Line 2: Line 2:
 
== Abstract ==
 
== Abstract ==
  
Part 3: Infrastructure Security; International audience; Historically, supervisory control and data acquisition (SCADA) systems have relied on obscurity to safeguard against attacks. Indeed, external attackers lacked knowledge about proprietary system designs and software to access systems and execute attacks. The trend to interconnect to the Internet and incorporate standardized protocols, however, has resulted in an increase in the attack surface – attackers can now target SCADA systems and proceed to impact the physical systems they control. Dynamical estimation can be used to identify anomalies and attempts to maliciously affect controlled physical systems. This paper describes an intrusion detection method based on the dynamical estimation of systems. A generic water pipeline system is modeled using state space equations, and a discrete-time Kalman filter is used to estimate operational characteristics for anomaly-based intrusion detection. The effectiveness of the method is evaluated against deception attacks that target the water pipeline system. A co-simulation that integrates computational fluid dynamics software and MATLAB/Simulink is employed to simulate attacks and develop detection schemes.
+
Part 3: Infrastructure Security; International audience; Historically, supervisory control and data acquisition (SCADA) systems have relied on obscurity to safeguard against attacks. Indeed, external attackers lacked knowledge about proprietary system designs and software to access systems and execute attacks. The trend to interconnect to the Internet and incorporate standardized protocols, however, has resulted in an increase in the attack surface attackers can now target SCADA systems and proceed to impact the physical systems they control. Dynamical estimation can be used to identify anomalies and attempts to maliciously affect controlled physical systems. This paper describes an intrusion detection method based on the dynamical estimation of systems. A generic water pipeline system is modeled using state space equations, and a discrete-time Kalman filter is used to estimate operational characteristics for anomaly-based intrusion detection. The effectiveness of the method is evaluated against deception attacks that target the water pipeline system. A co-simulation that integrates computational fluid dynamics software and MATLAB/Simulink is employed to simulate attacks and develop detection schemes.
  
 
Document type: Part of book or chapter of book
 
Document type: Part of book or chapter of book
  
 
== Full document ==
 
== Full document ==
<pdf>Media:Alajlouni_Rao_2013a-beopen19-6872-document.pdf</pdf>
+
<pdf>Media:Alajlouni_Rao_2013a-beopen90-8546-document.pdf</pdf>
  
  

Latest revision as of 17:24, 28 January 2021

Abstract

Part 3: Infrastructure Security; International audience; Historically, supervisory control and data acquisition (SCADA) systems have relied on obscurity to safeguard against attacks. Indeed, external attackers lacked knowledge about proprietary system designs and software to access systems and execute attacks. The trend to interconnect to the Internet and incorporate standardized protocols, however, has resulted in an increase in the attack surface – attackers can now target SCADA systems and proceed to impact the physical systems they control. Dynamical estimation can be used to identify anomalies and attempts to maliciously affect controlled physical systems. This paper describes an intrusion detection method based on the dynamical estimation of systems. A generic water pipeline system is modeled using state space equations, and a discrete-time Kalman filter is used to estimate operational characteristics for anomaly-based intrusion detection. The effectiveness of the method is evaluated against deception attacks that target the water pipeline system. A co-simulation that integrates computational fluid dynamics software and MATLAB/Simulink is employed to simulate attacks and develop detection schemes.

Document type: Part of book or chapter of book

Full document

The PDF file did not load properly or your web browser does not support viewing PDF files. Download directly to your device: Download PDF document

Original document

The different versions of the original document can be found in:

http://dx.doi.org/10.1007/978-3-642-45330-4_8
https://hal.inria.fr/hal-01456896/document,
https://hal.inria.fr/hal-01456896/file/978-3-642-45330-4_8_Chapter.pdf under the license http://creativecommons.org/licenses/by/
https://link.springer.com/content/pdf/10.1007%2F978-3-642-45330-4_8.pdf,
https://www.scipedia.com/public/Alajlouni_Rao_2013a,
https://dblp.uni-trier.de/db/conf/ifip11-10/iccip2013.html#AlajlouniR13,
https://rd.springer.com/chapter/10.1007/978-3-642-45330-4_8,
https://academic.microsoft.com/#/detail/163268312
Back to Top

Document information

Published on 01/01/2013

Volume 2013, 2013
DOI: 10.1007/978-3-642-45330-4_8
Licence: CC BY-NC-SA license

Document Score

0

Views 2
Recommendations 0

Share this document

claim authorship

Are you one of the authors of this document?