An effective defense against email spam laundering
Proceedings of the 13th ACM conference on Computer and communications security
False data injection attacks against state estimation in electric power grids
Proceedings of the 16th ACM conference on Computer and communications security
Detection of stochastic processes
IEEE Transactions on Information Theory
An experimental study on the impact of network segmentation to the resilience of physical processes
IFIP'12 Proceedings of the 11th international IFIP TC 6 conference on Networking - Volume Part I
Computers and Electrical Engineering
Optimizing investments in cyber-security for critical infrastructure
Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
Minimax control for cyber-physical systems under network packet scheduling attacks
Proceedings of the 2nd ACM international conference on High confidence networked systems
Run-time prediction and preemption of configuration attacks on embedded process controllers
Proceedings of the First International Conference on Security of Internet of Things
Security and protection of SCADA: a bigdata algorithmic approach
Proceedings of the 6th International Conference on Security of Information and Networks
Physical process resilience-aware network design for SCADA systems
Computers and Electrical Engineering
Hi-index | 0.00 |
In the last years there has been an increasing interest in the security of process control and SCADA systems. Furthermore, recent computer attacks such as the Stuxnet worm, have shown there are parties with the motivation and resources to effectively attack control systems. While previous work has proposed new security mechanisms for control systems, few of them have explored new and fundamentally different research problems for securing control systems when compared to securing traditional information technology (IT) systems. In particular, the sophistication of new malware attacking control systems--malware including zero-days attacks, rootkits created for control systems, and software signed by trusted certificate authorities--has shown that it is very difficult to prevent and detect these attacks based solely on IT system information. In this paper we show how, by incorporating knowledge of the physical system under control, we are able to detect computer attacks that change the behavior of the targeted control system. By using knowledge of the physical system we are able to focus on the final objective of the attack, and not on the particular mechanisms of how vulnerabilities are exploited, and how the attack is hidden. We analyze the security and safety of our mechanisms by exploring the effects of stealthy attacks, and by ensuring that automatic attack-response mechanisms will not drive the system to an unsafe state. A secondary goal of this paper is to initiate the discussion between control and security practitioners--two areas that have had little interaction in the past. We believe that control engineers can leverage security engineering to design--based on a combination of their best practices--control algorithms that go beyond safety and fault tolerance, and include considerations to survive targeted attacks.