skip to main content
10.1145/3052973.3053011acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Model-based Attack Detection Scheme for Smart Water Distribution Networks

Authors Info & Claims
Published:02 April 2017Publication History

ABSTRACT

In this manuscript, we present a detailed case study about model-based attack detection procedures for Cyber-Physical Systems (CPSs). In particular, using EPANET (a simulation tool for water distribution systems), we simulate a Water Distribution Network (WDN). Using this data and sub-space identification techniques, an input-output Linear Time Invariant (LTI) model for the network is obtained. This model is used to derive a Kalman filter to estimate the evolution of the system dynamics. Then, residual variables are constructed by subtracting data coming from EPANET and the estimates of the Kalman filter. We use these residuals and the Bad-Data and the dynamic Cumulative Sum (CUSUM) change detection procedures for attack detection. Simulation results are presented - considering false data injection and zero-alarm attacks on sensor readings, and attacks on control input - to evaluate the performance of our model-based attack detection schemes. Finally, we derive upper bounds on the estimator-state deviation that zero-alarm attacks can induce.

References

  1. EPANET: software that models the hydraulic and water quality behavior of water distribution piping systems. https://www.epa.gov/water-research/epanet. Accessed: 2016-03--29.Google ScholarGoogle Scholar
  2. I. C. 2014. Ics-mm201408: May-august 2014. Report no., U.S. Department of Homeland Security-Industrial Control Systems-Cyber Emergency Response Team, Washington, D.C. Available online at https://ics-cert.us-cert.gov., 2014.Google ScholarGoogle Scholar
  3. B. Adams, W. Woodall, and C. Lowry. The use (and misuse) of false alarm probabilities in control chart design. Frontiers in Statistical Quality Control 4, pages 155--168, 1992.Google ScholarGoogle ScholarCross RefCross Ref
  4. C. M. Ahmed, A.Sridhar, and M. Aditya. Limitations of state estimation based cyber attack detection schemes in industrial control systems. In IEEE Smart City Security and Privacy Workshop, CPSWeek, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  5. S. Amin, X. Litrico, S. Sastry, and A. M. Bayen. Cyber security of water scada systems-part i: analysis and experimentation of stealthy deception attacks. IEEE Transactions on Systems Technology, pages 1963--1970, 2013a.Google ScholarGoogle ScholarCross RefCross Ref
  6. S. Amin, X. Litrico, S. Sastry, and A. M. Bayen. Cyber security of water scada systems-part ii: Attack detection using enhanced hydrodynamic models. IEEE Transactions on Systems Technology, pages 1679--1693, 2013b.Google ScholarGoogle ScholarCross RefCross Ref
  7. K. J. Aström and B. Wittenmark. Computer-controlled Systems (3rd Ed.). Prentice-Hall, Inc., Upper Saddle River, NJ, USA, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. A. Bobat, T. Gezgin, and H. Aslan. The scada system applications in management of yuvacik dam and reservoir. Desalination and Water Treatment, 2015.Google ScholarGoogle Scholar
  9. A. Cardenas, S. Amin, Z. Lin, Y. Huang, C. Huang, and S. Sastry. Attacks against process control systems: Risk assessment, detection, and response. In 6th ACM Symposium on Information, Computer and Communications Security, pages 355--366, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Giraldo, A. Cardenas, and N. Quijano. Integrity attacks on realtime pricing in smart grids: Impact and countermeasures. IEEE Transactions on Smart Grid, 2016.Google ScholarGoogle Scholar
  11. Y. Gu, T. Liu, D. Wang, X. Guan, and Z. Xu. Bad data detection method for smart grids based on distributed estimation. In IEEE ICC, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  12. R. A. Horn and C. R. Johnson. Matrix Analysis. Cambridge University Press, New York, NY, USA, 2nd edition, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. C. Kwon, W. Liu, and I. Hwang. Security analysis for cyber-physical systems against stealthy deception attacks. In American Control Conference (ACC), pages 3344--3349, 2013.Google ScholarGoogle Scholar
  14. E. A. Lee. Cyber physical systems: Design challenges. In EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2008--8. http://www.eecs.berkeley.edu/Pubs/TechRpts/2008/EECS- 2008--8.html, Jan. 2008.Google ScholarGoogle Scholar
  15. N. Lehtinen. Error functions. Stanford University,Webpage:http://nlpc.stanford.edu/nleht/ Science/reference/errorfun.pdf, April 2010.Google ScholarGoogle Scholar
  16. F. Miao, Q. Zhu, M. Pajic, and G. J. Pappas. Coding sensor outputs for injection attacks detection. In IEEE conference in Decision and Control (CDC), pages 5776--5781, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  17. L. Mili, T. Cutsen, and M.R.-Pavella. Bad data identification methods in power system state estimation - a comparative study. IEEE Trans. on Power Apparatus and Systems, 1985.Google ScholarGoogle Scholar
  18. Y. Mo, E. Garone, A. Casavola, and B. Sinopoli. False data injection attacks against state estimation in wireless sensor networks. In IEEE conference in Decision and Control (CDC), pages 5967--5972, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  19. C. Murguia and J. Ruths. Characterization of a cusum model-based sensor attack detector. In 55th IEEE Conference on Decision and Control Conference (CDC), 2016.Google ScholarGoogle ScholarCross RefCross Ref
  20. C. Murguia and J. Ruths. Cusum and chi-squared attack detection of compromised sensors. In 2016 IEEE Conference on Control Applications (CCA), pages 474--480, Sept 2016.Google ScholarGoogle ScholarCross RefCross Ref
  21. P. V. Overschee and B. D. Moor. Subspace identification for linear systems: theory, implementation, applications. Boston: Kluwer Academic Publications, 1996.Google ScholarGoogle Scholar
  22. E. Page. Continuous inspection schemes. Biometrika, 41:100--115, 1954.Google ScholarGoogle ScholarCross RefCross Ref
  23. L. Perelman and S. Amin. A network interdiction model for analyzing the vulnerability of water distribution systems. In Proceedings of the 3rd international conference on High confidence networked systems, ACM., pages 135--144, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. M. Ross. Introduction to Probability Models, Ninth Edition. Academic Press, Inc., Orlando, FL, USA, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. J. Slay and M. Miller. Lessons learned from the maroochy water breach. Springer 620 US, Boston, MA, pages 73--82, 2008.Google ScholarGoogle Scholar
  26. A. Sridhar and M. Aditya. Generalized attacker and attack models for cyber physical systems. In 40th IEEE COMPSAC, 2016.Google ScholarGoogle Scholar
  27. C. van Dobben de Bruyn. Cumulative sum tests : theory and practice. London : Griffin, 1968.Google ScholarGoogle Scholar

Index Terms

  1. Model-based Attack Detection Scheme for Smart Water Distribution Networks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security
      April 2017
      952 pages
      ISBN:9781450349444
      DOI:10.1145/3052973

      Copyright © 2017 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 2 April 2017

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      ASIA CCS '17 Paper Acceptance Rate67of359submissions,19%Overall Acceptance Rate418of2,322submissions,18%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader