Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Attack models and scenarios for networked control systems
Teixeira A., Pérez D., Sandberg H., Johansson K.  HiCoNS 2012 (Proceedings of the 1st International Conference on High Confidence Networked Systems, Beijing, China,  Apr 17-18, 2012) 55-64. 2012. Type: Proceedings
Date Reviewed: Aug 23 2012

In this paper, Teixeira et al. address cybersecurity issues for networked control systems. Such systems are of great importance to our modern technology infrastructure and affect safety, health, and essential utilities. A model is defined, analyzed, and illustrated on an experimental basis. An attack space is envisioned with orthogonal dimensions of system knowledge, disclosure resources, and disruption resources, and the attack scenarios of replay, zero dynamics, and bias injection lend themselves to analysis in this space. The experimental environment is a quadruple-tank process that is wirelessly controlled. This setup is used to illustrate scenarios, consequences, and possible countermeasures.

The introductory section provides the motivation and a summary of related work, and introduces the attack space construct and an overview of the paper’s goals. The second section describes the structure of a networked control system, including the physical plan, the communication network, feedback control, and the detection of operation anomalies. The third section addresses the model of adversaries, discussing an attack on networked control systems in general, the role of system knowledge, disclosure resources that gather intelligence, and disruption resources, including physical, deception, and denial-of-service (DoS) attacks. The next section describes attack scenarios with goals and constraints, replay, zero dynamics, and bias injection. The last major section (5) presents the testbed for experimentation and the results for replay, zero dynamics, and bias injection attacks.

The paper is insightful and provides mathematics models and a number of helpful diagrams to present conceptual models and experimental results.

Reviewer:  M. G. Murphy Review #: CR140530 (1305-0443)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Unauthorized Access (K.6.5 ... )
 
 
Process Control Systems (C.3 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Unauthorized Access": Date
The Office demon: Minos
Dechaux J.  Journal of Computer Virology and Hacking Techniques 9(3): 125-135, 2013. Type: Article
Jul 14 2014
Theorem-based, data-driven, cyber event detection
Hively L., McDonald J.  CSIIRW 2013 (Proceedings of the 8th Annual Cyber Security and Information Intelligence Research Workshop, Oak Ridge, TN,  Jan 8-10, 2013) 1-4, 2013. Type: Proceedings
Aug 22 2013
The pervasive trust foundation for security in next generation networks
Lilien L., Al-Alawneh A., Ben Othmane L.  NSPW 2010 (Proceedings of the 2010 Workshop on New Security Paradigms, Concord, MA,  Sep 21-23, 2010) 129-142, 2010. Type: Proceedings
Apr 13 2011
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2021 ThinkLoud, Inc.
Terms of Use
| Privacy Policy