Detection and mitigation of deception attacks on cloud-based industrial control systems
(2022) 25th Conference on Innovation in Clouds, Internet and Networks- Abstract
- In recent years, because the cloud can provide huge advantages regarding storage and computing resources, industry has been motivated to move industrial control systems to the cloud. However, the cloud also introduces major security challenges, since moving control systems to the cloud can enable attackers to infiltrate the system and establish an attack that can lead to damages and disruptions with potentially catastrophic consequences. Therefore, intrusion detection and mitigation mechanisms are crucial for cloud-based industrial control systems. In this paper, we propose a method for detection and mitigation of deception attacks on actuator signals in cloud-based industrial control systems. We validate our solution on a real testbed and... (More)
- In recent years, because the cloud can provide huge advantages regarding storage and computing resources, industry has been motivated to move industrial control systems to the cloud. However, the cloud also introduces major security challenges, since moving control systems to the cloud can enable attackers to infiltrate the system and establish an attack that can lead to damages and disruptions with potentially catastrophic consequences. Therefore, intrusion detection and mitigation mechanisms are crucial for cloud-based industrial control systems. In this paper, we propose a method for detection and mitigation of deception attacks on actuator signals in cloud-based industrial control systems. We validate our solution on a real testbed and evaluate its capability by subjecting it to a set of attacks. Our proposed solution can detect the attack in a timely manner and keep the plant stable, with an acceptable performance during the attack. (Less)
Please use this url to cite or link to this publication:
https://lup.lub.lu.se/record/230f9d75-2904-4d9f-9e93-1c029c3a394d
- author
- Akbarian, Fatemeh
LU
; Tärneberg, William
LU
; Fitzgerald, Emma
LU
and Kihl, Maria LU
- organization
- publishing date
- 2022
- type
- Chapter in Book/Report/Conference proceeding
- publication status
- published
- subject
- host publication
- 25th Conference on Innovation in Clouds, Internet and Networks (ICIN)
- publisher
- IEEE - Institute of Electrical and Electronics Engineers Inc.
- conference name
- 25th Conference on Innovation in Clouds, Internet and Networks
- conference location
- Paris, France
- conference dates
- 2022-03-07 - 2022-03-10
- external identifiers
-
- scopus:85129643022
- ISBN
- 978-1-7281-8688-7
- DOI
- 10.1109/ICIN53892.2022.9758092
- project
- Ultra-reliable and low-latency networked systems aimed for time-critical services in an Industry 4.0 environment
- Cyber Security for Next Generation Factory (SEC4FACTORY)
- Nordic University Hub on Internet of Things
- Intelligent Management of next generation MobIle NEtworks aNd serviCEs (IMMINENCE)
- WASP: Wallenberg AI, Autonomous Systems and Software Program at Lund University
- language
- English
- LU publication?
- yes
- id
- 230f9d75-2904-4d9f-9e93-1c029c3a394d
- date added to LUP
- 2022-04-27 10:20:23
- date last changed
- 2023-11-21 09:23:27
@inproceedings{230f9d75-2904-4d9f-9e93-1c029c3a394d, abstract = {{In recent years, because the cloud can provide huge advantages regarding storage and computing resources, industry has been motivated to move industrial control systems to the cloud. However, the cloud also introduces major security challenges, since moving control systems to the cloud can enable attackers to infiltrate the system and establish an attack that can lead to damages and disruptions with potentially catastrophic consequences. Therefore, intrusion detection and mitigation mechanisms are crucial for cloud-based industrial control systems. In this paper, we propose a method for detection and mitigation of deception attacks on actuator signals in cloud-based industrial control systems. We validate our solution on a real testbed and evaluate its capability by subjecting it to a set of attacks. Our proposed solution can detect the attack in a timely manner and keep the plant stable, with an acceptable performance during the attack.}}, author = {{Akbarian, Fatemeh and Tärneberg, William and Fitzgerald, Emma and Kihl, Maria}}, booktitle = {{25th Conference on Innovation in Clouds, Internet and Networks (ICIN)}}, isbn = {{978-1-7281-8688-7}}, language = {{eng}}, publisher = {{IEEE - Institute of Electrical and Electronics Engineers Inc.}}, title = {{Detection and mitigation of deception attacks on cloud-based industrial control systems}}, url = {{http://dx.doi.org/10.1109/ICIN53892.2022.9758092}}, doi = {{10.1109/ICIN53892.2022.9758092}}, year = {{2022}}, }