Secure Control Systems - A Quantitative Risk Management Approach

Slides:



Advertisements
Similar presentations
TARGET DETECTION AND TRACKING IN A WIRELESS SENSOR NETWORK Clement Kam, William Hodgkiss, Dept. of Electrical and Computer Engineering, University of California,
Advertisements

Mobile Robot Localization and Mapping using the Kalman Filter
METHODOLOGY FOR IDENTIFYING NEAR-OPTIMAL INTERDICTION STRATEGIES FOR A POWER TRANSMISSION SYSTEM Vicki M. Bier, Eli Robert Gratz, Naraphorn J. Haphuriwat,
Presenter: Raghu Ranganathan ECE / CMR Tennessee Technological University March 22th, 2011 Smart grid seminar series Yao Liu, Peng Ning, and Michael K.
Robust control Saba Rezvanian Fall-Winter 88.
Vulnerability of Complex System Lokaltermin des ETH-Präsidenten Mittwoch, 1. Juli 2009 Laboratory for Safety Analysis.
On the Conditional Mutual Information in Gaussian- Markov Structured Grids Hanie Sedghi & Edmond Jonckheere.
Fault Detection and Isolation of an Aircraft using Set-Valued Observers Paulo Rosa (ISR/IST) Dynamic Stochastic Filtering, Prediction, and Smoothing –
NORM BASED APPROACHES FOR AUTOMATIC TUNING OF MODEL BASED PREDICTIVE CONTROL Pastora Vega, Mario Francisco, Eladio Sanz University of Salamanca – Spain.
1 Integration of Background Modeling and Object Tracking Yu-Ting Chen, Chu-Song Chen, Yi-Ping Hung IEEE ICME, 2006.
1 Challenges in Power Systems State Estimation Lamine Mili Virginia Tech Alexandria Research Institute.
Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui Wei, Wenye Wang Department of Electrical and Computer.
A project under the 7th Framework Programme CPS Workshop Stockholm 12/04/2010 Gunnar Björkman Project Coordinator A Security Project for the Protection.
Data Selection In Ad-Hoc Wireless Sensor Networks Olawoye Oyeyele 11/24/2003.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Course Flow Diagrams May 2-3, 2013 Support.
CYBER - PHYSICAL SECURITY
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
Multiuser Detection (MUD) Combined with array signal processing in current wireless communication environments Wed. 박사 3학기 구 정 회.
1 Security assessment: decision support tools for power system operators James D. McCalley, Iowa State University, Ames, Iowa September.
Optimal Power Flow: Closing the Loop over Corrupted Data André Teixeira, Henrik Sandberg, György Dán, and Karl H. Johansson ACCESS Linnaeus Centre, KTH.
Chapter 8 Model Based Control Using Wireless Transmitter.
1 Robust Statistical Methods for Securing Wireless Localization in Sensor Networks (IPSN ’05) Zang Li, Wade Trappe Yanyong Zhang, Badri Nath Rutgers University.
Project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Business Convergence WS#2 Smart Grid Technologies.
Secure In-Network Aggregation for Wireless Sensor Networks
A Trust Based Distributed Kalman Filtering Approach for Mode Estimation in Power Systems Tao Jiang, Ion Matei and John S. Baras Institute for Systems Research.
Parameter estimation of forest carbon dynamics using Kalman Filter methods –Preliminary results Chao Gao, 1 Han Wang, 2 S Lakshmivarahan, 3 Ensheng Weng,
1 © A. Kwasinski, 2015 Cyber Physical Power Systems Fall 2015 Security.
WCRP Extremes Workshop Sept 2010 Detecting human influence on extreme daily temperature at regional scales Photo: F. Zwiers (Long-tailed Jaeger)
Spectrum Sensing In Cognitive Radio Networks
By: Aaron Dyreson Supervising Professor: Dr. Ioannis Schizas
NATIONAL CYBER SECURITY GOVERNANCE & EMERGING CYBER SECURITY THREATS
1 On Detection and Concealment of Critical Roles in Tactical Wireless Networks Zhuo Lu University of Memphis Cliff Wang Army Research Office Mingkui Wei.
On Security Indices for State Estimators in Power Networks Henrik Sandberg, André Teixeira, and Karl Henrik Johansson Automatic Control Lab, ACCESS Linnaeus.
Security and Resilience Pat Looney Brookhaven National Laboratory April 2016.
Sensing and Measurements Tom King Oak Ridge National Laboratory April 2016.
Automation Technologies SCADA SENSORS HMI
1.) Acquisition Phase Task:
Stealthy Deception Attacks Against SCADA Systems
WP3: D3.1 status, pending comments and next steps
A lustrum of malware network communication: Evolution & insights
Hidden Moving Target Defense in Smart Grids
Agenda Control systems defined
ELECTRIC POWER GRID INTERDICITION
Cyber Resilient Energy Delivery Consortium
How SCADA Systems Work?.
Bayesian Biosurveillance of Disease Outbreaks
Cybersecurity EXERCISE (CE) ATD Scenario intro
Wenjing Lou Complex Networks and Security Research (CNSR) Lab
Emerging Cyber Tech for Evolving Cyber Threats Chris Hankin
Student: Hao Xu, ECE Department
Benchmarking Quasi-Steady State Cascading Outage Analysis Methodologies IEEE Working Group on Understanding, Prediction, Mitigation and Restoration of.
Transit Signal Priority: Evolution
SLOPE: A MATLAB Revival
Risk Analysis and HIPAA Security
Vicki M. Bier, Eli Robert Gratz, Naraphorn J
Specification of Countermeasures for CYRAIL
How to assess the risks? Irene Arsuaga CYRAIL Final Conference
Contingency-Constrained PMU Placement in Power Networks
Security assessment: decision support tools for power system operators
What are the Resilience Mechanisms? Hugo Pereira Evoleo Technologies
Cybersecurity ATD technical
Wenyu Ren, Timothy Yardley, Klara Nahrstedt
M.Eng. Alessandro Mancuso Supervisor: Dr. Piotr Żebrowski
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
Detection Theory Chapter 12 Model Change Detection
CYBER SECURITY SPACE OPERATIONS AND RESILIENCY.
Wen-Long Chin, Wan Li, and Hsiao-Hwa Chen
Planting trees in random graphs (and finding them back)
Presentation transcript:

Secure Control Systems - A Quantitative Risk Management Approach Teixeira Andre, Kin Cheong Sou, Sandberg, H., Johansson, K.H. IEEE Control Systems Magazine, Feb. 2015 Presented by Kyoungbok Kim 2015.03.23

INDEX Introduction Networked Control System Adversary Model Risk Management Framework For Static & Dynamic System cases Conclusion

Cyber-Physical Systems Integration Group. 01. Introduction Critical infrastructures must continuously operate safely and reliably, despite a variety of potential system disturbances Physical systems are often spatially distributed, there is a need for IT infrastructures (e.g., electric power network, intelligent transport systems, industrial processes) Networked control systems are vulnerable to cyber threats through the use of open communication networks This article shows some approaches to address cyber security of networked control systems under perspective of risk management (for stealthy deception attacks) Cyber-Physical Systems Integration Group.

02. Networked Control System Under Attacks Typical networked control system structure : Control signal : Measurement signal : false data injection of adversary through Comm An alarm is triggered by anomaly detector when norm of residue signal r over time interval [k0, kf] exceeds a given threshold Anomaly detector은 residue signal을 계산하는데, Dynamic model of plant Cyber-Physical Systems Integration Group.

Cyber-Physical Systems Integration Group. 03. Adversary Model in NCSs Adversary’s goal to force the process state into an unsafe region Attack should be stealthy, i.e., no alarms Adversary constrained by limited resources Stealthy signal is that the magnitude of residue signal is smaller than detection threshold, so that no alarm is triggered Cyber-Physical Systems Integration Group.

Cyber-Physical Systems Integration Group. 03. NCS with Adversary Model Cyber-Physical Systems Integration Group.

Cyber-Physical Systems Integration Group. 03. Attack Space Cyber-Physical Systems Integration Group.

Cyber-Physical Systems Integration Group. 03. Example of Stealthy Deception Attack Actual residue signal is computed by anomaly detector Actual residue signal (red) and ideal one (green) Attack is not detected while adversary succeeds S는 safe set Cyber-Physical Systems Integration Group.

Cyber-Physical Systems Integration Group. 04. Risk Management Framework Objective of risk management is assess and minimize risk of threats Quantitative methods can be used <A diagram of risk management cycle> Cyber-Physical Systems Integration Group.

Cyber-Physical Systems Integration Group. 04. Risk Management Framework Concept of risk is defined as function of threat’s likelihood and threat’s impact to the system <A risk matrix plot> Cyber-Physical Systems Integration Group.

Cyber-Physical Systems Integration Group. 05. Approach for Static Control Systems Static system model : static plant states : measurement received : measurement matrix : measurement data attack Stealthy attack The number of nonzero entries of the attack vector means an indicator of likelihood of the success of attack Security index -> Quantitative tool but NP-hard problem Cyber-Physical Systems Integration Group.

05. Security Index for Risk Analysis IEEE 14-bus benchmark system Security index Different colors according to their resilience against stealthy data attack Cyber-Physical Systems Integration Group.

Cyber-Physical Systems Integration Group. 05. Approach for Dynamic Control Systems Dynamic system model (deception attack [13]) n : system state x : attack signals r : residue Maximum Impact, Minimum-Resource Attack : Attack impact : number of resource used in attack : attack signal : used resource if is nonzero Cyber-Physical Systems Integration Group.

05. Approach for Dynamic Control Systems Wireless Quadruple-Tank Process - Plant model [66] 2 actuators and 2 measurements LQG (Linear-quadratic-Gaussian) Controller Kalman filter based anomaly detector Cyber-Physical Systems Integration Group.

Cyber-Physical Systems Integration Group. 05. Approach for Dynamic Control Systems Simulation Results Minimum phase system – zero와 pole이 Unit circle안에 있는 시스템 Cyber-Physical Systems Integration Group.

Cyber-Physical Systems Integration Group. 05. Approach for Dynamic Control Systems Simulation Results (Non-minimum phase system) Cyber-Physical Systems Integration Group.

Cyber-Physical Systems Integration Group. 06. Conclusions Networked control systems have vulnerabilities according to the use of IT infrastructures Quantitative risk management is needed considering threat’s likelihood and impact Adversary model Approach for Static system & Dynamic system Possible to extend this work under noise and uncertain communication channel Cyber-Physical Systems Integration Group.

Thank you!

05. Approach for Static Control Systems Electric power network and SCADA systems Focus on active power flows and active power injection at buses DC power flow model depends on voltage phase angles Linear measurement model x : vector of voltage phase angles y : vector of active power flow Cyber-Physical Systems Integration Group.