DDDAS for Attack Detection and Isolation of Control Systems

In the last decade, the security of control systems has become a research priority. Attack detection, isolation and reconfiguration are necessary to maintain a control system safe, even in the presence of attacks. In this work, we exploit some tools from fault-tolerant control systems and analyze them under a security framework leveraging the insights from Dynamic Data Driven Applications Systems (DDDAS). In particular, we propose DDDAS Anomaly Isolation and Response (DDDAS-AIR), an architecture for secure control systems that relies on simulations of the physical system to help us reconfigure the sensors in order to mitigate the impact of the attack. This chapter demonstrates the proposed mechanisms with a three-tanks system under attack, and shows how the evaluation of traditional fault-detection systems needs to be reconsidered for attacks instead of natural faults.

[1]  Nurcin Celik,et al.  DDDAMS-Based Dispatch Control in Power Networks , 2013, ICCS.

[2]  B. Moor,et al.  Subspace identification for linear systems , 1996 .

[3]  Frederica Darema,et al.  Dynamic Data Driven Applications Systems: A New Paradigm for Application Simulations and Measurements , 2004, International Conference on Computational Science.

[4]  Vaidy S. Sunderam,et al.  Security and Privacy Dimensions in Next Generation DDDAS/Infosymbiotic Systems: A Position Paper , 2015, ICCS.

[5]  Chun-Hung Chen,et al.  Dynamic Data Driven Adaptive Simulation Framework for Automated Control in Microgrids , 2017, IEEE Transactions on Smart Grid.

[6]  Salim Hariri,et al.  Resilient Dynamic Data Driven Application Systems (rDDDAS) , 2013, ICCS.

[7]  Georgios Theodoropoulos,et al.  Intelligent Management of Data Driven Simulations to Support Model Building in the Social Sciences , 2006, International Conference on Computational Science.

[8]  Gabriel Rodríguez,et al.  Building resilient cloud services using DDDAS and moving target defence , 2013, Int. J. Cloud Comput..

[9]  Henrik Sandberg,et al.  Limiting the Impact of Stealthy Attacks on Industrial Control Systems , 2016, CCS.

[10]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[11]  Gregory R. Madey,et al.  Control of Artificial Swarms with DDDAS , 2014, ICCS.

[12]  Alvaro A. Cárdenas,et al.  Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.

[13]  Erik Blasch,et al.  Airplane flight safety using error-tolerant data stream processing , 2017, IEEE Aerospace and Electronic Systems Magazine.

[14]  Nicanor Quijano,et al.  Response and reconfiguration of cyber-physical control systems: A survey , 2015, 2015 IEEE 2nd Colombian Conference on Automatic Control (CCAC).

[15]  Erik Blasch,et al.  Static Versus Dynamic Data Information Fusion Analysis Using DDDAS for Cyber Security Trust , 2014, ICCS.

[16]  F. L. Auspitz Systems theory and design , 1988 .

[17]  Qian Zhang,et al.  A dynamic data-driven application simulation model for oil spill emergency decision in port water area , 2013 .

[18]  Nitesh V. Chawla,et al.  Enhanced Situational Awareness: Application of DDDAS Concepts to Emergency and Disaster Management , 2007, International Conference on Computational Science.

[19]  Jie Chen,et al.  Robust Model-Based Fault Diagnosis for Dynamic Systems , 1998, The International Series on Asian Studies in Computer and Information Science.

[20]  Charles L. Phillips,et al.  Digital control system analysis and design (2nd ed.) , 1989 .