Cyber Security of Water SCADA Systems: (I) Analysis and Experimentation of Stealthy Deception Attacks
نویسندگان
چکیده
In this article, our aim is to perform security threat assessment of networked control systems (NCS) systems with regulatory and supervisory control layers. We analyze the performance of a proportional-integral controller (regulatory layer), and a model-based diagnostic scheme (supervisory layer) under a class of deception attacks. We adopt a conservative approach by assuming that the attacker has knowledge of: 1) the system dynamics, 2) the parameters of diagnostic scheme, and 3) the sensor-control signals. The deception attack presented here can enable remote water pilfering from automated canal systems. We also report a field operational test attack on the Gignac canal system located in Southern France.
منابع مشابه
A Cyber Security Study of a State-of-the-art SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator
The electrical power network is a critical infrastructure in today’s society, so its safe and reliable operation is of major concern. State estimators are commonly used in power networks, for example, to detect faulty equipment and to optimally route power flows. The estimators are often located in control centers, to which large numbers of measurements are sent over unencrypted communication c...
متن کاملCyber Security of Water SCADA Systems: (II) Attack Detection using Enhanced Hydrodynamic Models
This article investigates the problem of detection and isolation of attacks on a water distribution network comprised of cascaded canal pools. The proposed approach employs a bank of delay-differential observer systems. The observers are based on an analytically approximate model of canal hydrodynamics. Each observer is insensitive to one fault/attack mode and sensitive to other modes. Design o...
متن کاملA Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator
The electrical power network is a critical infrastructure in today’s society, so its safe and reliable operation is of major concern. State estimators are commonly used in power networks, for example, to detect faulty equipment and to optimally route power flows. The estimators are often located in control centers, to which large numbers of measurements are sent over unencrypted communication c...
متن کاملSCADA Cyber Attacks and Security Vulnerabilities: Review
SCADA plays a vital role in critical infrastructures. As the modern IT technology become very advanced, the threat on industrial control system (ICS) and SCADA security become a big concern of every critical infrastructures operator. With the recent cyber-attacks, the urge to secure the critical infrastructure is a big issue especially for those countries that uses critical infrastructures. In ...
متن کاملIntrusion Detection via Machine Learning for SCADA System Protection
SCADA (Supervisory Control And Data Acquisition) systems have always been susceptible to cyber-attacks. Different types of cyber-attacks could occur depending on the architecture and configurations used in the SCADA system. To protect cyber infrastructure from above attacks a growing collaborative effort between cyber security professionals and researchers from private and academia has involved...
متن کامل