A Covert System Identification Attack on Constant Setpoint Control Systems

Tyler Phillips, Hoda Mehrpouyan, John Gardner, Stephen J. Reese

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

Industrial Control Systems (ICS) are the brain and backbone of nation's critical infrastructure such as nuclear power, water treatment, and petrochemical plants. In order to increase interoperability, real-time availability of data, and flexibility, information/communication technologies are adopted in this domain. While these information technologies have been effective, they are integrated into operational technologies without the necessary security defense. Designing an effective, layered security defense is not possible unless security threats are identified through a structural analysis of the ICS.

For that reason, this paper provides an attacker's point of view on the reconnaissance effort necessary to gather details of the system dynamics - which are required for the development of sophisticated attacks. We present a reconnaissance approach which uses the system's I/O data to infer the dynamic model of the system. In this effort, we propose a novel cyber-attack which targets the controller proportional-integral-derivative gain values in a constant setpoint control system. Our findings will help researchers design more secure control systems.

Original languageAmerican English
Title of host publication2019 Seventh International Symposium on Computing and Networking Workshops (CANDARW)
StatePublished - 1 Jan 2019

Keywords

  • cybersecurity
  • control systems
  • system identification
  • covert attack

EGS Disciplines

  • Computer Sciences

Fingerprint

Dive into the research topics of 'A Covert System Identification Attack on Constant Setpoint Control Systems'. Together they form a unique fingerprint.

Cite this