Team for Research in
Ubiquitous Secure Technology

Detecting Integrity Attacks on SCADA Systems
Bruno Sinopoli

Citation
Bruno Sinopoli. "Detecting Integrity Attacks on SCADA Systems". Talk or presentation, 10, October, 2013.

Abstract
Ensuring security of systems based on supervisory control and data acquisition (SCADA) is a major challenge. The goal of this paper is to develop mode-based techniques capable of detecting integrity attacks on the sensor of a control system. In this paper the effect of integrity attacks on control systems I analyzed and countermeasure capable of exposing such attacks are proposed. The main contributions of the paper, beyond the novelty of the problem formulation, lies in enumerating the conditions of the feasibility of the replay attack, and suggesting countermeasures that optimize probability of detection by conceding control performance. The methodologies are illustrated and the theoretical results are validated using several sets of simulations.

Electronic downloads

Citation formats  
  • HTML
    Bruno Sinopoli. <a
    href="http://www.truststc.org/pubs/929.html"
    ><i>Detecting Integrity Attacks on SCADA
    Systems</i></a>, Talk or presentation,  10,
    October, 2013.
  • Plain text
    Bruno Sinopoli. "Detecting Integrity Attacks on SCADA
    Systems". Talk or presentation,  10, October, 2013.
  • BibTeX
    @presentation{Sinopoli13_DetectingIntegrityAttacksOnSCADASystems,
        author = {Bruno Sinopoli},
        title = {Detecting Integrity Attacks on SCADA Systems},
        day = {10},
        month = {October},
        year = {2013},
        abstract = {Ensuring security of systems based on supervisory
                  control and data acquisition (SCADA) is a major
                  challenge. The goal of this paper is to develop
                  mode-based techniques capable of detecting
                  integrity attacks on the sensor of a control
                  system. In this paper the effect of integrity
                  attacks on control systems I analyzed and
                  countermeasure capable of exposing such attacks
                  are proposed. The main contributions of the paper,
                  beyond the novelty of the problem formulation,
                  lies in enumerating the conditions of the
                  feasibility of the replay attack, and suggesting
                  countermeasures that optimize probability of
                  detection by conceding control performance. The
                  methodologies are illustrated and the theoretical
                  results are validated using several sets of
                  simulations.},
        URL = {http://www.truststc.org/pubs/929.html}
    }
    

Posted by Carolyn Winter on 18 Nov 2013.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.