Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Attack models and scenarios for networked control systems
Teixeira A., Pérez D., Sandberg H., Johansson K.  HiCoNS 2012 (Proceedings of the 1st International Conference on High Confidence Networked Systems, Beijing, China, Apr 17-18, 2012)55-64.2012.Type:Proceedings
Date Reviewed: Aug 23 2012

In this paper, Teixeira et al. address cybersecurity issues for networked control systems. Such systems are of great importance to our modern technology infrastructure and affect safety, health, and essential utilities. A model is defined, analyzed, and illustrated on an experimental basis. An attack space is envisioned with orthogonal dimensions of system knowledge, disclosure resources, and disruption resources, and the attack scenarios of replay, zero dynamics, and bias injection lend themselves to analysis in this space. The experimental environment is a quadruple-tank process that is wirelessly controlled. This setup is used to illustrate scenarios, consequences, and possible countermeasures.

The introductory section provides the motivation and a summary of related work, and introduces the attack space construct and an overview of the paper’s goals. The second section describes the structure of a networked control system, including the physical plan, the communication network, feedback control, and the detection of operation anomalies. The third section addresses the model of adversaries, discussing an attack on networked control systems in general, the role of system knowledge, disclosure resources that gather intelligence, and disruption resources, including physical, deception, and denial-of-service (DoS) attacks. The next section describes attack scenarios with goals and constraints, replay, zero dynamics, and bias injection. The last major section (5) presents the testbed for experimentation and the results for replay, zero dynamics, and bias injection attacks.

The paper is insightful and provides mathematics models and a number of helpful diagrams to present conceptual models and experimental results.

Reviewer:  M. G. Murphy Review #: CR140530 (1305-0443)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Unauthorized Access (K.6.5 ... )
 
 
Process Control Systems (C.3 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Unauthorized Access": Date
Testing and evaluating computer intrusion detection systems
Durst R., Champion T., Witten B., Miller E., Spagnuolo L. Communications of the ACM 42(7): 53-61, 1999. Type: Article
Aug 1 1999
Honeypots: tracking hackers
Spitzner L., Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 2002. Type: Book (9780321108951)
Jan 2 2003
Web hacking: attacks and defense
McClure S., Shah S., Shah S., Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 2002.  492, Type: Book (9780201761764)
Jul 25 2003
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy