2011
DOI: 10.3182/20110828-6-it-1002.03712
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Integrity Attacks on SCADA Systems

Abstract: Ensuring security of systems based on supervisory control and data acquisition (SCADA) is a major challenge. In this paper we analyze the effect of integrity attacks on control systems and provide countermeasure capable of exposing such attacks. To validate the results, we apply our findings to an industrial control problem concerning a chemical plant and then a simplified model of a power system.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
33
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 38 publications
(34 citation statements)
references
References 7 publications
1
33
0
Order By: Relevance
“…In our experiment controllers were implemented within the Master Unit, while sensors were implemented as R-PLC Units. As shown in Figure 5, similarly to the results reported in [10], we see an increase in the pressure after the attack is started. As soon as the attack is ended, the controller is able to stabilize the process and brings it back to its normal operating limits.…”
Section: Experimental Comparison To Related Approachessupporting
confidence: 77%
See 4 more Smart Citations
“…In our experiment controllers were implemented within the Master Unit, while sensors were implemented as R-PLC Units. As shown in Figure 5, similarly to the results reported in [10], we see an increase in the pressure after the attack is started. As soon as the attack is ended, the controller is able to stabilize the process and brings it back to its normal operating limits.…”
Section: Experimental Comparison To Related Approachessupporting
confidence: 77%
“…More specifically, we recreate the Denial of Service attack reported in the work of Chabukswar, et al [10] involving the Tennessee-Eastman chemical process [17] (more details on this process in Section 7.2). The attack targets routers responsible for the data exchange between controllers and sensors/actuators.…”
Section: Experimental Comparison To Related Approachesmentioning
confidence: 99%
See 3 more Smart Citations