Detecting and Mitigating Actuator Attacks on Cloud Control Systems through Digital Twins
(2023) 31st International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2023- Abstract
- Recently, the industry has been driven to move industrial control systems to the cloud due to the significant advantages it offers in terms of storage and computing resources. However, this shift also brings forth significant security challenges. By moving control systems to the cloud, the potential for attackers to infiltrate the system and launch damaging attacks increases. These attacks can result in severe disruptions and potentially catastrophic consequences. Hence, attack detection and mitigation mechanisms are crucial for cloud control systems. In this paper, we present an approach that leverages the digital twins concept and virtual actuator method to detect and mitigate deception attacks on control signals within cloud control... (More)
- Recently, the industry has been driven to move industrial control systems to the cloud due to the significant advantages it offers in terms of storage and computing resources. However, this shift also brings forth significant security challenges. By moving control systems to the cloud, the potential for attackers to infiltrate the system and launch damaging attacks increases. These attacks can result in severe disruptions and potentially catastrophic consequences. Hence, attack detection and mitigation mechanisms are crucial for cloud control systems. In this paper, we present an approach that leverages the digital twins concept and virtual actuator method to detect and mitigate deception attacks on control signals within cloud control systems. By conducting experiments on a real testbed and subjecting it to a set of attacks, we validate the effectiveness of our solution. Our proposed method successfully detects attacks in a timely manner and keeps the plant stable, with a good performance during the attack. (Less)
Please use this url to cite or link to this publication:
https://lup.lub.lu.se/record/f0a88c32-e449-461f-8345-271eb3f044a7
- author
- Akbarian, Fatemeh LU ; Tärneberg, William LU ; Fitzgerald, Emma LU and Kihl, Maria LU
- organization
- publishing date
- 2023
- type
- Chapter in Book/Report/Conference proceeding
- publication status
- published
- subject
- host publication
- The 31st International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2023)
- publisher
- IEEE - Institute of Electrical and Electronics Engineers Inc.
- conference name
- 31st International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2023
- conference location
- Split, Croatia
- conference dates
- 2023-09-21 - 2023-09-23
- external identifiers
-
- scopus:85174482813
- ISBN
- 979-8-3503-0107-6
- DOI
- 10.23919/SoftCOM58365.2023.10271648
- project
- Cyber Security for Next Generation Factory (SEC4FACTORY)
- Nordic University Hub on Internet of Things
- Intelligent Management of next generation MobIle NEtworks aNd serviCEs (IMMINENCE)
- Ultra-reliable and low-latency networked systems aimed for time-critical services in an Industry 4.0 environment
- language
- English
- LU publication?
- yes
- id
- f0a88c32-e449-461f-8345-271eb3f044a7
- date added to LUP
- 2023-10-11 11:47:51
- date last changed
- 2024-04-19 08:51:50
@inproceedings{f0a88c32-e449-461f-8345-271eb3f044a7, abstract = {{Recently, the industry has been driven to move industrial control systems to the cloud due to the significant advantages it offers in terms of storage and computing resources. However, this shift also brings forth significant security challenges. By moving control systems to the cloud, the potential for attackers to infiltrate the system and launch damaging attacks increases. These attacks can result in severe disruptions and potentially catastrophic consequences. Hence, attack detection and mitigation mechanisms are crucial for cloud control systems. In this paper, we present an approach that leverages the digital twins concept and virtual actuator method to detect and mitigate deception attacks on control signals within cloud control systems. By conducting experiments on a real testbed and subjecting it to a set of attacks, we validate the effectiveness of our solution. Our proposed method successfully detects attacks in a timely manner and keeps the plant stable, with a good performance during the attack.}}, author = {{Akbarian, Fatemeh and Tärneberg, William and Fitzgerald, Emma and Kihl, Maria}}, booktitle = {{The 31st International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2023)}}, isbn = {{979-8-3503-0107-6}}, language = {{eng}}, publisher = {{IEEE - Institute of Electrical and Electronics Engineers Inc.}}, title = {{Detecting and Mitigating Actuator Attacks on Cloud Control Systems through Digital Twins}}, url = {{https://lup.lub.lu.se/search/files/181043956/Detecting_and_Mitigating_Actuator_Attacks_on_Cloud_Control_Systems_through_Digital_Twins.pdf}}, doi = {{10.23919/SoftCOM58365.2023.10271648}}, year = {{2023}}, }