2009
DOI: 10.1007/978-3-642-04798-5_10
|View full text |Cite
|
Sign up to set email alerts
|

Using Physical Models for Anomaly Detection in Control Systems

Abstract: Supervisory control and data acquisition (SCADA) systems are increasingly used to operate critical infrastructure assets. However, the inclusion of advanced information technology and communications components and elaborate control strategies in SCADA systems increase the threat surface for external and subversion-type attacks. The problems are exacerbated by site-specific properties of SCADA environments that make subversion detection impractical; and by sensor noise and feedback characteristics that degrade … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 12 publications
0
8
0
Order By: Relevance
“…Such attacks have been discussed extensively [4,5,6]. Detective strategies based on protocol analysis, or statistical signal analysis by themselves can be shown to have weaknesses in uncovering such attacks [7], particularly in the face of an adversary with the ability to subvert network nodes in the system [3]. Hence conjoint reasoning over both communication and control functionality, making use of advanced state estimation techniques, is necessary to detect such attacks [2] [8].…”
Section: Related Workmentioning
confidence: 99%
“…Such attacks have been discussed extensively [4,5,6]. Detective strategies based on protocol analysis, or statistical signal analysis by themselves can be shown to have weaknesses in uncovering such attacks [7], particularly in the face of an adversary with the ability to subvert network nodes in the system [3]. Hence conjoint reasoning over both communication and control functionality, making use of advanced state estimation techniques, is necessary to detect such attacks [2] [8].…”
Section: Related Workmentioning
confidence: 99%
“…Physical-level ADSs can be divided into two main groups: ADSs where it is necessary to model the physical process [59,60] or ADSs that do not need a specific model for the physical process [61,62]. Few proposals combine data from both levels [63,64].…”
Section: Anomaly Detection Systemsmentioning
confidence: 99%
“…might be present. There are several examples of IN ADSs that leverage field-level data [59][60][61][62]. This data can come from logs on a control server, direct process measurements, and simulated data or can be scattered across different hosts or devices.…”
Section: Scopementioning
confidence: 99%
“…We begin by mentioning the work of Svendsen and Wolthusen [11] that use an explicit model of a SCADA system for anomaly detection. The detection process is enhanced by using feedback control theory to predict future values and ultimately detect physical anomalies in the system.…”
Section: Related Workmentioning
confidence: 99%