Abstract

A cyber-physical attack against critical infrastructures, such as water treatment and distribution plants, could lead to process anomalies. Several design and data centric approaches were developed to detect such anomalies when the physical processes of the underlying plant move from a normal to a malicious state. Although these approaches are necessary for the continued and reliable plant operation, they might not be sufficient to prevent service disruption or damage to components. This is because the impact of anomalies is already realized before the attack is detected. In this paper, we propose PCAT – PLC Command Analysis Tool that validates the control commands issued by the programmable logic controller (PLC). PCAT stops rogue attack commands before they reach the target actuators. In a case study, PCAT was deployed and validated on the operational water treatment plant named SWaT. The experimental results attest the performance of PCAT in ensuring the security, safety, and service status of the plant before it enters an anomalous state.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.