Abstract

A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

Highlights

  • A large-scale industrial Internet of Things (IIoT) [1] is deployed to help utilities such as smart train and smart grid provide better service

  • We describe three attack models to implement command disaggregation attacks in two kinds of modes

  • We focus on the command disaggregation attack and its detection method

Read more

Summary

Introduction

A large-scale industrial Internet of Things (IIoT) [1] is deployed to help utilities such as smart train and smart grid provide better service. We focus on the process of launching the command disaggregation attack and its detection method. Attackers can inject false commands or modify sensory data to implement false command disaggregation These studies did not describe how to launch effective command disaggregation attacks to result in damages to the physical system. Driven by the above considerations, we depict two different command disaggregation attack modes: (1) false command sequence; and (2) wrong command allocation The former refers to the situation that attackers delay the disaggregation of some commands to disorder its logic, thereby resulting in disruptions of physical process; the latter refers to the situation that disaggregated commands are issued to other than the expected or planned actuators, causing the failure of control objective or physical damages.

Related Work
Our Contribution
System Model
Two Kinds of Attack Modes and the Attack Models
Wrong Command Allocation
False Command Sequence
Delay the disaggregation of Ci
Detection Framework Based on Correlations among Two-Tier Command Sequences
Detection Framework
Correlation between a Command and Sub-Commands
Correlation among Executed Sub-Commands
Scenario 1:3-Tank System
Scenario 2
Attack Cases
Case 1
Case 2
Case 3
Case 4–Case 6
Effectiveness of Our Detection Framework
Findings
Discussion of Detection Framework Enhancement
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.