Browse > Article
http://dx.doi.org/10.1016/j.net.2016.10.009

Securing a Cyber Physical System in Nuclear Power Plants Using Least Square Approximation and Computational Geometric Approach  

Gawand, Hemangi Laxman (Homi Bhabha National Institute, Computer Section, BARC)
Bhattacharjee, A.K. (Reactor Control Division, BARC)
Roy, Kallol (BHAVINI)
Publication Information
Nuclear Engineering and Technology / v.49, no.3, 2017 , pp. 484-494 More about this Journal
Abstract
In industrial plants such as nuclear power plants, system operations are performed by embedded controllers orchestrated by Supervisory Control and Data Acquisition (SCADA) software. A targeted attack (also termed a control aware attack) on the controller/SCADA software can lead a control system to operate in an unsafe mode or sometimes to complete shutdown of the plant. Such malware attacks can result in tremendous cost to the organization for recovery, cleanup, and maintenance activity. SCADA systems in operational mode generate huge log files. These files are useful in analysis of the plant behavior and diagnostics during an ongoing attack. However, they are bulky and difficult for manual inspection. Data mining techniques such as least squares approximation and computational methods can be used in the analysis of logs and to take proactive actions when required. This paper explores methodologies and algorithms so as to develop an effective monitoring scheme against control aware cyber attacks. It also explains soft computation techniques such as the computational geometric method and least squares approximation that can be effective in monitor design. This paper provides insights into diagnostic monitoring of its effectiveness by attack simulations on a four-tank model and using computation techniques to diagnose it. Cyber security of instrumentation and control systems used in nuclear power plants is of paramount importance and hence could be a possible target of such applications.
Keywords
Cyber Physical Systems (CPS); Convexity; Computational Geometry; Least Square Approximation (LSA); DataStream Analysis; Nuclear Power Plant (NPP); Real-time Control System; Sequential Probability Ratio Test (SPRT); Cumulative Sum (CUSUM); Security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 H.L. Gawand, A.K. Bhattacharjee, K. Roy, Confirmation of Theoretical Results Regarding Control Theoretic Cyber Attacks on Controllers, Dynamics and Control of Process Systems - IFAC, DYCOPS 10 (1) (2013) 702-707.
2 A.A. Cardenas, S. Amin, Z.S. Liny, Y.-L. Huangy, C.-Y. Huang, S. Sastry, Attacks against process control systems: risk assessment, detection, and response, in: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security USA, Published by ACM 2011 Article, New York, NY, USA, 355-366.
3 M. Basseville, Detecting changes in signals and systems - a survey, Automatica 24 (1988) 309-326.   DOI
4 I. Sharfman, A. Schuster, D. Keren, A geometric approach to monitoring threshold functions over distributed data streams, SIGMOD '13, ACM New York, NY, USA.
5 M. Basseville, Statistical method of change detection, in: H. Unbehauen (Ed.), Robotics and Automation XVI, EOLSS Publishers, Oxford, UK, 2002, pp. 130-145.
6 F. Pasqualetti, Secure Control Systems: A Control-theoretic Approach to Cyber-Physical Security, PhD thesis, University Of California, USA, 2012.
7 Y. Liu, P. Ning, M. Reiter, Generalized false data injection attacks against state estimation in electric power grids, ACM Trans. Inform. Syst. Sec. (TISSEC) 14 13 (2011) 1-13:32.
8 R.K. Shyamasundar, Security and protection of SCADA: a big data algorithmic approach, in: Proceedings of the 6th International Conference on Security of Information and Networks (SIN '13), ACM, New York, NY, USA, 2013, pp. 20-27.
9 V. Shapiro, Real functions for representation of rigid solids, Computer-Aided Geom. Des. 11 (1994) 153-175.   DOI
10 G.T. Toussaint, A simple linear algorithm for intersecting convex polygons, Vis. Comput. 1 (1985) 118-123.   DOI
11 E.P. Gatzke, E.S. Meadows, C. Wang, F.J. Doyle III, Model based control of a four-tank system, Comput. Chem. Eng. 24 (2000) 1503-1509.   DOI
12 F.P. Preparata, S.J. Hong, Convex hulls of finite sets of points in two and three dimensions, Commun. ACM 20 (1977) 87-93.   DOI
13 K. Ogata, Modern Control Engineering, fifth ed., Prentice Hall, Boston, 2010.
14 M. Caselli, E. Zambon, F. Kargl, Sequence-aware intrusion detection in industrial control systems, in: Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, ACM, New York, NY, USA, 2015, pp. 13-24.
15 H.L. Gawand, A.K. Bhattacharjee, K. Roy, Investigation of control theoretic cyber-attacks on controllers, Int. J. Syst. Control Commun. 7 (2016), http://dx.doi.org/10.1504/IJSCC.2016.077410.   DOI