Improving Control System Cyber-State Awareness Using Known Secure Sensor Measurements

  • Ondrej Linda
  • Milos Manic
  • Miles McQueen
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7722)


This paper presents design and simulation of a low cost and low false alarm rate method for improved cyber-state awareness of critical control systems - the Known Secure Sensor Measurements (KSSM) method. The KSSM concept relies on physical measurements to detect malicious falsification of the control systems state. The KSSM method can be incrementally integrated with already installed control systems for enhanced resilience. This paper reviews the previously developed theoretical KSSM concept and then describes a simulation of the KSSM system. A simulated control system network is integrated with the KSSM components. The effectiveness of detection of various intrusion scenarios is demonstrated on several control system network topologies.


Cyber-Security Critical Control Systems State-Awareness 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Linda, O., Manic, M., McJunkin, T.R.: Anomaly Detection for Resilient Control Systems Using Fuzzy-Neural Data Fusion Engine. In: Proc. IEEE Symposium on Resilient Control Systems (August 2011)Google Scholar
  2. 2.
    Rieger, C.G., Gertman, D.I., McQueen, M.A.: Resilient Control Systems: Next Generation Design Research. In: Proc. 2nd IEEE Conf. on Human System Interactions, Catania, Italy, pp. 632–636 (May 2009)Google Scholar
  3. 3.
    Stamp, M.: Information Security, ch. 3-5, 9, 2nd edn. John Wiley and Sons (2011)Google Scholar
  4. 4.
    Ferguson, N., Schneier, B., Kohno, T.: Cryptography Engineering, ch. 3-7 (2010)Google Scholar
  5. 5.
    McQueen, M., Giani, A.: ’Known Secure Sensor Measurements’ for Critical Infrastructure Systems: Detecting Falsification of Systems State. In: Troubitsyna, E.A. (ed.) SERENE 2011. LNCS, vol. 6968, pp. 156–163. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  6. 6.
    Giani, A., Bitar, E., McQueen, M., Khargonekar, P., Poolla, K.: Smart Grid Data Integrity Attacks: Characterization and Countermeasures. In: Proc. of IEEE SmartGridComm (October 2011)Google Scholar
  7. 7.
    Linda, O., Vollmer, T., Manic, M.: Neural Network based Intrusion Detection System for Critical Infrastructure. In: Proc. IJCNN 2009 (June 2009)Google Scholar
  8. 8.
    Linda, O., Manic, M., Vollmer, T., Wright, J.: Fuzzy Logic Based Anomaly Detection for Embedded Network Security Cyber Sensor. In: Proc. of IEEE Symposium on Computational Intelligence, pp. 202–209 (April 2011)Google Scholar
  9. 9.
    Yang, D., Usynin, A., Hines, J.W.: Anomaly-Based Intrusion Detection for SCADA Systems. In: 5th Intl. Topical Meeting on Nuclear Plant Instrumentation, Control and Human Machine Interface Technologies (NPIC&HMIT 2005), Albuquerque, NM, November 12-16 (2006)Google Scholar
  10. 10.
    Zhong, S., Khoshgoftaar, T., Seliya, N.: Clustering-based network intrusion detection. Intl. Journal of Reliability, Quality and Safety 14(2), 169–187 (2007)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Ondrej Linda
  • Milos Manic
  • Miles McQueen

There are no affiliations available

Personalised recommendations