2011
DOI: 10.1007/978-3-642-24864-1_4
|View full text |Cite
|
Sign up to set email alerts
|

A Plant-Wide Industrial Process Control Security Problem

Abstract: Industrial control systems are a vital part of the critical infrastructure.The potentially large impact of a failure makes them attractive targets for adversaries. Unfortunately, simplistic approaches to intrusion detection using protocol analysis or naïve statistical estimation techniques are inadequate in the face of skilled adversaries who can hide their presence with the appearance of legitimate actions. This paper describes an approach for identifying malicious activity that involves the use of a path aut… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
22
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 18 publications
(22 citation statements)
references
References 15 publications
0
22
0
Order By: Relevance
“…Detective strategies based on protocol analysis, or statistical signal analysis by themselves can be shown to have weaknesses in uncovering such attacks [7], particularly in the face of an adversary with the ability to subvert network nodes in the system [3]. Hence conjoint reasoning over both communication and control functionality, making use of advanced state estimation techniques, is necessary to detect such attacks [2] [8]. This can be split into the analysis of the integrity of network nodes on the one hand and the analysis of the integrity of process control units on the other.…”
Section: Related Workmentioning
confidence: 98%
See 4 more Smart Citations
“…Detective strategies based on protocol analysis, or statistical signal analysis by themselves can be shown to have weaknesses in uncovering such attacks [7], particularly in the face of an adversary with the ability to subvert network nodes in the system [3]. Hence conjoint reasoning over both communication and control functionality, making use of advanced state estimation techniques, is necessary to detect such attacks [2] [8]. This can be split into the analysis of the integrity of network nodes on the one hand and the analysis of the integrity of process control units on the other.…”
Section: Related Workmentioning
confidence: 98%
“…Techniques related to IP traceback [9,10,11,12,13,14] have been proposed to help solve this kind of problem in the context of denial of service attacks and such techniques are easily adaptable to this problem, particularly for probabilistic cases [15]. In [2], this requires demonstrating the existence of independent routes and then considering their consistency in terms of the model to determine route integrity. However, this approach relies on the knowledge of routes and system operations in a highly stable topology.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations