Model-Based CPS Attack Detection Techniques: Strengths and Limitations

[1]  Stavros Ntalampiras,et al.  Detection of Integrity Attacks in Cyber-Physical Critical Infrastructures Using Ensemble Modeling , 2015, IEEE Transactions on Industrial Informatics.

[2]  Bruce M. McMillin,et al.  Physical Attestation in the Smart Grid for Distributed State Verification , 2018, 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC).

[3]  Jianying Zhou,et al.  NoisePrint: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems , 2018, AsiaCCS.

[4]  Xavier Litrico,et al.  Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks , 2013, IEEE Transactions on Control Systems Technology.

[5]  Jianying Zhou,et al.  Challenges and Opportunities in CPS Security: A Physics-based Perspective , 2020, ArXiv.

[6]  Carlos Murguia,et al.  Characterization of a CUSUM model-based sensor attack detector , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[7]  Chuadhry Mujeeb Ahmed,et al.  DeepBLOC: A Framework for Securing CPS through Deep Reinforcement Learning on Stochastic Games , 2020, 2020 IEEE Conference on Communications and Network Security (CNS).

[8]  Ing-Ray Chen,et al.  A survey of intrusion detection techniques for cyber-physical systems , 2014, ACM Comput. Surv..

[9]  Chuadhry Mujeeb Ahmed,et al.  Revisiting Anomaly Detection in ICS: Aimed at Segregation of Attacks and Faults , 2020, ArXiv.

[10]  Lakshminarayanan Samavedham,et al.  A mechanistic fault detection and isolation approach using Kalman filter to improve the security of cyber physical systems , 2018, Journal of Process Control.

[11]  Alvaro A. Cárdenas,et al.  Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.

[12]  Ee-Chien Chang,et al.  Poster: Physics-Based Attack Detection for an Insider Threat Model in a Cyber-Physical System , 2018, AsiaCCS.

[13]  Douglas C. Montgomery,et al.  Introduction to Statistical Quality Control , 1986 .

[14]  Raheem A. Beyah,et al.  Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems , 2016, NDSS.

[15]  Carlos Murguia,et al.  Model-based Attack Detection Scheme for Smart Water Distribution Networks , 2017, AsiaCCS.

[16]  Karl Johan Åström,et al.  Computer-controlled systems (3rd ed.) , 1997 .

[17]  Mani Srivastava,et al.  PyCRA: Physical Challenge-Response Authentication For Active Sensors Under Spoofing Attacks , 2015, CCS.

[18]  Aditya P. Mathur,et al.  WADI: a water distribution testbed for research in the design of secure cyber physical systems , 2017, CySWATER@CPSWeek.

[19]  Dong Hoon Lee,et al.  Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks , 2016, IEEE Transactions on Vehicular Technology.

[20]  Paulo Tabuada,et al.  Secure State Estimation Against Sensor Attacks in the Presence of Noise , 2015, IEEE Transactions on Control of Network Systems.

[21]  Sridhar Adepu,et al.  Access Control in Water Distribution Networks: A Case Study , 2017, 2017 IEEE International Conference on Software Quality, Reliability and Security (QRS).

[22]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[23]  Sridhar Adepu,et al.  Limitations of state estimation based cyber attack detection schemes in industrial control systems , 2016, 2016 Smart City Security and Privacy Workshop (SCSP-W).

[24]  G. Box,et al.  Cumulative Sum Tests: Theory and Practice , 1968 .

[25]  Karl Henrik Johansson,et al.  Attack models and scenarios for networked control systems , 2012, HiCoNS '12.

[26]  Jill Slay,et al.  Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.

[27]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[28]  Aditya P. Mathur,et al.  Hardware Identification via Sensor Fingerprinting in a Cyber Physical System , 2017, 2017 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C).

[29]  Emilio Frazzoli,et al.  Switching and Data Injection Attacks on Stochastic Cyber-Physical Systems , 2017, ACM Trans. Cyber Phys. Syst..

[30]  William H. Woodall,et al.  The Use (and Misuse) of False Alarm Probabilities in Control Chart Design , 1992 .

[31]  Paulo Tabuada,et al.  SMT-Based Observer Design for Cyber-Physical Systems under Sensor Attacks , 2016, 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS).

[32]  Florian Dörfler,et al.  Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design , 2011, IEEE Conference on Decision and Control and European Control Conference.

[33]  Carlos Murguia,et al.  Multistage Downstream Attack Detection in a Cyber Physical System , 2017, CyberICPS/SECPRE@ESORICS.

[34]  Henrik Sandberg,et al.  Limiting the Impact of Stealthy Attacks on Industrial Control Systems , 2016, CCS.

[35]  S. Shankar Sastry,et al.  Research Challenges for the Security of Control Systems , 2008, HotSec.

[36]  Rongxing Lu,et al.  Defending Against False Data Injection Attacks on Power System State Estimation , 2017, IEEE Transactions on Industrial Informatics.

[37]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[38]  Chuadhry Mujeeb Ahmed,et al.  Process skew: fingerprinting the process for anomaly detection in industrial control systems , 2020, WISEC.

[39]  Vijay Gupta,et al.  On Kalman filtering in the presence of a compromised sensor: Fundamental performance bounds , 2014, 2014 American Control Conference.

[40]  Jianying Zhou,et al.  Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS , 2018, ACSAC.

[41]  S. Shankar Sastry,et al.  Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.

[42]  Tamer Basar,et al.  Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).

[43]  Fengjun Li,et al.  Cyber-Physical Systems Security—A Survey , 2017, IEEE Internet of Things Journal.

[44]  Bruno Sinopoli,et al.  Physical Authentication of Control Systems: Designing Watermarked Control Inputs to Detect Counterfeit Sensor Outputs , 2015, IEEE Control Systems.

[45]  Siddharth Sridhar,et al.  Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.

[46]  Aditya Mathur,et al.  NoiSense: Detecting Data Integrity Attacks on Sensor Measurements using Hardware based Fingerprints , 2017, ArXiv.

[47]  Zhao Yang Dong,et al.  A Review of False Data Injection Attacks Against Modern Power Systems , 2017, IEEE Transactions on Smart Grid.

[48]  Yun Gu,et al.  A novel method to detect bad data injection attack in smart grid , 2013, INFOCOM Workshops.

[49]  Chuadhry Mujeeb Ahmed,et al.  Can You See Me On Performance of Wireless Fingerprinting in a Cyber Physical System , 2017, 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE).

[50]  Jianying Zhou,et al.  A Tale of Two Testbeds: A Comparative Study of Attack Detection Techniques in CPS , 2020, CRITIS.

[51]  Michel Verhaegen,et al.  Sensor fault detection and isolation for wind turbines based on subspace identification and Kalman filter techniques , 2009 .

[52]  Dieter Gollmann,et al.  Industrial control systems security: What is happening? , 2013, 2013 11th IEEE International Conference on Industrial Informatics (INDIN).

[53]  P. Welch The use of fast Fourier transform for the estimation of power spectra: A method based on time averaging over short, modified periodograms , 1967 .

[54]  Sridhar Adepu,et al.  Distributed Detection of Single-Stage Multipoint Cyber Attacks in a Water Treatment Plant , 2016, AsiaCCS.

[55]  Xavier Litrico,et al.  Cyber Security of Water SCADA Systems—Part II: Attack Detection Using Enhanced Hydrodynamic Models , 2013, IEEE Transactions on Control Systems Technology.

[56]  Jun Sun,et al.  Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System , 2018, 2018 IEEE Symposium on Security and Privacy (SP).

[57]  Ronald Fisher,et al.  A History of Cyber Incidents and Threats Involving Industrial Control Systems , 2018, Critical Infrastructure Protection.