Skip to main content

Improving Control System Cyber-State Awareness Using Known Secure Sensor Measurements

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7722))

Abstract

This paper presents design and simulation of a low cost and low false alarm rate method for improved cyber-state awareness of critical control systems - the Known Secure Sensor Measurements (KSSM) method. The KSSM concept relies on physical measurements to detect malicious falsification of the control systems state. The KSSM method can be incrementally integrated with already installed control systems for enhanced resilience. This paper reviews the previously developed theoretical KSSM concept and then describes a simulation of the KSSM system. A simulated control system network is integrated with the KSSM components. The effectiveness of detection of various intrusion scenarios is demonstrated on several control system network topologies.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Linda, O., Manic, M., McJunkin, T.R.: Anomaly Detection for Resilient Control Systems Using Fuzzy-Neural Data Fusion Engine. In: Proc. IEEE Symposium on Resilient Control Systems (August 2011)

    Google Scholar 

  2. Rieger, C.G., Gertman, D.I., McQueen, M.A.: Resilient Control Systems: Next Generation Design Research. In: Proc. 2nd IEEE Conf. on Human System Interactions, Catania, Italy, pp. 632–636 (May 2009)

    Google Scholar 

  3. Stamp, M.: Information Security, ch. 3-5, 9, 2nd edn. John Wiley and Sons (2011)

    Google Scholar 

  4. Ferguson, N., Schneier, B., Kohno, T.: Cryptography Engineering, ch. 3-7 (2010)

    Google Scholar 

  5. McQueen, M., Giani, A.: ’Known Secure Sensor Measurements’ for Critical Infrastructure Systems: Detecting Falsification of Systems State. In: Troubitsyna, E.A. (ed.) SERENE 2011. LNCS, vol. 6968, pp. 156–163. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  6. Giani, A., Bitar, E., McQueen, M., Khargonekar, P., Poolla, K.: Smart Grid Data Integrity Attacks: Characterization and Countermeasures. In: Proc. of IEEE SmartGridComm (October 2011)

    Google Scholar 

  7. Linda, O., Vollmer, T., Manic, M.: Neural Network based Intrusion Detection System for Critical Infrastructure. In: Proc. IJCNN 2009 (June 2009)

    Google Scholar 

  8. Linda, O., Manic, M., Vollmer, T., Wright, J.: Fuzzy Logic Based Anomaly Detection for Embedded Network Security Cyber Sensor. In: Proc. of IEEE Symposium on Computational Intelligence, pp. 202–209 (April 2011)

    Google Scholar 

  9. Yang, D., Usynin, A., Hines, J.W.: Anomaly-Based Intrusion Detection for SCADA Systems. In: 5th Intl. Topical Meeting on Nuclear Plant Instrumentation, Control and Human Machine Interface Technologies (NPIC&HMIT 2005), Albuquerque, NM, November 12-16 (2006)

    Google Scholar 

  10. Zhong, S., Khoshgoftaar, T., Seliya, N.: Clustering-based network intrusion detection. Intl. Journal of Reliability, Quality and Safety 14(2), 169–187 (2007)

    Article  Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Linda, O., Manic, M., McQueen, M. (2013). Improving Control System Cyber-State Awareness Using Known Secure Sensor Measurements. In: Hämmerli, B.M., Kalstad Svendsen, N., Lopez, J. (eds) Critical Information Infrastructures Security. Lecture Notes in Computer Science, vol 7722. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41485-5_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-41485-5_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-41484-8

  • Online ISBN: 978-3-642-41485-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics