Distort to Detect, not Affect: Detecting Stealthy Sensor Attacks with Micro-distortion

03/23/2022
by   Suman Sourav, et al.
0

In this paper, we propose an effective and easily deployable approach to detect the presence of stealthy sensor attacks in industrial control systems, where (legacy) control devices critically rely on accurate (and usually non-encrypted) sensor readings. Specifically, we focus on stealthy attacks that crash a sensor and then immediately impersonate that sensor by sending out fake readings. We consider attackers who aim to stay hidden in the system for a prolonged period. To detect such attacks, our approach relies on continuous injection of "micro distortion" to the original sensor's readings. In particular, the injected distortion should be kept strictly within a small magnitude (e.g., 0.5% of the possible operating value range), to ensure it does not affect the normal functioning of the ICS. Our approach uses a pre-shared secret sequence between a sensor and the defender to generate the micro-distortions. One key challenge is that the micro-distortions injected are often much lower than the sensor's actual readings, hence can be easily overwhelmed by the latter. To overcome this, we leverage the observation that sensor readings in many ICS (and power grid in particular) often change gradually in a significant fraction of time (i.e., with small difference between consecutive time slots). We devise a simple yet effective algorithm that can detect stealthy attackers in a highly accurate and fast (i.e., using less than 100 samples) manner. We demonstrate the effectiveness of our defense using real-world sensor reading traces from two different smart grid systems.

READ FULL TEXT
research
07/29/2023

Exposing Hidden Attackers in Industrial Control Systems using Micro-distortions

For industrial control systems (ICS), many existing defense solutions fo...
research
10/11/2022

Detecting Hidden Attackers in Photovoltaic Systems Using Machine Learning

In modern smart grids, the proliferation of communication-enabled distri...
research
12/05/2017

NoiSense: Detecting Data Integrity Attacks on Sensor Measurements using Hardware based Fingerprints

In recent years fingerprinting of various physical and logical devices h...
research
04/19/2022

Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge

Industrial Control Systems (ICSs) rely on insecure protocols and devices...
research
12/30/2020

Dynamic Graph-Based Anomaly Detection in the Electrical Grid

Given sensor readings over time from a power grid, how can we accurately...
research
04/27/2023

SHATTER: Control and Defense-Aware Attack Analytics for Activity-Driven Smart Home Systems

Modern smart home control systems utilize real-time occupancy and activi...
research
07/22/2019

Maya: Falsifying Power Sidechannels with Dynamic Control

The security of computers is at risk because of information leaking thro...

Please sign up or login with your details

Forgot password? Click here to reset