System Identification Attacks, Model-based Offensives and Countermeasures in Networked Control Systems

  • Alan Oliveira de Sá UFRJ / Marinha do Brasil
  • Luiz F. R. da C. Carmo UFRJ / Inmetro
  • Raphael C. S. Machado Inmetro / UFF

Resumo


Sistemas de Controle em Rede, ou Networked Control Systems (NCS), são amplamente utilizados na Indústria 4.0 e no controle de infraestruturas críticas. No entanto, ao mesmo tempo em que oferecem diversas vantagens, os NCSs são propensos a ataques cibernéticos. Este trabalho investiga novas classes de ameaças em NCSs (ataques de Identificação de Sistemas e ofensivas furtivas/baseadas em modelos) e propõe novas contramedidas para mitigá-las. Os resultados indicam que o estudo dos novos ataques apresentados neste trabalho e as contramedidas aqui propostas contribuem para a segurança cibernética dos NCSs.

Referências

Collantes, M. H. and Padilla, A. L. (2015). Protocols and network security in ics infrastructures. Technical report, Spanish National Institute for Cyber-security (INCIBE.

de Sá, A. O., Carmo, L. F. R. d. C., and Machado, R. C. S. (2018a). Evaluation on passive system identification and covert misappropriation attacks in large pressurized heavy water reactors. In 2018 Workshop on Metrology for Industry 4.0 and IoT, pages 203–208. IEEE.

de Sá, A. O., Carmo, L. F. R. d. C., and Machado, R. C. S. (2019a). Countermeasure for identification of controlled data injection attacks in networked control systems. In 2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4. 0&IoT), pages 455–459. IEEE.

de Sá, A. O., Casimiro, A., Machado, R., da C, C., and Luiz, F. (2020). Identification of data injection attacks in networked control systems using noise impulse integration. Sensors, 20(3):792.

de Sá, A. O., Casimiro, A., Machado, R. C. S., and da Costa Carmo, L. F. R. (2019b). Bio-inspired system identification attacks in noisy networked control systems. In 11th EAI International Conference on Bio-inspired Information and Communications Technologies (BICT), pages 1–11, Pittsburgh, USA. Springer.

de Sá, A. O., da Costa Carmo, L. F. R., and Machado, R. C. S. (2016). Ataques furtivos em sistemas de controle físicos cibernéticos. In Anais do XVI Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais (SBSeg), pages 128–141.

de Sá, A. O., da Costa Carmo, L. F. R., and Machado, R. C. S. (2017a). Bio-inspired active attack for identification of networked control systems. In 10th EAI International Conference on Bio-inspired Information and Communications Technologies (BICT), pages 1–8, New Jersey, USA. ACM.

de Sá, A. O., da Costa Carmo, L. F. R., and Machado, R. C. S. (2017b). Bio-inspired active system identification: a cyber-physical intelligence attack in networked control systems. Mobile Networks and Applications, pages 1–14.

de Sá, A. O., da Costa Carmo, L. F. R., and Machado, R. C. S. (2017c). Covert attacks in cyber-physical control systems. IEEE Transactions on Industrial Informatics, 13(4):1641–1651.

de Sá, A. O., da Costa Carmo, L. F. R., and Machado, R. C. S. (2017d). Use of switching controllers for mitigation of active identification attacks in networked control systems. In 2017 IEEE Cyber Science and Technology Congress (CyberSciTech2017), pages 1–6, Orlando, FL, USA. IEEE.

de Sá, A. O., da Costa Carmo, L. F. R., and Machado, R. C. S. (2018b). A controller design for mitigation of passive system identification attacks in networked control systems. Journal of Internet Services and Applications, 9(1):1–19.

Ferrari, P., Sisinni, E., Bellagente, P., Rinaldi, S., Pasetti, M., de Sá, A. O., Machado, R. C. S., d. C. Carmo, L. F. R., and Casimiro, A. (2020). Model-based stealth attack to networked control system based on real-time ethernet. IEEE Transactions on Industrial Electronics, pages 1–12. Accepted to be published in the next issue. Available as early access with doi: 10.1109/TIE.2020.3001850.

McLaughlin, S., Konstantinou, C., Wang, X., Davi, L., Sadeghi, A.-R., Maniatakos, M., and Karri, R. (2016). The cybersecurity landscape in industrial control systems. Proceedings of the IEEE, 104(5):1039–1057.

Smith, R. (2011). A decoupled feedback structure for covertly appropriating networked control systems. In Proceedings of the 18th IFAC World Congress 2011, volume 18, Milano, Italy. IFAC-PapersOnLine.

Smith, R. S. (2015). Covert misappropriation of networked control systems: Presenting a feedback structure. Control Systems, IEEE, 35(1):82–92.

Teixeira, A., Shames, I., Sandberg, H., and Johansson, K. H. (2015). A secure control framework for resource-limited adversaries. Automatica, 51:135–148.
Publicado
13/10/2020
SÁ, Alan Oliveira de; CARMO, Luiz F. R. da C.; MACHADO, Raphael C. S.. System Identification Attacks, Model-based Offensives and Countermeasures in Networked Control Systems. In: CONCURSO DE TESES E DISSERTAÇÕES - SIMPÓSIO BRASILEIRO DE SEGURANÇA DA INFORMAÇÃO E DE SISTEMAS COMPUTACIONAIS (SBSEG), 20. , 2020, Evento Online. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2020 . p. 25-32. DOI: https://doi.org/10.5753/sbseg_estendido.2020.19266.