Abstract
Cybercrime becomes a real problem in the everyday operation of production plants, industrial control systems, and other technical devices. The purpose of this article is to demonstrate that on-line diagnostics is an effective way to recognize cyberattacks. The security assurance system against cyberattacks for Industrial Control Systems is layered. The article discusses the possibility of the usage of known methods of process diagnostics to recognize cyberattacks in the Industrial Control Systems as an additional protection layer. Cyberattacks manifest with a variety of changes in the operation of the control system and the process flow deviating from its normal state. The discussed concept is to detect such changes based on models, evaluate them and on this basis conclude about the primary reason of abnormal operation, including the detection of cyberattack. Simple examples of such detection system are also presented.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Kozak, A., Kościelny, J.M., Pacyna, P., Gołębiewski, D., Paturej, K., Swiątkowska, J.: Cybersecurity of industrial installations - the cornerstone of the “Industry 4.0” project and a chance for Poland (in Polish). In: White paper on CYBERSEC 2016 (2016)
Kyoung-Dae, K., Kumar, P.R.: Cyber–physical systems: a perspective at the centennial. In: Proceedings of the IEEE, Vol. 100, 13th May 2012. doi:10.1109/JPROC.2012.2189792
Slay, J., Miller, M.: Lessons learned from the Maroochy water breach. In: Goetz, E., Shenoi, S. (eds.) Critical Infrastructure Protection, vol. 253, pp. 73–82. Springer, Boston (2007)
Mysterious 08 Turkey Pipeline Blast Opened New Cyberwar. http://www.bloomberg.com/news/articles/2014-12-10/mysterious-08-turkey-pipeline-blast-opened-new-cyberwar
British Columbia Institute of Technology, The Myth and facts behind Cyber Security Risk for Industrial Control Systems, Report PA Consulting Group. http://www.controlglobal.com/assets/Media/MediaManager/The_Myths_and_Facts_behind_Cyber_Security_Risks.pdf
Falliere, N., Murchu, L.O., Chien, E.: W32.Stuxnet Dossier, Symantec (2011). http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf
McMillan, R.: Siemens: Stuxnet worm hit industrial systems. Computerworld (2010). http://www.computerworld.com/s/article/9185419/Siemens_Stuxnet_worm_hit_industrial_systems
Cherry, S.: How Stuxnet is rewriting the cyberterrorism playbook. Computerworld (2010). http://spectrum.ieee.org/podcast/telecom/security/how-stuxnet-is-rewriting-the-cyberterrorism-playbook
Kozak, A.: Cybersecurity of industrial control systems (in Polish). Automatyka. http://automatykaonline.pl/Artykuly/Inne/Cyberbezpieczenstwo-przemyslowych-systemow-sterowania
Schechter, S.E., Jung J., Berger, A.W.: Fast detection of scanning worm infections. In: Proceedings of 7th International Symposium on Recent Advances in Intrusion Detection, pp. 59–81 (2004)
Greenberg, A.: Hackers cut cities’power. Forbes (2008). http://www.forbes.com/2008/01/18/cyber-attack-utilities-tech-intel-cx_ag_0118attack.html
Esposito, R.: Hackers penetrate water system computers. ABC News (2006). http://blogs.abcnews.com/theblotter/2006/10/hackers_penetra.html
Fernandez, I.: Cyber security of control environments and industrial automation. The Strategies to protect and prevent security in the face of growing threats (in Polish). Report prepared by Frost & Sullivan with cooperation with Schneider Electric (2013)
Pacyna, P., Rapacz, N., Chmielecki, T., Chołda, P., Potrawka, P., Stankiewicz, R., Wydrych, P., Pach, A.: OKIT: Methodology for protection of critical teleinformation infrastructures (in Polish). PWN (2013)
Korbicz, J., Kościelny, J.M. (eds.): Modeling, Diagnostics and Process Control: Implementation in the DiaSter system. Springer, Heidelberg (2010)
Kościelny, J.M., Bartyś, M.: The requirements for a new layer in the industrial safety systems. In: 9th IFAC Symposium on Fault Detection, Supervision and Safety of Technical Processes, SafeProcess 2015, Paris, France, pp. 1333–1338, 2–4 September 2015. http://www.ifac-papersonline.net/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Kościelny, J.M., Syfert, M., Wnuk, P. (2018). The Idea of On-line Diagnostics as a Method of Cyberattack Recognition. In: Kościelny, J., Syfert, M., Sztyber, A. (eds) Advanced Solutions in Diagnostics and Fault Tolerant Control. DPS 2017. Advances in Intelligent Systems and Computing, vol 635. Springer, Cham. https://doi.org/10.1007/978-3-319-64474-5_38
Download citation
DOI: https://doi.org/10.1007/978-3-319-64474-5_38
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-64473-8
Online ISBN: 978-3-319-64474-5
eBook Packages: EngineeringEngineering (R0)