On Study of Stealthy Attacks in a Process Control System with Model-based Anomaly Detection Protection

碩士 === 國立交通大學 === 電控工程研究所 === 98 === Process control systems (PCS) are widely used in modern infrastructures and industrial plants for stabilizing safety-critical processes. Any disruption in such systems may cause serious human injuries and environmental disasters. In 2008, Lin et al.~proposed a mo...

Full description

Bibliographic Details
Main Author: 黃啟彥
Other Authors: 黃育綸
Format: Others
Language:en_US
Published: 2010
Online Access:http://ndltd.ncl.edu.tw/handle/68172228210520738824
id ndltd-TW-098NCTU5449014
record_format oai_dc
spelling ndltd-TW-098NCTU54490142016-04-25T04:27:53Z http://ndltd.ncl.edu.tw/handle/68172228210520738824 On Study of Stealthy Attacks in a Process Control System with Model-based Anomaly Detection Protection 於具有攻擊偵測機制之過程控制系統上論潛伏攻擊之影響 黃啟彥 碩士 國立交通大學 電控工程研究所 98 Process control systems (PCS) are widely used in modern infrastructures and industrial plants for stabilizing safety-critical processes. Any disruption in such systems may cause serious human injuries and environmental disasters. In 2008, Lin et al.~proposed a model-based anomaly detection module (abbreviated to mADM) to assure the security and stability of a well-studied Tennessee-Eastman process control system (TE-PCS). By taking advantages of cumulating the differences between real and simulated signals, mADM was able to detect an attack that compromises one or more sensors to crash the system. To evaluate the robustness of mADM, we study the stealthy attacks launched by an insider who may (1) know the detection and response strategies of mADM or (2) adjust the parameters of mADM so that these stealthy attacks may successfully attack the system without being detected by mADM. After analyzing mADM, we prove that a general stealthy attack signal can be represented by three types of curves, convex curve (cv), slope (sl), and concave curve (cc), depending on the cumulative differences of signals. By conducting a series of experiments on TE-PCS, we can identify the weakest sensor and the most effective way to stealthily attack this sensor. We also show that, if an insider cannot adjust the parameter settings and the parameters are well configured, he may not be able to crash the system. In the case that the insider obtains the permission to adjust the parameter settings, mADM should self-check whether the settings fall within valid ranges. Over-the-threshold settings may lead to a crash without being detected while under-the-threshold values may result in frequent false alarms and increase the operating costs. In the end, we also demonstrate three case studies to discuss that stealthy attacks may decrease the profits from 0.06% to 41%, depending on the ratio of costs and sales prices. 黃育綸 2010 學位論文 ; thesis 43 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立交通大學 === 電控工程研究所 === 98 === Process control systems (PCS) are widely used in modern infrastructures and industrial plants for stabilizing safety-critical processes. Any disruption in such systems may cause serious human injuries and environmental disasters. In 2008, Lin et al.~proposed a model-based anomaly detection module (abbreviated to mADM) to assure the security and stability of a well-studied Tennessee-Eastman process control system (TE-PCS). By taking advantages of cumulating the differences between real and simulated signals, mADM was able to detect an attack that compromises one or more sensors to crash the system. To evaluate the robustness of mADM, we study the stealthy attacks launched by an insider who may (1) know the detection and response strategies of mADM or (2) adjust the parameters of mADM so that these stealthy attacks may successfully attack the system without being detected by mADM. After analyzing mADM, we prove that a general stealthy attack signal can be represented by three types of curves, convex curve (cv), slope (sl), and concave curve (cc), depending on the cumulative differences of signals. By conducting a series of experiments on TE-PCS, we can identify the weakest sensor and the most effective way to stealthily attack this sensor. We also show that, if an insider cannot adjust the parameter settings and the parameters are well configured, he may not be able to crash the system. In the case that the insider obtains the permission to adjust the parameter settings, mADM should self-check whether the settings fall within valid ranges. Over-the-threshold settings may lead to a crash without being detected while under-the-threshold values may result in frequent false alarms and increase the operating costs. In the end, we also demonstrate three case studies to discuss that stealthy attacks may decrease the profits from 0.06% to 41%, depending on the ratio of costs and sales prices.
author2 黃育綸
author_facet 黃育綸
黃啟彥
author 黃啟彥
spellingShingle 黃啟彥
On Study of Stealthy Attacks in a Process Control System with Model-based Anomaly Detection Protection
author_sort 黃啟彥
title On Study of Stealthy Attacks in a Process Control System with Model-based Anomaly Detection Protection
title_short On Study of Stealthy Attacks in a Process Control System with Model-based Anomaly Detection Protection
title_full On Study of Stealthy Attacks in a Process Control System with Model-based Anomaly Detection Protection
title_fullStr On Study of Stealthy Attacks in a Process Control System with Model-based Anomaly Detection Protection
title_full_unstemmed On Study of Stealthy Attacks in a Process Control System with Model-based Anomaly Detection Protection
title_sort on study of stealthy attacks in a process control system with model-based anomaly detection protection
publishDate 2010
url http://ndltd.ncl.edu.tw/handle/68172228210520738824
work_keys_str_mv AT huángqǐyàn onstudyofstealthyattacksinaprocesscontrolsystemwithmodelbasedanomalydetectionprotection
AT huángqǐyàn yújùyǒugōngjīzhēncèjīzhìzhīguòchéngkòngzhìxìtǒngshànglùnqiánfúgōngjīzhīyǐngxiǎng
_version_ 1718233426528567296