Browse > Article
http://dx.doi.org/10.13089/JKIISC.2018.28.1.123

An Experimental Environment for Simulation of Stealthy Deception Attack in CPS Using PLCitM (PLC in the Middle)  

Chang, Yeop (The Attached Institute of ETRI)
Lee, Woomyo (The Attached Institute of ETRI)
shin, Hyeok-Ki (The Attached Institute of ETRI)
Kim, Sinkyu (The Attached Institute of ETRI)
Abstract
Cyber-Physical System (CPS) is a system in which a physical system and a cyber system are strongly integrated. In order to operate the target physical system stably, the CPS constantly monitors the physical system through the sensor and performs control using the actuator according to the current state. If a malicious attacker performs a forgery attack on the measured values of the sensors in order to conceal their attacks, the cyber system operated based on the collected data can not recognize the current operation status of the physical system. This causes the delay of the response of the automation system and the operator, and then more damage will occur. To protect the CPS from increasingly sophisticated and targeted attacks, countermeasures must be developed that can detect stealthy deception attacks. However, in the CPS environment composed of various heterogeneous devices, the process of analyzing and demonstrating the vulnerability to actual field devices requires a lot of time. Therefore, in this study, we propose a method of constructing the experiment environment of the PLCitM (PLC in the middle) which can verify the performance of the techniques to detect the CPS stealthy deception attack and present the experimental results.
Keywords
Cyber Physical System; Stealthy Deception Attack; PLCitM (PLC in the Middle);
Citations & Related Records
연도 인용수 순위
  • Reference
1 D.F. Kune, J. Backesy, S.S. Clarkz, D. Kramer, M. Reynolds, K. Fu, Y. Kim, and W. Xu. "Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors," IEEE Symposium on Security and Privacy, pp. 145-159, May 2013.
2 M. Krotofil, J. Larsen, and D. Gollmann. "The Process Matters: Ensuring Data Veracity in Cyber-Physical Systems," Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. pp. 133-144, Apr. 2015.
3 M. Krotofil, A. Cardenas, J. Larsen, and D. Gollmann, "Vulnerabilities of cyber-physical systems to stale data-Determining the optimal time to launch attacks," International journal of critical infrastructure protection, vol. 7, no. 4, pp. 213-232, Dec. 2014.   DOI
4 S. Amin, X. Litrico, S. S. Sastry, and A. M. Bayen, "Cyber Security of Water SCADA Systems-Part I: Analysis and Experimentation of Stealthy Deception Attacks", IEEE Transactions on Control Systems Technology, vol. 21, no. 5, pp. 1963-1970, Sep. 2013.   DOI
5 S. Amin, X. Litrico, S. S. Sastry, and A. M. Bayen, "Cyber Security of Water SCADA Systems-Part II: Attack Detection Using Enhanced Hydrodynamic Model," IEEE Transactions on Control Systems Technology, vol. 21, no. 5, pp. 1679-1693, Sep. 2013.   DOI
6 Y. Shoukry, P. Martin, Y. Yona, S Diggavi, and M Srivastava. "PyCRA: Physical Challenge-Response Authentication For Active Sensors Under Spoofing Attacks," Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. pp. 1004-1015, Oct. 2015.
7 C. Kwon, W. Liu, and I. Hwang, "Security Analysis for Cyber-Physical Systems against Stealthy Deception Attacks", 2013 American Control Conference (ACC), Jun. 2013
8 Y Mo, S. Weerakkody, and B. Sinopoli. "Physical Authentication of Control Systems: Designing Watermarked Control Inputs to Detect Counterfeit Sensor Outputs," IEEE Control Systems. vol. 35, no. 1, pp. 93-109, Feb. 2015.   DOI
9 N Falliere, L.O. Murchu, and E. Chien. "W32.Stuxnet Dossier" v1.4, Symantec Security Response, Feb. 2011.
10 R.M. Lee, M.J. Assante, and T. Conway, "Analysis of the Cyber Attack on the Ukrainian Power Grid", SANS ICS Defense Use Cases, Mar. 2016.
11 Library of General Functions (LGF) for S7-1200/1500, https://support.industry.siemens.com/cs/document/109479728/library-of-general-functions-(lgf)-for-step-7-(tia-portal)-and-s7-1200-s7-1500?dti=0&lc=en-US
12 C.M. Ahmed, C. Murguia, and J Ruths. "Model-based Attack Detection Scheme for Smart Water Distribution Networks," Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 101-113, Apr. 2017
13 I. Ruchkum, A. Rao, D.D. Niz, S. Chaki, and D. Garlan, "Eliminating Inter-Domain Vulnerabilities in Cyber-Physical Systems: An Analysis Contracts Approach", Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, pp. 11-22, Oct. 2015