Exposing Hidden Attackers in Industrial Control Systems using Micro-distortions

07/29/2023
by   Suman Sourav, et al.
0

For industrial control systems (ICS), many existing defense solutions focus on detecting attacks only when they make the system behave anomalously. Instead, in this work, we study how to detect attackers who are still in their hiding phase. Specifically, we consider an off-path false-data-injection attacker who makes the original sensor's readings unavailable and then impersonates that sensor by sending out legitimate-looking fake readings, so that she can stay hidden in the system for a prolonged period of time (e.g., to gain more information or to launch the actual devastating attack on a specific time). To expose such hidden attackers, our approach relies on continuous injection of “micro distortion” to the original sensor's readings, either through digital or physical means. We keep the distortions strictly within a small magnitude (e.g., 0.5% of the possible operating value range) to ensure that it does not affect the normal functioning of the ICS. Micro-distortions are generated based on secret key(s) shared only between the targeted sensor and the defender. For digitally-inserted micro-distortions, we propose and discuss the pros and cons of a two-layer least-significant-bit-based detection algorithm. Alternatively, when the micro-distortions are added physically, a main design challenge is to ensure the introduced micro-distortions do not get overwhelmed by the fluctuation of actual readings and can still provide accurate detection capability. Towards that, we propose a simple yet effective Filtered-Δ-Mean-Difference algorithm that can expose the hidden attackers in a highly accurate and fast manner. We demonstrate the effectiveness and versatility of our defense by using real-world sensor reading traces from different industrial control (including smart grid) systems.

READ FULL TEXT
research
03/23/2022

Distort to Detect, not Affect: Detecting Stealthy Sensor Attacks with Micro-distortion

In this paper, we propose an effective and easily deployable approach to...
research
04/27/2023

SHATTER: Control and Defense-Aware Attack Analytics for Activity-Driven Smart Home Systems

Modern smart home control systems utilize real-time occupancy and activi...
research
10/11/2022

Detecting Hidden Attackers in Photovoltaic Systems Using Machine Learning

In modern smart grids, the proliferation of communication-enabled distri...
research
01/30/2019

Robust Sensor Design Against Multiple Attackers with Misaligned Control Objectives

We introduce a robust sensor design framework to provide defense against...
research
10/29/2020

Detecting FDI Attack on Dense IoT Network with Distributed Filtering Collaboration and Consensus

The rise of IoT has made possible the development of personalized servi...
research
08/20/2022

Sensor Security: Current Progress, Research Challenges, and Future Roadmap

Sensors are one of the most pervasive and integral components of today's...
research
01/28/2023

Vulnerabilities and Attacks on CAN-Based 3D Printing/Additive Manufacturing

Recent advancements in 3D-printing/additive manufacturing has brought fo...

Please sign up or login with your details

Forgot password? Click here to reset