITH UNKNOWN INPUTS [J].
DAROUACH, M ;
ZASADZINSKI, M ;
XU, SJ .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 1994, 39 (03) :606-609
[10]  
Koenig D, 2005, IEEE DECIS CONTR P, P5794