DOI QR코드

DOI QR Code

Securing a Cyber Physical System in Nuclear Power Plants Using Least Square Approximation and Computational Geometric Approach

  • Received : 2016.06.25
  • Accepted : 2016.10.17
  • Published : 2017.06.25

Abstract

In industrial plants such as nuclear power plants, system operations are performed by embedded controllers orchestrated by Supervisory Control and Data Acquisition (SCADA) software. A targeted attack (also termed a control aware attack) on the controller/SCADA software can lead a control system to operate in an unsafe mode or sometimes to complete shutdown of the plant. Such malware attacks can result in tremendous cost to the organization for recovery, cleanup, and maintenance activity. SCADA systems in operational mode generate huge log files. These files are useful in analysis of the plant behavior and diagnostics during an ongoing attack. However, they are bulky and difficult for manual inspection. Data mining techniques such as least squares approximation and computational methods can be used in the analysis of logs and to take proactive actions when required. This paper explores methodologies and algorithms so as to develop an effective monitoring scheme against control aware cyber attacks. It also explains soft computation techniques such as the computational geometric method and least squares approximation that can be effective in monitor design. This paper provides insights into diagnostic monitoring of its effectiveness by attack simulations on a four-tank model and using computation techniques to diagnose it. Cyber security of instrumentation and control systems used in nuclear power plants is of paramount importance and hence could be a possible target of such applications.

Keywords

References

  1. A.A. Cardenas, S. Amin, Z.S. Liny, Y.-L. Huangy, C.-Y. Huang, S. Sastry, Attacks against process control systems: risk assessment, detection, and response, in: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security USA, Published by ACM 2011 Article, New York, NY, USA, 355-366.
  2. M. Basseville, Detecting changes in signals and systems - a survey, Automatica 24 (1988) 309-326. https://doi.org/10.1016/0005-1098(88)90073-8
  3. H.L. Gawand, A.K. Bhattacharjee, K. Roy, Confirmation of Theoretical Results Regarding Control Theoretic Cyber Attacks on Controllers, Dynamics and Control of Process Systems - IFAC, DYCOPS 10 (1) (2013) 702-707.
  4. I. Sharfman, A. Schuster, D. Keren, A geometric approach to monitoring threshold functions over distributed data streams, SIGMOD '13, ACM New York, NY, USA.
  5. M. Basseville, Statistical method of change detection, in: H. Unbehauen (Ed.), Robotics and Automation XVI, EOLSS Publishers, Oxford, UK, 2002, pp. 130-145.
  6. F. Pasqualetti, Secure Control Systems: A Control-theoretic Approach to Cyber-Physical Security, PhD thesis, University Of California, USA, 2012.
  7. Y. Liu, P. Ning, M. Reiter, Generalized false data injection attacks against state estimation in electric power grids, ACM Trans. Inform. Syst. Sec. (TISSEC) 14 13 (2011) 1-13:32.
  8. R.K. Shyamasundar, Security and protection of SCADA: a big data algorithmic approach, in: Proceedings of the 6th International Conference on Security of Information and Networks (SIN '13), ACM, New York, NY, USA, 2013, pp. 20-27.
  9. V. Shapiro, Real functions for representation of rigid solids, Computer-Aided Geom. Des. 11 (1994) 153-175. https://doi.org/10.1016/0167-8396(94)90030-2
  10. G.T. Toussaint, A simple linear algorithm for intersecting convex polygons, Vis. Comput. 1 (1985) 118-123. https://doi.org/10.1007/BF01898355
  11. E.P. Gatzke, E.S. Meadows, C. Wang, F.J. Doyle III, Model based control of a four-tank system, Comput. Chem. Eng. 24 (2000) 1503-1509. https://doi.org/10.1016/S0098-1354(00)00555-X
  12. F.P. Preparata, S.J. Hong, Convex hulls of finite sets of points in two and three dimensions, Commun. ACM 20 (1977) 87-93. https://doi.org/10.1145/359423.359430
  13. K. Ogata, Modern Control Engineering, fifth ed., Prentice Hall, Boston, 2010.
  14. M. Caselli, E. Zambon, F. Kargl, Sequence-aware intrusion detection in industrial control systems, in: Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, ACM, New York, NY, USA, 2015, pp. 13-24.
  15. H.L. Gawand, A.K. Bhattacharjee, K. Roy, Investigation of control theoretic cyber-attacks on controllers, Int. J. Syst. Control Commun. 7 (2016), http://dx.doi.org/10.1504/IJSCC.2016.077410.

Cited by

  1. Cyber Physical System (CPS)-Based Industry 4.0: A Survey vol.2, pp.3, 2017, https://doi.org/10.1142/s2424862217500142
  2. A Robust Cybersecurity Solution Platform Architecture for Digital Instrumentation and Control Systems in Nuclear Power Facilities vol.206, pp.7, 2017, https://doi.org/10.1080/00295450.2019.1666599
  3. Security risks in cyber physical systems-A systematic mapping study vol.33, pp.9, 2017, https://doi.org/10.1002/smr.2346