Improving Control System Cyber-State Awareness Using Known Secure Sensor Measurements
Abstract
This paper presents design and simulation of a low cost and low false alarm rate method for improved cyber-state awareness of critical control systems - the Known Secure Sensor Measurements (KSSM) method. The KSSM concept relies on physical measurements to detect malicious falsification of the control systems state. The KSSM method can be incrementally integrated with already installed control systems for enhanced resilience. This paper reviews the previously developed theoretical KSSM concept and then describes a simulation of the KSSM system. A simulated control system network is integrated with the KSSM components. The effectiveness of detection of various intrusion scenarios is demonstrated on several control system network topologies.
Keywords
Cyber-Security Critical Control Systems State-AwarenessPreview
Unable to display preview. Download preview PDF.
References
- 1.Linda, O., Manic, M., McJunkin, T.R.: Anomaly Detection for Resilient Control Systems Using Fuzzy-Neural Data Fusion Engine. In: Proc. IEEE Symposium on Resilient Control Systems (August 2011)Google Scholar
- 2.Rieger, C.G., Gertman, D.I., McQueen, M.A.: Resilient Control Systems: Next Generation Design Research. In: Proc. 2nd IEEE Conf. on Human System Interactions, Catania, Italy, pp. 632–636 (May 2009)Google Scholar
- 3.Stamp, M.: Information Security, ch. 3-5, 9, 2nd edn. John Wiley and Sons (2011)Google Scholar
- 4.Ferguson, N., Schneier, B., Kohno, T.: Cryptography Engineering, ch. 3-7 (2010)Google Scholar
- 5.McQueen, M., Giani, A.: ’Known Secure Sensor Measurements’ for Critical Infrastructure Systems: Detecting Falsification of Systems State. In: Troubitsyna, E.A. (ed.) SERENE 2011. LNCS, vol. 6968, pp. 156–163. Springer, Heidelberg (2011)CrossRefGoogle Scholar
- 6.Giani, A., Bitar, E., McQueen, M., Khargonekar, P., Poolla, K.: Smart Grid Data Integrity Attacks: Characterization and Countermeasures. In: Proc. of IEEE SmartGridComm (October 2011)Google Scholar
- 7.Linda, O., Vollmer, T., Manic, M.: Neural Network based Intrusion Detection System for Critical Infrastructure. In: Proc. IJCNN 2009 (June 2009)Google Scholar
- 8.Linda, O., Manic, M., Vollmer, T., Wright, J.: Fuzzy Logic Based Anomaly Detection for Embedded Network Security Cyber Sensor. In: Proc. of IEEE Symposium on Computational Intelligence, pp. 202–209 (April 2011)Google Scholar
- 9.Yang, D., Usynin, A., Hines, J.W.: Anomaly-Based Intrusion Detection for SCADA Systems. In: 5th Intl. Topical Meeting on Nuclear Plant Instrumentation, Control and Human Machine Interface Technologies (NPIC&HMIT 2005), Albuquerque, NM, November 12-16 (2006)Google Scholar
- 10.Zhong, S., Khoshgoftaar, T., Seliya, N.: Clustering-based network intrusion detection. Intl. Journal of Reliability, Quality and Safety 14(2), 169–187 (2007)CrossRefGoogle Scholar