Abstract
National security agencies are increasingly concerned about cyber threats to Industrial Control Systems (ICS). For this reason, the detection and mitigation of cyber-attacks on ICS, as well as addressing the consequences of these attacks, are extensively researched. This paper describes the efforts of the cyber research team at Binghamton University that created an experimental cyber research testbed, designed as a power station equipped with low-watt electric machinery and industrial control and sensory systems, common in modern ICS. This paper presents a comprehensive study of time delay injection attacks on networked control systems, in which an attacker injects extra time delays into the feedback and forward channels of control systems. These attacks enable the adversary to interfere with the control system and create system instability, causing anomalous operational regimes and potentially forcing the system to crash. A technology based on an online recursive estimation of network time delays is proposed and validated by simulation studies and experiments on the testbed to mitigate any time delay injection attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
ICS-CERT monitor. https://ics-cert.us-cert.gov/sites/default/files/Monitors/ICS-CERTMonitorMay-Jun2015.pdf. Accessed 14 July 2016
Antonioli, D., Tippenhauer, N.O.: Minicps: a toolkit for security research on cps networks. In: Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or Privacy, pp. 91–100. ACM (2015)
Cruz, T., Barrigas, J., Proença, J., Graziano, A., Panzieri, S., Lev, L., Simões, P.: Improving network security monitoring for industrial control systems. In: 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp. 878–881. IEEE (2015)
Fan, W.-H., Cai, H., Chen, Q.-W., Hu, W.-L.: Stability of networked control systems with time-delay. Kongzhi Lilun yu Yingyong/Control Theory Appl. (China), 21(6), 880–884 (2004)
Michiels, W., Niculescu, S.-I.: Stability, control, and computation for time-delay systems: an eigenvalue-based approach, vol. 27. Siam (2014)
Wang, F.-Y., Liu, D.: Networked control systems. Springer, London (2008)
Xiao, L., Hassibi, A., How, J. P.: Control with random communication delays via a discrete-time jump system approach. In: Proceedings of the 2000 American Control Conference. vol. 3, pp. 2199–2204. IEEE (2000)
Lee, Y., Lee, J., Park, S.: PID controller tuning for integrating and unstable processes with time delay. Chem. Eng. Sci. 55(17), 3481–3493 (2000)
Gupta, R.A., Chow, M.-Y.: Performance assessment and compensation for secure networked control systems. In: 34th Annual Conference of IEEE Industrial Electronics. IECON 2008, pp. 2929–2934. IEEE (2008)
Larsen, J.: Controlling without modifying: the stale data problem. In: S4x16, Miami, US, January 2016
Krotofil, M., Cardenas, A., Larsen, J., Gollmann, D.: Vulnerabilities of cyber-physical systems to stale data: determining the optimal time to launch attacks. Int. J. Crit. Infrastruct. Prot. 7(4), 213–232 (2014)
Lee, P., Clark, A., Bushnell, L., Poovendran, R.: A passivity framework for modeling and mitigating wormhole attacks on networked control systems. IEEE Trans. Autom. Control 59(12), 3224–3237 (2014)
Hu, Y.-C., Perrig, A., Johnson, D.B.: Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 370–380 (2006)
Sridhar, S., Hahn, A., Govindarasu, M.: Cyber–physical system security for the electric power grid. Proc. IEEE 100(1), 210–224 (2012)
Sargolzaei, A., Yen, K.K., Abdelghani, M.: Time-delay switch attack on load frequency control in smart grid. Adv. Commun. Technol. 5, 55–64 (2013)
Sargolzaei, A., Yen, K.K., Abdelghani, M.: Preventing time-delay switch attack on load frequency control in distributed power systems. IEEE Trans. Smart Grid 7(2), 1176–1185 (2016)
Korkmaz, E., Dolgikh, A., Davis, M., Skormin, V.: Industrial control systems security testbed. In: 11th Annual Symposium on Information Assurance (ASIA 2016), pp. 13–18, June 2016
Rizzo, L.: Dummynet: a simple approach to the evaluation of network protocols. ACM SIGCOMM Comput. Commun. Rev. 27(1), 31–41 (1997)
Carbone, M., Rizzo, L.: Dummynet revisited. ACM SIGCOMM Comput. Commun. Rev. 40(2), 12–20 (2010)
Hu, J., Wang, Z., Gao, H., Stergioulas, L.K.: Robust sliding mode control for discrete stochastic systems with mixed time delays, randomly occurring uncertainties, and randomly occurring nonlinearities. IEEE Trans. Ind. Electron. 59(7), 3008–3015 (2012)
Yang, R., Liu, G.-P., Shi, P., Thomas, C., Basin, M.V.: Predictive output feedback control for networked control systems. IEEE Trans. Ind. Electron. 61(1), 512–520 (2014)
Skormin, V.: Introduction to Process Control. Springer, Cham (2016)
Dolgikh, A., Birnbaum, Z., Skormin, V.: Customized behavioral normalcy profiles for critical infrastructure protection. In: 8th Annual Symposium on Information Assurance (ASIA 2013), Albany, NY, pp. 15–22, June 2013
Liu, G.-P., Xia, Y., Chen, J., Rees, D., Hu, W.: Networked predictive control of systems with random network delays in both forward and feedback channels. IEEE Trans. Ind. Electron. 54(3), 1282–1297 (2007)
Dunning, G.: Controllogix Programmable Automation Controllers with Labs Second Edition. Delmar Cengage Learning (2014)
Acknowledgement
This research was funded in parts by the Air Force Office of Scientific Research grant “Semantic Approach to Behavior Based IDS and its Applications” (Number FA9550-12-10077) and by the Office of Naval Research grant “Security Approach for Industrial Control Systems” (Number N00014-15-1-2759).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Korkmaz, E., Davis, M., Dolgikh, A., Skormin, V. (2017). Detection and Mitigation of Time Delay Injection Attacks on Industrial Control Systems with PLCs. In: Rak, J., Bay, J., Kotenko, I., Popyack, L., Skormin, V., Szczypiorski, K. (eds) Computer Network Security. MMM-ACNS 2017. Lecture Notes in Computer Science(), vol 10446. Springer, Cham. https://doi.org/10.1007/978-3-319-65127-9_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-65127-9_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-65126-2
Online ISBN: 978-3-319-65127-9
eBook Packages: Computer ScienceComputer Science (R0)