On Study of Stealthy Attacks in a Process Control System with Model-based Anomaly Detection Protection
碩士 === 國立交通大學 === 電控工程研究所 === 98 === Process control systems (PCS) are widely used in modern infrastructures and industrial plants for stabilizing safety-critical processes. Any disruption in such systems may cause serious human injuries and environmental disasters. In 2008, Lin et al.~proposed a mo...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2010
|
Online Access: | http://ndltd.ncl.edu.tw/handle/68172228210520738824 |
id |
ndltd-TW-098NCTU5449014 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-098NCTU54490142016-04-25T04:27:53Z http://ndltd.ncl.edu.tw/handle/68172228210520738824 On Study of Stealthy Attacks in a Process Control System with Model-based Anomaly Detection Protection 於具有攻擊偵測機制之過程控制系統上論潛伏攻擊之影響 黃啟彥 碩士 國立交通大學 電控工程研究所 98 Process control systems (PCS) are widely used in modern infrastructures and industrial plants for stabilizing safety-critical processes. Any disruption in such systems may cause serious human injuries and environmental disasters. In 2008, Lin et al.~proposed a model-based anomaly detection module (abbreviated to mADM) to assure the security and stability of a well-studied Tennessee-Eastman process control system (TE-PCS). By taking advantages of cumulating the differences between real and simulated signals, mADM was able to detect an attack that compromises one or more sensors to crash the system. To evaluate the robustness of mADM, we study the stealthy attacks launched by an insider who may (1) know the detection and response strategies of mADM or (2) adjust the parameters of mADM so that these stealthy attacks may successfully attack the system without being detected by mADM. After analyzing mADM, we prove that a general stealthy attack signal can be represented by three types of curves, convex curve (cv), slope (sl), and concave curve (cc), depending on the cumulative differences of signals. By conducting a series of experiments on TE-PCS, we can identify the weakest sensor and the most effective way to stealthily attack this sensor. We also show that, if an insider cannot adjust the parameter settings and the parameters are well configured, he may not be able to crash the system. In the case that the insider obtains the permission to adjust the parameter settings, mADM should self-check whether the settings fall within valid ranges. Over-the-threshold settings may lead to a crash without being detected while under-the-threshold values may result in frequent false alarms and increase the operating costs. In the end, we also demonstrate three case studies to discuss that stealthy attacks may decrease the profits from 0.06% to 41%, depending on the ratio of costs and sales prices. 黃育綸 2010 學位論文 ; thesis 43 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立交通大學 === 電控工程研究所 === 98 === Process control systems (PCS) are widely used in modern infrastructures and industrial plants for stabilizing safety-critical processes. Any disruption in such systems may cause serious human injuries and environmental disasters. In 2008, Lin et al.~proposed a model-based anomaly detection module (abbreviated to mADM) to assure the security and stability of a well-studied Tennessee-Eastman process control system (TE-PCS). By taking advantages of cumulating the differences between real and simulated signals, mADM was able to detect an attack that compromises one or more sensors to crash the system. To evaluate the robustness of mADM, we study the stealthy attacks launched by an insider who may (1) know the detection and response strategies of mADM or (2) adjust the parameters of mADM so that these stealthy attacks may successfully attack the system without being detected by mADM. After analyzing mADM, we prove that a general stealthy attack signal can be represented by three types of curves, convex curve (cv), slope (sl), and concave curve (cc), depending on the cumulative differences of signals.
By conducting a series of experiments on TE-PCS, we can identify the weakest sensor and the most effective way to stealthily attack this sensor. We also show that, if an insider cannot adjust the parameter settings and the parameters are well configured, he may not be able to crash the system. In the case that the insider obtains the permission to adjust the parameter settings, mADM should self-check whether the settings fall within valid ranges. Over-the-threshold settings may lead to a crash without being detected while under-the-threshold values may result in frequent false alarms and increase the operating costs.
In the end, we also demonstrate three case studies to discuss that stealthy attacks may decrease the profits from 0.06% to 41%, depending on the ratio of costs and sales prices.
|
author2 |
黃育綸 |
author_facet |
黃育綸 黃啟彥 |
author |
黃啟彥 |
spellingShingle |
黃啟彥 On Study of Stealthy Attacks in a Process Control System with Model-based Anomaly Detection Protection |
author_sort |
黃啟彥 |
title |
On Study of Stealthy Attacks in a Process Control System with Model-based Anomaly Detection Protection |
title_short |
On Study of Stealthy Attacks in a Process Control System with Model-based Anomaly Detection Protection |
title_full |
On Study of Stealthy Attacks in a Process Control System with Model-based Anomaly Detection Protection |
title_fullStr |
On Study of Stealthy Attacks in a Process Control System with Model-based Anomaly Detection Protection |
title_full_unstemmed |
On Study of Stealthy Attacks in a Process Control System with Model-based Anomaly Detection Protection |
title_sort |
on study of stealthy attacks in a process control system with model-based anomaly detection protection |
publishDate |
2010 |
url |
http://ndltd.ncl.edu.tw/handle/68172228210520738824 |
work_keys_str_mv |
AT huángqǐyàn onstudyofstealthyattacksinaprocesscontrolsystemwithmodelbasedanomalydetectionprotection AT huángqǐyàn yújùyǒugōngjīzhēncèjīzhìzhīguòchéngkòngzhìxìtǒngshànglùnqiánfúgōngjīzhīyǐngxiǎng |
_version_ |
1718233426528567296 |