• DocumentCode
    2975834
  • Title

    Behavior-based critical cyber asset identification in Process Control Systems under Cyber Attacks

  • Author

    Kiss, Istvan ; Genge, Bela ; Haller, Piroska

  • Author_Institution
    “Petru Maior” Univ. of Tirgu Mures, Tîrgu Mureş, Romania
  • fYear
    2015
  • fDate
    27-30 May 2015
  • Firstpage
    196
  • Lastpage
    201
  • Abstract
    The accelerated advancement of Process Control Systems (PCS) transformed the traditional and completely isolated systems view into a networked inter-connected “system of systems” perspective, where off-the-shelf Information and Communication Technologies (ICT) are deeply embedded into the heart of PCS. This has brought significant economical and operational benefits, but it also provided new opportunities for malicious actors targeting critical PCS. To address these challenges, in this work we employ our previously developed Cyber Attack Impact Assessment (CAIA) technique to provide a systematic mechanism to help PCS designers and industry operators to assess the impact severity of various cyber threats. Moreover, the question of why a device is more critical than others, and also the motivation of this work, are answered through extensive numerical results showing the significance of systems dynamics in the context of closed-loop PCS. The CAIA approach is validated against the simulated Tennessee Eastman chemical process, including 41 observed variables and 12 control variables, involved in cascade controller structures. The results show the application possibilities and effectiveness of CAIA for various attack scenarios.
  • Keywords
    closed loop systems; control engineering computing; interconnected systems; process control; production engineering computing; security of data; CAIA technique; Tennessee Eastman chemical process; behavior-based critical cyber asset identification; cascade controller structures; closed-loop PCS; critical PCS; cyber attack impact assessment; cyber threats impact severity; economical benefits; malicious actors; networked interconnected system of systems; operational benefits; process control systems; systematic mechanism; systems dynamics; Chemical processes; Feeds; Hardware; Inductors; Mathematical model; Process control; Time measurement; Control Variable; Cyber Attack; Impact Assessment; Observed Variable; Process Control Systems; System Dynamics;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Carpathian Control Conference (ICCC), 2015 16th International
  • Conference_Location
    Szilvasvarad
  • Print_ISBN
    978-1-4799-7369-9
  • Type

    conf

  • DOI
    10.1109/CarpathianCC.2015.7145073
  • Filename
    7145073