Quantifying Controller Resilience Using Behavior Characterization
Document Type
Conference Proceeding
Publication Date
2012
Abstract
Supervisory control and data acquisition (SCADA) systems monitor and control major components of the critical infrastructure. Targeted malware such as Stuxnet is an example of a covert cyber attack against a SCADA system that resulted in physical effects. Of particular significance is how Stuxnet exploited the trust relationship between the human machine interface (HMI) and programmable logic controllers (PLCs). Current methods for validating system operating parameters rely on message exchange and network communications protocols, which are generally observed at the HMI. Although sufficient at the macro level, this method does not support the detection of malware that causes physical effects via the covert manipulation of a PLC. This paper introduces an alternative method that leverages the direct analysis of PLC inputs and outputs to derive the true state of SCADA devices. The input-output behavior characteristics are modeled using Petri nets to derive metrics for quantifying the resilience of PLCs against malicious exploits. The method enables the detection of programming changes that affect input-output relationships, the identification of the degree of deviation from a baseline program and the minimization of performance losses due to disruptive events. Abstract © Springer
DOI
10.1007/978-3-642-35764-0_6
Source Publication
IFIP Advances in Information and Communication Technology, vol. 390
Recommended Citation
Bushey, H., Lopez Jr., J. L., & Butts, J. W. (2012). Quantifying controller resilience using behavior characterization. In J. Butts & S. Shenoi (Eds.), Critical Infrastructure Protection VI. ICCIP 2012 (Vol. IFIPA 390, pp. 71–83). Berlin: Springer. https://doi.org/10.1007/978-3-642-35764-0_6
Comments
The "Link to Full Text" on this page loads the PDF of the chapter, furnished through the Springer Nature SharedIt content-sharing initiative. The publisher retains permissions to re-use and distribute this chapter from IFIP vol. 390.
© International Federation for Information Processing 2012