A covert system identification attack on constant setpoint control systems

Tyler Phillips, Hoda Mehrpouyan, John Gardner, Stephen Reese

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

10 Scopus citations

Abstract

Industrial Control Systems (ICS) are the brain and backbone of nation's critical infrastructure such as nuclear power, water treatment, and petrochemical plants. In order to increase interoperability, real-time availability of data, and flexibility, information/communication technologies are adopted in this domain. While these information technologies have been effective, they are integrated into operational technologies without the necessary security defense. Designing an effective, layered security defense is not possible unless security threats are identified through a structural analysis of the ICS. For that reason, this paper provides an attacker's point of view on the reconnaissance effort necessary to gather details of the system dynamics - which are required for the development of sophisticated attacks. We present a reconnaissance approach which uses the system's I/O data to infer the dynamic model of the system. In this effort, we propose a novel cyber-attack which targets the controller proportional-integral-derivative gain values in a constant setpoint control system. Our findings will help researchers design more secure control systems.

Original languageEnglish
Title of host publicationProceedings - 2019 7th International Symposium on Computing and Networking Workshops, CANDARW 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages367-373
Number of pages7
ISBN (Electronic)9781728152684
DOIs
StatePublished - Nov 2019
Event7th International Symposium on Computing and Networking Workshops, CANDARW 2019 - Nagasaki, Japan
Duration: 26 Nov 201929 Nov 2019

Publication series

NameProceedings - 2019 7th International Symposium on Computing and Networking Workshops, CANDARW 2019

Conference

Conference7th International Symposium on Computing and Networking Workshops, CANDARW 2019
Country/TerritoryJapan
CityNagasaki
Period26/11/1929/11/19

Keywords

  • Cyberattack
  • Industrial Control Systems
  • System Identification

Fingerprint

Dive into the research topics of 'A covert system identification attack on constant setpoint control systems'. Together they form a unique fingerprint.

Cite this