Detecting Sensor Signal Manipulations in Non-Linear Chemical Processes. / Wolthusen, Stephen D.

Critical Infrastructure Protection IV: Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, 2010. p. 81-94.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Published

Standard

Detecting Sensor Signal Manipulations in Non-Linear Chemical Processes. / Wolthusen, Stephen D.

Critical Infrastructure Protection IV: Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, 2010. p. 81-94.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Harvard

Wolthusen, SD 2010, Detecting Sensor Signal Manipulations in Non-Linear Chemical Processes. in Critical Infrastructure Protection IV: Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, pp. 81-94. https://doi.org/10.1007/978-3-642-16806-2_6

APA

Wolthusen, S. D. (2010). Detecting Sensor Signal Manipulations in Non-Linear Chemical Processes. In Critical Infrastructure Protection IV: Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection (pp. 81-94). Springer-Verlag. https://doi.org/10.1007/978-3-642-16806-2_6

Vancouver

Wolthusen SD. Detecting Sensor Signal Manipulations in Non-Linear Chemical Processes. In Critical Infrastructure Protection IV: Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag. 2010. p. 81-94 https://doi.org/10.1007/978-3-642-16806-2_6

Author

Wolthusen, Stephen D. / Detecting Sensor Signal Manipulations in Non-Linear Chemical Processes. Critical Infrastructure Protection IV: Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, 2010. pp. 81-94

BibTeX

@inproceedings{7be3e2ff84674361894106c525ac9b82,
title = "Detecting Sensor Signal Manipulations in Non-Linear Chemical Processes",
abstract = "Modern process control systems are increasingly vulnerable to subversion. Attacks that directly target production processes are difficult to detect because signature-based approaches are not well-suited to the unique requirements of process control systems. Also, anomaly detection mechanisms have difficulty coping with the non-linearity of industrial processes.This paper focuses on the problem where attackers gain supervisory control of systems and hide their manipulations in signal noise or conceal computational states. To detect these attacks, we identify suitable proxy measurements for the output of a control system. Utilizing control laws, we compare the estimated system output using real-time numerical simulation along with the actual output to detect attacker manipulations. This approach also helps determine the intervention required to return the process to a safe state.The approach is demonstrated using a heat exchange process as a case study. By employing an explicit control model rather than a learning system or anomaly detection approach, the minimal requirements on proxy sensors and the need for additional sensors can be characterized. This significantly improves resilience while minimizing cost.",
author = "Wolthusen, {Stephen D.}",
year = "2010",
month = "3",
doi = "10.1007/978-3-642-16806-2_6",
language = "English",
isbn = "978-3-642-16806-2",
pages = "81--94",
booktitle = "Critical Infrastructure Protection IV",
publisher = "Springer-Verlag",

}

RIS

TY - GEN

T1 - Detecting Sensor Signal Manipulations in Non-Linear Chemical Processes

AU - Wolthusen, Stephen D.

PY - 2010/3

Y1 - 2010/3

N2 - Modern process control systems are increasingly vulnerable to subversion. Attacks that directly target production processes are difficult to detect because signature-based approaches are not well-suited to the unique requirements of process control systems. Also, anomaly detection mechanisms have difficulty coping with the non-linearity of industrial processes.This paper focuses on the problem where attackers gain supervisory control of systems and hide their manipulations in signal noise or conceal computational states. To detect these attacks, we identify suitable proxy measurements for the output of a control system. Utilizing control laws, we compare the estimated system output using real-time numerical simulation along with the actual output to detect attacker manipulations. This approach also helps determine the intervention required to return the process to a safe state.The approach is demonstrated using a heat exchange process as a case study. By employing an explicit control model rather than a learning system or anomaly detection approach, the minimal requirements on proxy sensors and the need for additional sensors can be characterized. This significantly improves resilience while minimizing cost.

AB - Modern process control systems are increasingly vulnerable to subversion. Attacks that directly target production processes are difficult to detect because signature-based approaches are not well-suited to the unique requirements of process control systems. Also, anomaly detection mechanisms have difficulty coping with the non-linearity of industrial processes.This paper focuses on the problem where attackers gain supervisory control of systems and hide their manipulations in signal noise or conceal computational states. To detect these attacks, we identify suitable proxy measurements for the output of a control system. Utilizing control laws, we compare the estimated system output using real-time numerical simulation along with the actual output to detect attacker manipulations. This approach also helps determine the intervention required to return the process to a safe state.The approach is demonstrated using a heat exchange process as a case study. By employing an explicit control model rather than a learning system or anomaly detection approach, the minimal requirements on proxy sensors and the need for additional sensors can be characterized. This significantly improves resilience while minimizing cost.

U2 - 10.1007/978-3-642-16806-2_6

DO - 10.1007/978-3-642-16806-2_6

M3 - Conference contribution

SN - 978-3-642-16806-2

SP - 81

EP - 94

BT - Critical Infrastructure Protection IV

PB - Springer-Verlag

ER -