Skip to main content

The Idea of On-line Diagnostics as a Method of Cyberattack Recognition

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 635))

Abstract

Cybercrime becomes a real problem in the everyday operation of production plants, industrial control systems, and other technical devices. The purpose of this article is to demonstrate that on-line diagnostics is an effective way to recognize cyberattacks. The security assurance system against cyberattacks for Industrial Control Systems is layered. The article discusses the possibility of the usage of known methods of process diagnostics to recognize cyberattacks in the Industrial Control Systems as an additional protection layer. Cyberattacks manifest with a variety of changes in the operation of the control system and the process flow deviating from its normal state. The discussed concept is to detect such changes based on models, evaluate them and on this basis conclude about the primary reason of abnormal operation, including the detection of cyberattack. Simple examples of such detection system are also presented.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Kozak, A., Kościelny, J.M., Pacyna, P., Gołębiewski, D., Paturej, K., Swiątkowska, J.: Cybersecurity of industrial installations - the cornerstone of the “Industry 4.0” project and a chance for Poland (in Polish). In: White paper on CYBERSEC 2016 (2016)

    Google Scholar 

  2. Kyoung-Dae, K., Kumar, P.R.: Cyber–physical systems: a perspective at the centennial. In: Proceedings of the IEEE, Vol. 100, 13th May 2012. doi:10.1109/JPROC.2012.2189792

  3. Slay, J., Miller, M.: Lessons learned from the Maroochy water breach. In: Goetz, E., Shenoi, S. (eds.) Critical Infrastructure Protection, vol. 253, pp. 73–82. Springer, Boston (2007)

    Google Scholar 

  4. Mysterious 08 Turkey Pipeline Blast Opened New Cyberwar. http://www.bloomberg.com/news/articles/2014-12-10/mysterious-08-turkey-pipeline-blast-opened-new-cyberwar

  5. British Columbia Institute of Technology, The Myth and facts behind Cyber Security Risk for Industrial Control Systems, Report PA Consulting Group. http://www.controlglobal.com/assets/Media/MediaManager/The_Myths_and_Facts_behind_Cyber_Security_Risks.pdf

  6. Falliere, N., Murchu, L.O., Chien, E.: W32.Stuxnet Dossier, Symantec (2011). http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf

  7. McMillan, R.: Siemens: Stuxnet worm hit industrial systems. Computerworld (2010). http://www.computerworld.com/s/article/9185419/Siemens_Stuxnet_worm_hit_industrial_systems

  8. Cherry, S.: How Stuxnet is rewriting the cyberterrorism playbook. Computerworld (2010). http://spectrum.ieee.org/podcast/telecom/security/how-stuxnet-is-rewriting-the-cyberterrorism-playbook

  9. Kozak, A.: Cybersecurity of industrial control systems (in Polish). Automatyka. http://automatykaonline.pl/Artykuly/Inne/Cyberbezpieczenstwo-przemyslowych-systemow-sterowania

  10. Schechter, S.E., Jung J., Berger, A.W.: Fast detection of scanning worm infections. In: Proceedings of 7th International Symposium on Recent Advances in Intrusion Detection, pp. 59–81 (2004)

    Google Scholar 

  11. Greenberg, A.: Hackers cut cities’power. Forbes (2008). http://www.forbes.com/2008/01/18/cyber-attack-utilities-tech-intel-cx_ag_0118attack.html

  12. Esposito, R.: Hackers penetrate water system computers. ABC News (2006). http://blogs.abcnews.com/theblotter/2006/10/hackers_penetra.html

  13. Fernandez, I.: Cyber security of control environments and industrial automation. The Strategies to protect and prevent security in the face of growing threats (in Polish). Report prepared by Frost & Sullivan with cooperation with Schneider Electric (2013)

    Google Scholar 

  14. Pacyna, P., Rapacz, N., Chmielecki, T., Chołda, P., Potrawka, P., Stankiewicz, R., Wydrych, P., Pach, A.: OKIT: Methodology for protection of critical teleinformation infrastructures (in Polish). PWN (2013)

    Google Scholar 

  15. https://cyberx-labs.com/en/xsense

  16. Korbicz, J., Kościelny, J.M. (eds.): Modeling, Diagnostics and Process Control: Implementation in the DiaSter system. Springer, Heidelberg (2010)

    Google Scholar 

  17. Kościelny, J.M., Bartyś, M.: The requirements for a new layer in the industrial safety systems. In: 9th IFAC Symposium on Fault Detection, Supervision and Safety of Technical Processes, SafeProcess 2015, Paris, France, pp. 1333–1338, 2–4 September 2015. http://www.ifac-papersonline.net/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michał Syfert .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Kościelny, J.M., Syfert, M., Wnuk, P. (2018). The Idea of On-line Diagnostics as a Method of Cyberattack Recognition. In: Kościelny, J., Syfert, M., Sztyber, A. (eds) Advanced Solutions in Diagnostics and Fault Tolerant Control. DPS 2017. Advances in Intelligent Systems and Computing, vol 635. Springer, Cham. https://doi.org/10.1007/978-3-319-64474-5_38

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-64474-5_38

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-64473-8

  • Online ISBN: 978-3-319-64474-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics