KABIRI, Peyman and CHAVOSHI, Mahdieh (2019). Destructive Attacks Detection and Response System for Physical Devices in Cyber-Physical Systems. In: 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). IEEE.
|
PDF
PID5862427 (1).pdf - Accepted Version All rights reserved. Download (359kB) | Preview |
Abstract
Nowadays, physical health of equipment controlled by Cyber-Physical Systems (CPS) is a significant concern. This paper reports a work, in which, a hardware is placed between Programmable Logic Controller (PLC) and the actuator as a solution. The proposed hardware operates in two conditions, i.e. passive and active. Operation of the proposed solution is based on the repetitive operational profile of the actuators. The normal operational profile of the actuator is fed to the protective hardware and is considered as the normal operating condition. In the normal operating condition, the middleware operates in its passive mode and simply monitors electronic signals passing between PLC and Actuator. In case of any malicious operation, the proposed hardware operates in its active mode and both slowly stops the actuator and sends an alert to SCADA server initiating execution of the actuator’s emergency profile. Thus, the proposed hardware gains control over the actuator and prevents any physical damage on the operating devices. Two sample experiments are reported in which, results of implementing the proposed solution are reported and assessed. Results show that once the PLC sends incorrect data to actuator, the proposed hardware detects it as an anomaly. Therefore, it does not allow the PLC to send incorrect and unauthorized data pattern to its actuator. Significance of the paper is in introducing a solution to prevent destruction of physical devices apart from source or purpose of the encountered anomaly and apart from CPS functionality or PLC model and operation.
Item Type: | Book Section |
---|---|
Additional Information: | © 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. |
Identification Number: | https://doi.org/10.1109/CyberSecPODS.2019.8884999 |
SWORD Depositor: | Symplectic Elements |
Depositing User: | Symplectic Elements |
Date Deposited: | 29 Apr 2019 10:14 |
Last Modified: | 18 Mar 2021 03:18 |
URI: | https://shura.shu.ac.uk/id/eprint/24522 |
Actions (login required)
View Item |
Downloads
Downloads per month over past year