Efficient Predictive Monitoring of Linear Time-Invariant Systems Under Stealthy Attacks

06/04/2021
by   Mazen Azzam, et al.
0

Attacks on Industrial Control Systems (ICS) can lead to significant physical damage. While offline safety and security assessments can provide insight into vulnerable system components, they may not account for stealthy attacks designed to evade anomaly detectors during long operational transients. In this paper, we propose a predictive online monitoring approach to check the safety of the system under potential stealthy attacks. Specifically, we adapt previous results in reachability analysis for attack impact assessment to provide an efficient algorithm for online safety monitoring for Linear Time-Invariant (LTI) systems. The proposed approach relies on an offline computation of symbolic reachable sets in terms of the estimated physical state of the system. These sets are then instantiated online, and safety checks are performed by leveraging ideas from ellipsoidal calculus. We illustrate and evaluate our approach using the Tennessee-Eastman process. We also compare our approach with the baseline monitoring approaches proposed in previous work and assess its efficiency and scalability. Our evaluation results demonstrate that our approach can predict in a timely manner if a false data injection attack will be able to cause damage, while remaining undetected. Thus, our approach can be used to provide operators with real-time early warnings about stealthy attacks.

READ FULL TEXT

page 1

page 10

research
06/15/2021

Grounds for Suspicion: Physics-based Early Warnings for Stealthy Attacks on Industrial Control Systems

Stealthy attacks on Industrial Control Systems can cause significant dam...
research
06/18/2021

SAGE: Stealthy Attack GEneration for Cyber-Physical Systems

Cyber-physical systems (CPS) have been increasingly attacked by hackers....
research
07/16/2022

Exploring The Resilience of Control Execution Skips against False Data Injection Attacks

Modern Cyber-Physical Systems (CPSs) are often designed as networked, so...
research
11/15/2022

Resilient Set-based State Estimation for Linear Time-Invariant Systems Using Zonotopes

This paper considers the problem of set-based state estimation for linea...
research
05/27/2020

Identifying Vulnerabilities of Industrial Control Systems using Evolutionary Multiobjective Optimisation

In this paper we propose a novel methodology to assist in identifying vu...
research
03/25/2021

CHIMERA: A Hybrid Estimation Approach to Limit the Effects of False Data Injection Attacks

The reliable operation of the electric power systems is supported by ene...
research
10/16/2020

SAIBERSOC: Synthetic Attack Injection to Benchmark and Evaluate the Performance of Security Operation Centers

In this paper we introduce SAIBERSOC, a tool and methodology enabling se...

Please sign up or login with your details

Forgot password? Click here to reset