Skip to main content
Top
Published in: Automatic Control and Computer Sciences 2/2020

01-03-2020

Detection of Deception Attacks in Supervisory Control Systems Using Bond Graph

Authors: I. Zerdazi, M. Fezari, M. Ouziala

Published in: Automatic Control and Computer Sciences | Issue 2/2020

Login to get access

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Supervisory Control and Data Acquisition (SCADA) systems can be subject to cyber-attacks due to their extensive connectivity to information and communication technologies. Those communications are used to connect sensors, actuators, and programmable logic controllers (PLCs) to monitor and control the process. The use of communication networks enlarges the vulnerability of SCADA to cyber-attacks that can drive the system to unsafe states. A variety of approaches in the field of attack detection have been proposed, however they are characterized very expensive, low detection rate or are system specific. One of the powerful cyber-attacks targeting SCADA systems is deception attack, where the attacker can change sensor reading parameters. In this work, we propose a new defense strategy that detects parameter changes generated by deception attacks in the sensor and control part in supervisory control systems. To do so, we use the bond graph (BG) modeling tool.
Literature
1.
go back to reference Li, W., Xie, L., Deng, Z., and Wang, Z., False sequential logic attack on SCADA system and its physical impact analysis, Comput. Secur., 2016, vol. 58, pp. 149–159.CrossRef Li, W., Xie, L., Deng, Z., and Wang, Z., False sequential logic attack on SCADA system and its physical impact analysis, Comput. Secur., 2016, vol. 58, pp. 149–159.CrossRef
2.
go back to reference Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H., and Stoddart, K., A review of cyber security risk assessment methods for SCADA systems, Comput. Secur., 2016, vol. 56, pp. 1–27.CrossRef Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H., and Stoddart, K., A review of cyber security risk assessment methods for SCADA systems, Comput. Secur., 2016, vol. 56, pp. 1–27.CrossRef
3.
go back to reference Nazir, S., Patel, S., and Patel, D., Assessing and augmenting SCADA cyber security: A survey of techniques, Comput. Secur., 2017, vol. 70, pp. 436–454.CrossRef Nazir, S., Patel, S., and Patel, D., Assessing and augmenting SCADA cyber security: A survey of techniques, Comput. Secur., 2017, vol. 70, pp. 436–454.CrossRef
4.
go back to reference Hei, X., Du, X., Lin, S., and Lee, I., PIPAC: Patient infusion pattern-based access control scheme for wireless insulin pump system, 2013Proceedings IEEE INFOCOM, 2013. Hei, X., Du, X., Lin, S., and Lee, I., PIPAC: Patient infusion pattern-based access control scheme for wireless insulin pump system, 2013Proceedings IEEE INFOCOM, 2013.
5.
go back to reference Cárdenas, A.A., Amin, S., Lin, Z.-S., Huang, Y.-L., Huang, C.-Y., and Sastry, S., Attacks against process control systems: Risk assessment, detection, and response, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security—ASIACCS'11, 2011. Cárdenas, A.A., Amin, S., Lin, Z.-S., Huang, Y.-L., Huang, C.-Y., and Sastry, S., Attacks against process control systems: Risk assessment, detection, and response, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security—ASIACCS'11, 2011.
6.
go back to reference Hadžiosmanović, D., Sommer, R., Zambon, E., and Hartel, P.H., Through the eye of the PLC: Semantic security monitoring for industrial processes, Proceedings of the 30th Annual Computer Security Applications Conference on—ACSAC’14, 2014. Hadžiosmanović, D., Sommer, R., Zambon, E., and Hartel, P.H., Through the eye of the PLC: Semantic security monitoring for industrial processes, Proceedings of the 30th Annual Computer Security Applications Conference on—ACSAC’14, 2014.
7.
go back to reference Rahman, M.A. and Mohsenian-Rad, H., False data injection attacks against nonlinear state estimation in smart power grids, 2013 IEEE Power & Energy Society General Meeting, 2013. Rahman, M.A. and Mohsenian-Rad, H., False data injection attacks against nonlinear state estimation in smart power grids, 2013 IEEE Power & Energy Society General Meeting, 2013.
8.
go back to reference Ye, K., Liu, Y., Xu, G., and Xu, C.-Z., Fault injection and detection for artificial intelligence applications in container-based clouds, Cloud Computing—CLOUD 2018, 2018, pp. 112–127. Ye, K., Liu, Y., Xu, G., and Xu, C.-Z., Fault injection and detection for artificial intelligence applications in container-based clouds, Cloud Computing—CLOUD 2018, 2018, pp. 112–127.
9.
go back to reference Filippo, M.-D., Delgado, M., Brie, C., and Paynter, H.M., A survey of bond graphs: Theory, applications and programs, J. Franklin Inst., 1991, vol. 328, pp. 565–606.CrossRef Filippo, M.-D., Delgado, M., Brie, C., and Paynter, H.M., A survey of bond graphs: Theory, applications and programs, J. Franklin Inst., 1991, vol. 328, pp. 565–606.CrossRef
10.
go back to reference Medjaher, K., A bond graph model-based fault detection and isolation, in Maintenance Modelling and Applications, Andrews, J., Bérenguer, C., and Jackson, L., Eds., Det Norske Veritas (DNV), 2011, ch. 6, pp. 503–512. Medjaher, K., A bond graph model-based fault detection and isolation, in Maintenance Modelling and Applications, Andrews, J., Bérenguer, C., and Jackson, L., Eds., Det Norske Veritas (DNV), 2011, ch. 6, pp. 503–512.
11.
go back to reference Borutzky, W., Bond Graph Methodology: Development and Analysis of Multidisciplinary Dynamic System Models, London: Springer, 2010.CrossRef Borutzky, W., Bond Graph Methodology: Development and Analysis of Multidisciplinary Dynamic System Models, London: Springer, 2010.CrossRef
12.
go back to reference Borutzky, W., Bond Graph Modelling of Engineering Systems: Theory, Applications and Software Support, New York: Springer, 2011.CrossRef Borutzky, W., Bond Graph Modelling of Engineering Systems: Theory, Applications and Software Support, New York: Springer, 2011.CrossRef
13.
go back to reference Damic, V. and Montgomery, J., Mechatronics by Bond Graphs: An Object-Oriented Approach to Modelling and Simulation, Berlin: Springer, 2004. Damic, V. and Montgomery, J., Mechatronics by Bond Graphs: An Object-Oriented Approach to Modelling and Simulation, Berlin: Springer, 2004.
14.
go back to reference Bouamama, B.O., Medjaher, K., Samantaray, A., and Staroswiecki, M., Supervision of an industrial steam generator. Part I: Bond graph modelling, Control Eng. Pract., 2006, vol. 14, pp. 71–83.CrossRef Bouamama, B.O., Medjaher, K., Samantaray, A., and Staroswiecki, M., Supervision of an industrial steam generator. Part I: Bond graph modelling, Control Eng. Pract., 2006, vol. 14, pp. 71–83.CrossRef
15.
go back to reference Kriaa, S., Bouissou, M., and Pitre-Cambacds, L., Modeling the Stuxnet attack with BDMP: Towards more formal risk assessments, 20127th International Conference on Risks and Security of Internet and Systems (CRiSIS), pp. 1–8. Kriaa, S., Bouissou, M., and Pitre-Cambacds, L., Modeling the Stuxnet attack with BDMP: Towards more formal risk assessments, 20127th International Conference on Risks and Security of Internet and Systems (CRiSIS), pp. 1–8.
16.
go back to reference Mo, Y. and Sinopoli, B., Secure control against replay attacks, 200947th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp. 911–918. Mo, Y. and Sinopoli, B., Secure control against replay attacks, 200947th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp. 911–918.
17.
go back to reference Teixeira, A., Shames, I., Sandberg, H., and Johansson, K.H., A secure control framework for resource-limited adversaries, Automatica, 2015, vol. 51, pp. 135–148.MathSciNetCrossRef Teixeira, A., Shames, I., Sandberg, H., and Johansson, K.H., A secure control framework for resource-limited adversaries, Automatica, 2015, vol. 51, pp. 135–148.MathSciNetCrossRef
18.
go back to reference Kalluri, R., Mahendra, L., Kumar, R.K.S., and Prasad, G.L.G., Simulation and impact analysis of denial-of-service attacks on power SCADA, 2016National Power Systems Conference (NPSC), pp. 1–5. Kalluri, R., Mahendra, L., Kumar, R.K.S., and Prasad, G.L.G., Simulation and impact analysis of denial-of-service attacks on power SCADA, 2016National Power Systems Conference (NPSC), pp. 1–5.
19.
go back to reference Ould Bouamama, B., Medjaher, K., Samantaray, A.K., and Staroswiecki, M., Supervision of an industrial steam generator. Part I: Bond graph modeling, Control Eng. Pract., 2006, vol. 14, no. 1, pp. 71–83.CrossRef Ould Bouamama, B., Medjaher, K., Samantaray, A.K., and Staroswiecki, M., Supervision of an industrial steam generator. Part I: Bond graph modeling, Control Eng. Pract., 2006, vol. 14, no. 1, pp. 71–83.CrossRef
20.
go back to reference Touati, Y., Merzouki, R., and Bouamama, B.O., Robust diagnosis to measurement uncertainties using bond graph approach: Application to intelligent autonomous vehicle, Mechatronics, 2012, vol. 22, pp. 1148–1160.CrossRef Touati, Y., Merzouki, R., and Bouamama, B.O., Robust diagnosis to measurement uncertainties using bond graph approach: Application to intelligent autonomous vehicle, Mechatronics, 2012, vol. 22, pp. 1148–1160.CrossRef
21.
go back to reference Medjaher, K., A bond graph model-based fault detection and isolation, in Maintenance Modelling and Applications, 2011, ch. 6, pp. 503–512. Medjaher, K., A bond graph model-based fault detection and isolation, in Maintenance Modelling and Applications, 2011, ch. 6, pp. 503–512.
22.
go back to reference Djeziri, M.A., Merzouki, R., Bouamama, B.O., and Dauphin-Tanguy, G., Fault detection of backlash phenomenon in mechatronic system with parameter uncertainties using bond graph approach, 2006International Conference on Mechatronics and Automation, pp. 600–605. Djeziri, M.A., Merzouki, R., Bouamama, B.O., and Dauphin-Tanguy, G., Fault detection of backlash phenomenon in mechatronic system with parameter uncertainties using bond graph approach, 2006International Conference on Mechatronics and Automation, pp. 600–605.
23.
go back to reference Tariq, N., Asim, M., and Khan, F.A., Securing SCADA-based critical infrastructures: Challenges and open issues, Procedia Comput. Sci., 2019, vol. 155, pp. 612–617.CrossRef Tariq, N., Asim, M., and Khan, F.A., Securing SCADA-based critical infrastructures: Challenges and open issues, Procedia Comput. Sci., 2019, vol. 155, pp. 612–617.CrossRef
24.
go back to reference Ferrari, R.M.G. and Teixeira, A.M.H., Detection and isolation of routing attacks through sensor watermarking, 2017 American Control Conference (ACC), 2017. Ferrari, R.M.G. and Teixeira, A.M.H., Detection and isolation of routing attacks through sensor watermarking, 2017 American Control Conference (ACC), 2017.
25.
go back to reference Benmoussa, S., Bouamama, B.O., and Merzouki, R., Bond graph approach for plant fault detection and isolation: Application to intelligent autonomous vehicle, IEEE Trans. Autom. Sci. Eng., 2014, vol. 11, pp. 585–593.CrossRef Benmoussa, S., Bouamama, B.O., and Merzouki, R., Bond graph approach for plant fault detection and isolation: Application to intelligent autonomous vehicle, IEEE Trans. Autom. Sci. Eng., 2014, vol. 11, pp. 585–593.CrossRef
Metadata
Title
Detection of Deception Attacks in Supervisory Control Systems Using Bond Graph
Authors
I. Zerdazi
M. Fezari
M. Ouziala
Publication date
01-03-2020
Publisher
Pleiades Publishing
Published in
Automatic Control and Computer Sciences / Issue 2/2020
Print ISSN: 0146-4116
Electronic ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411620020091

Other articles of this Issue 2/2020

Automatic Control and Computer Sciences 2/2020 Go to the issue