Forensic readiness of industrial control systems under stealthy attacks

被引:10
|
作者
Azzam, Mazen [1 ]
Pasquale, Liliana [2 ]
Provan, Gregory [3 ]
Nuseibeh, Bashar [1 ,4 ]
机构
[1] Lero Univ Limerick, Limerick V94 T9PX, Ireland
[2] Lero Univ Coll Dublin, Dublin, Ireland
[3] Lero Univ Coll Cork, Coll Rd, Cork T12 K8AF, Ireland
[4] Open Univ, Milton Keynes MK7 6AA, England
基金
英国工程与自然科学研究理事会; 爱尔兰科学基金会;
关键词
Industrial control systems; Forensic readiness; Digital forensics; Safety checking; Stealthy attacks; Value of information;
D O I
10.1016/j.cose.2022.103010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyberattacks against Industrial Control Systems (ICS) can have harmful physical impacts. Investigating such attacks can be difficult, as evidence could be lost to physical damage. This is especially true with stealthy attacks ; i.e., attacks that can evade detection. In this paper, we aim to engineer Forensic Readiness (FR) in safety-critical, geographically distributed ICS, by proactively collecting potential evidence of stealthy attacks. The collection of all data generated by an ICS at all times is infeasible due to the large volume of such data. Hence, our approach only triggers data collection when there is the possibility for a potential stealthy attack to cause damage. We determine the conditions for such an event by performing predictive, model-based, safety checks. Furthermore, we use the geographical layout of the ICS and the safety predictions to identify data that is at risk of being lost due to damage, i.e., relevant data. Finally, to reduce the control performance overhead resulting from real-time data collection, we select a subset of relevant data to collect by performing a trade-off between expected impact of the attack and the estimated cost of collection. We demonstrate these ideas using simulations of the widely-used Tennessee- Eastman Process (TEP) benchmark. We show that the proposed approach does not miss relevant data and results in a reduced control performance overhead compared to the case when all data generated by the ICS is collected. We also showcase the applicability of our approach in improving the efficiency of existing ICS forensic log analysis tools.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Security Allocation in Networked Control Systems Under Stealthy Attacks
    Nguyen, Anh Tung
    Teixeira, Andre M. H.
    Medvedev, Alexander
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2025, 12 (01): : 216 - 227
  • [2] Revealing Stealthy Attacks in Control Systems
    Teixeira, Andre
    Shames, Iman
    Sandberg, Henrik
    Johansson, Karl H.
    2012 50TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2012, : 1806 - 1813
  • [3] Optimal Stealthy Attacks on Industrial Cyber Physical Systems Under Random Access Protocol
    Zhang, Xiao-Guang
    Yang, Guang-Hong
    Ren, Xiu-Xiu
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (03) : 2340 - 2350
  • [4] Detecting stealthy attacks against industrial control systems based on residual skewness analysis
    Hu, Yan
    Li, Hong
    Yang, Hong
    Sun, Yuyan
    Sun, Limin
    Wang, Zhiliang
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2019, 2019 (1)
  • [5] Detecting stealthy attacks against industrial control systems based on residual skewness analysis
    Yan Hu
    Hong Li
    Hong Yang
    Yuyan Sun
    Limin Sun
    Zhiliang Wang
    EURASIP Journal on Wireless Communications and Networking, 2019
  • [6] A Comparison of Stealthy Sensor Attacks on Control Systems
    Hashemi, Navid
    Murguia, Carlos
    Ruths, Justin
    2018 ANNUAL AMERICAN CONTROL CONFERENCE (ACC), 2018, : 973 - 979
  • [7] Detecting stealthy attacks on industrial control systems using a permutation entropy-based method
    Hu, Yan
    Li, Hong
    Luan, Tom H.
    Yang, An
    Sun, Limin
    Wang, Zhiliang
    Wang, Rui
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 108 (1230-1240): : 1230 - 1240
  • [8] Grounds for Suspicion: Physics-Based Early Warnings for Stealthy Attacks on Industrial Control Systems
    Azzam, Mazen
    Pasquale, Liliana
    Provan, Gregory
    Nuseibeh, Bashar
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (06) : 3955 - 3970
  • [9] Risk Assessment of Stealthy Attacks on Uncertain Control Systems
    Anand, Sribalaji C.
    Teixeira, Andre M. H.
    Ahlen, Anders
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2024, 69 (05) : 3214 - 3221
  • [10] Multi-dimensional Data Fusion Intrusion Detection for Stealthy Attacks on Industrial Control Systems
    Yang, An
    Wang, Xiaoshan
    Sun, Yuyan
    Hu, Yan
    Shi, Zhiqiang
    Sun, Limin
    2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,