{"title":"Towards distinguishing between faults and cyber-attacks in the networked control system","authors":"A. A. Yaseen, M. Bayart","doi":"10.1109/WCICSS.2016.7882611","DOIUrl":"https://doi.org/10.1109/WCICSS.2016.7882611","url":null,"abstract":"The Generalized Predictive Controller (GPC) is a preferred controller implementation method in the Networked Control System (NCS). This paper proposes an Intelligent Generalized Predictive Controller (IGPC) as an enhancement for the standard GPC. The IGPC is designed along with an internal detection and distinguishing mechanism for cyberattacks and faults; this one is based on the comparison between the true control variable and the estimated control variable for normal plant model and for faulty or perturbed plant conditions by a specific computation algorithm. The test result of the proposed method shows that it can be significantly used for detection of the cyber-attack.","PeriodicalId":182326,"journal":{"name":"2016 World Congress on Industrial Control Systems Security (WCICSS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122238615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of carbon displacement possibilities from conversion of existing fossil fuel driven domestic heating systems to biomass driven domestic heating system","authors":"E. O'Connor, Joseph Walsh","doi":"10.1109/WCICSS.2016.7882934","DOIUrl":"https://doi.org/10.1109/WCICSS.2016.7882934","url":null,"abstract":"Decarbonisation of Irelands heating system would mean a shift away from traditional fossil fuels, and a step towards more renewable and sustainable thermal energy systems. Climate change and the related consequences associated with it have become a key component of the political agenda at local, national and international levels. It has become clear that further action is needed to tackle global warming and alleviate the dangers associated with the continued warming of our planet. Reduced energy consumption, increased energy efficiency, increased use of renewable energy sources, and the reduction in Green House Gas (GHG) emissions may yet become one of this generation’s defining moments.","PeriodicalId":182326,"journal":{"name":"2016 World Congress on Industrial Control Systems Security (WCICSS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132324170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber-resilient industrial control system with diversified architecture and bus monitoring","authors":"Charles Kim","doi":"10.1109/WCICSS.2016.7882940","DOIUrl":"https://doi.org/10.1109/WCICSS.2016.7882940","url":null,"abstract":"This paper focuses on exploitable cyber vulnerabilities in industrial control systems (ICS) and on a new approach of resiliency against them. Even with numerous metrics and methods for intrusion detection and mitigation strategy, a complete detection and deterrence of cyber-attacks for ICS is impossible. Countering the impact and consequence of possible malfunctions caused by such attacks in the safety-critical ICS’s, this paper proposes new controller architecture to fail-operate even under compromised situations. The proposed new ICS is realized with diversification of hardware/software and unidirectional communication in alerting suspicious infiltration to upper-level management. Equipped with control bus monitoring, this operation-basis approach of infiltration detection would become a truly cyber-resilient ICS. The proposed system is tested in a lab hardware experimentation setup and on a cybersecurity test bed, DeterLab, for validation.","PeriodicalId":182326,"journal":{"name":"2016 World Congress on Industrial Control Systems Security (WCICSS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134234146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resilience of logistics network: analysis and design","authors":"C. Lam","doi":"10.1109/WCICSS.2016.7882936","DOIUrl":"https://doi.org/10.1109/WCICSS.2016.7882936","url":null,"abstract":"Logistics entities are interrelated to each other, any disruption or sudden unavailability of the entities may cause severe cascading disruption effects on the functioning of the entire logistics network. In analyze the cascading disruption effects, it is important to actively concern the normal logistics practices, rather than passively emphasize on learning from the past incidents. This paper proposes a resilience analysis framework for the analysis and design of logistics network on how to help the network to cope with complexity under disruption. Under the resilience analysis framework, the logistics network is modeled as a probabilistic network graph, the resilience can then be analyzed by the reliability of all the independent connection paths among the logistics entities with connection weightings. The design of the logistics network is then further proposed by (1) risk sharing and resilience enhancement by means of the redundancy effect, and (2) restoration and recovery of the network by means of dependency routing. Therefore, this paper can provide an efficient way to analyze and design the stability of the logistics network as well as to understand the ability of the network to return to a stable state after disruptions from failure.","PeriodicalId":182326,"journal":{"name":"2016 World Congress on Industrial Control Systems Security (WCICSS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132572237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Niall O' Mahony, Trevor Murphy, Krishna Panduru, D. Riordan, Joseph Walsh
{"title":"Machine learning algorithms for process analytical technology","authors":"Niall O' Mahony, Trevor Murphy, Krishna Panduru, D. Riordan, Joseph Walsh","doi":"10.1109/WCICSS.2016.7882607","DOIUrl":"https://doi.org/10.1109/WCICSS.2016.7882607","url":null,"abstract":"Increased globalisation and competition are drivers for process analytical technologies (PAT) that enable seamless process control, greater flexibility and cost efficiency in the process industries. The paper will discuss process modelling and control for industrial applications with an emphasis on solutions enabling the real-time data analytics of sensor measurements that PAT demands. This research aims to introduce an integrated process control approach, embedding novel sensors for monitoring in real time the critical control parameters of key processes in the minerals, ceramics, non-ferrous metals, and chemical process industries. The paper presents a comparison of machine learning algorithms applied to sensor data collected for a polymerisation process. Several machine learning algorithms including Adaptive Neuro-Fuzzy Inference Systems, Neural Networks and Genetic Algorithms were implemented using MATLAB® Software and compared in terms of accuracy (MSE) and robustness in modelling process progression. The results obtained show that machine learning-based approaches produce significantly more accurate and robust process models compared to models developed manually while also being more adaptable to new data. The paper presents perspectives on the potential benefits of machine learning algorithms with a view to their future in the industrial process industry.","PeriodicalId":182326,"journal":{"name":"2016 World Congress on Industrial Control Systems Security (WCICSS)","volume":"15 43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124253528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SCADA-SST: a SCADA security testbed","authors":"Asem Ghaleb, Sami Zhioua, Ahmad Almulhem","doi":"10.1109/WCICSS.2016.7882610","DOIUrl":"https://doi.org/10.1109/WCICSS.2016.7882610","url":null,"abstract":"The number of reported cybersecurity incidents on SCADA (Supervisory Control and Data Acquisition) systems increased significantly in the past few years. One contributing factor is the fact that security testing of live SCADA systems is not practical as such systems are expected to be operational 24/7. Also and most importantly, conducting live security testing on these types of systems is generally costly. A practical and cost-effective solution is to carry out security testing on a simulated version of the physical setting. The main contribution of this paper is to present a SCADA simulation environment (SCADA-SST) suitable for security testing. The simulation environment is generic, easy to setup (comes with a detailed manual), and supports hybrid architectures (involving simulated as well as physical components). We show how SCADA-SST can be used to simulate two realistic settings, namely, Water distribution and Electrical power grid. Finally, for the sake of security testing example, we show how SCADASST can be used to assess the resilience of common SCADA nodes to DOS attacks.","PeriodicalId":182326,"journal":{"name":"2016 World Congress on Industrial Control Systems Security (WCICSS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116414771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PLC access control: a security analysis","authors":"Haroon Wardak, Sami Zhioua, Ahmad Almulhem","doi":"10.1109/WCICSS.2016.7882935","DOIUrl":"https://doi.org/10.1109/WCICSS.2016.7882935","url":null,"abstract":"A Programmable Logic Controller (PLC) is a very common industrial control system device used to control output devices based on data received (and processed) from input devices. Given the central role that PLCs play in deployed industrial control systems, it has been a preferred target of ICS attackers. A quick search in the ICS-CERT repository reveals that out of a total of 589 advisories, more than 80 target PLCs. Stuxnet attack, considered the most famous reported incident on ICS, targeted mainly PLCs. Most of the PLC reported incidents are rooted in the fact that the PLC being accessed in an unauthorized way. In this paper, we investigate the PLC access control problem. We discuss several access control models but we focus mainly on the commonly adopted password-based access control. We show how such passwordbased mechanism can be compromised in a realistic scenario as well as the list the attacks that can be derived as a consequence. This paper details a set of vulnerabilities targeting recent versions of PLCs (2016) which have not been reported in the literature.","PeriodicalId":182326,"journal":{"name":"2016 World Congress on Industrial Control Systems Security (WCICSS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122271025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Zia Ur Rahman, I. Shaikh, Ahsan Ali, Nasir Ahmad
{"title":"Fixed structure Hα control of couple tank system and anti-integral windup PID control strategy for actuator saturation","authors":"Muhammad Zia Ur Rahman, I. Shaikh, Ahsan Ali, Nasir Ahmad","doi":"10.1109/WCICSS.2016.7882608","DOIUrl":"https://doi.org/10.1109/WCICSS.2016.7882608","url":null,"abstract":"This paper considered two main issues. First is about the complete mathematical modelling and Fixed-Structure α robust controller design for couple tank system in frequency domain. This system is nonlinear and classical Proportional Integral Derivative (PID) controller may not give appropriate performance. Although classical PID controllers are more practical due their simplicity and linearity but they have some limitations. Especially in case of nonlinear system or small variations in parameters, they may not give desired transient specification. The proposed controller is a robust controller which contains a fixed structure and fixed order, and its parameters are optimized using non smooth Hα optimization in frequency domain. Also Fixed-Structure Hα controller also gives satisfied performance in case of parameters variation. Couple tank system is widely used in industry. For example its most important applications are water purification, effluent treatment, dairy filtration, chemical processing and also this system is used in pharmaceutical industry. Actuator saturation is a major nonlinearity that may exist in couple tank systems. And this nonlinearity may lead to performance degradation or instability of controller and whole system. This problem is known as integral windup and to deal this problem, an Anti-Integral Windup PID control strategy is introduced in the second part of this paper.","PeriodicalId":182326,"journal":{"name":"2016 World Congress on Industrial Control Systems Security (WCICSS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132841278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quaternion public key cryptosystems","authors":"M. R. Valluri, S. V. Narayan","doi":"10.1109/WCICSS.2016.7882612","DOIUrl":"https://doi.org/10.1109/WCICSS.2016.7882612","url":null,"abstract":"In this paper, quaternion key exchange protocol and quaternion public key encryption scheme are proposed. The security of proposals relies on hardness of the hidden quaternion conjugacy search problem, that is, difficulty of solving the simultaneous quaternion discrete logarithmic problem and quaternion conjugacy search problem over quaternion rings modulo prime, p. Also, the performance and the security related issues of the proposals have been discussed.","PeriodicalId":182326,"journal":{"name":"2016 World Congress on Industrial Control Systems Security (WCICSS)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130474514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}