| Literature DB >> 29065461 |
Peng Xun1, Pei-Dong Zhu2, Yi-Fan Hu3, Peng-Shuai Cui4, Yan Zhang5.
Abstract
A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.Entities:
Keywords: attack detection; command correlation; command disaggregation; cyber-physical attack; industrial Internet of Things
Year: 2017 PMID: 29065461 PMCID: PMC5677416 DOI: 10.3390/s17102408
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1The structure of IIoT control system.
Figure 2An example: explaining different attack modes.
Figure 3Attack models based on wrong command allocation mode.
Figure 4Attack model based on false command sequence mode.
Figure 5The structure of detection framework.
Figure 6The flowchart of correlation mining between a command and a sub-command.
Figure 7The flowchart of correlation mining between two sub-commands.
Figure 8The structure of a tank system.
Description of data in the tank system.
| Command/Time Series | Description |
|---|---|
| P11o/P11f | Switch on/off Pump P11 |
| P12o/P12f | Switch on/off Pump P12 |
| P13o/P13f | Switch on/off Pump P13 |
| P21o/P21f | Switch on/off Pump P21 |
| P22o/P22f | Switch on/off Pump P22 |
| P23o/P23f | Switch on/off Pump P23 |
| V11o/V11c | Open/Close Valve V11 |
| T11 | Measurements of Sensor S11 |
| T12 | Measurements of Sensor S12 |
| T13 | Measurements of Sensor S13 |
| T21 | Measurements of Sensor S21 |
| T22 | Measurements of Sensor S21 |
| T23 | Measurements of Sensor S23 |
| Tv1 | Measurements of Sensor Sv1 |
Figure 9The model of energy trading system in the smart grid.
Description of data in the energy trading system.
| Command/Time Series | Description |
|---|---|
| w1o/w1f | Turn on/off switch w1 |
| w2o/w2f | Turn on/off switch w2 |
| w3o/w3f | Turn on/off switch w3 |
| w4o/w4f | Turn on/off switch w4 |
| w5o/w5f | Turn on/off switch w5 |
| w6o/w6f | Turn on/off switch w6 |
| T11 | Measurements of Sensor Ss1 |
| T12 | Measurements of Sensor Ss2 |
| T13 | Measurements of Sensor Ss3 |
| T21 | Measurements of Sensor Sc1 |
| T22 | Measurements of Sensor Sc1 |
| T23 | Measurements of Sensor Sc3 |
Figure 10Measurements from sensors under the normal situation of scenario 1.
Figure 11Measurements from sensors under the normal situation of scenario 2.
Figure 12Measurements from sensors under attack case 1.
Figure 13Measurements from sensors under attack case 2.
Figure 14Measurements from sensors under attack case 3.
Figure 15Impact of attack case 4, attack case 5, and attack case 6.
Correlations between commands and executed sub-commands.
| Command | Correlation | Scenario |
|---|---|---|
| pao | 1 | |
| pbo | 1 | |
| pac | 1 | |
| pbc | 1 | |
| pvo | 1 | |
| pvc | 1 | |
| Ooute | 2 | |
| Opute | 2 | |
| Coute | 2 | |
| Cpute | 2 |
Figure 16Correlations between executed sub-commands. A link denotes two correlations between two nodes.
Broken correlations under attacks.
| Attack Case | Alarm |
|---|---|
| 1 | |
| 2 | |
| 3 | |
| 4 | |
| 5 | |
| 6 |