2016 World Congress on Industrial Control Systems Security (WCICSS)最新文献

筛选
英文 中文
Towards distinguishing between faults and cyber-attacks in the networked control system 网络控制系统故障与网络攻击的鉴别研究
2016 World Congress on Industrial Control Systems Security (WCICSS) Pub Date : 2016-12-01 DOI: 10.1109/WCICSS.2016.7882611
A. A. Yaseen, M. Bayart
{"title":"Towards distinguishing between faults and cyber-attacks in the networked control system","authors":"A. A. Yaseen, M. Bayart","doi":"10.1109/WCICSS.2016.7882611","DOIUrl":"https://doi.org/10.1109/WCICSS.2016.7882611","url":null,"abstract":"The Generalized Predictive Controller (GPC) is a preferred controller implementation method in the Networked Control System (NCS). This paper proposes an Intelligent Generalized Predictive Controller (IGPC) as an enhancement for the standard GPC. The IGPC is designed along with an internal detection and distinguishing mechanism for cyberattacks and faults; this one is based on the comparison between the true control variable and the estimated control variable for normal plant model and for faulty or perturbed plant conditions by a specific computation algorithm. The test result of the proposed method shows that it can be significantly used for detection of the cyber-attack.","PeriodicalId":182326,"journal":{"name":"2016 World Congress on Industrial Control Systems Security (WCICSS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122238615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis of carbon displacement possibilities from conversion of existing fossil fuel driven domestic heating systems to biomass driven domestic heating system 从现有的化石燃料驱动的家庭供暖系统转换为生物质驱动的家庭供暖系统的碳置换可能性分析
2016 World Congress on Industrial Control Systems Security (WCICSS) Pub Date : 2016-12-01 DOI: 10.1109/WCICSS.2016.7882934
E. O'Connor, Joseph Walsh
{"title":"Analysis of carbon displacement possibilities from conversion of existing fossil fuel driven domestic heating systems to biomass driven domestic heating system","authors":"E. O'Connor, Joseph Walsh","doi":"10.1109/WCICSS.2016.7882934","DOIUrl":"https://doi.org/10.1109/WCICSS.2016.7882934","url":null,"abstract":"Decarbonisation of Irelands heating system would mean a shift away from traditional fossil fuels, and a step towards more renewable and sustainable thermal energy systems. Climate change and the related consequences associated with it have become a key component of the political agenda at local, national and international levels. It has become clear that further action is needed to tackle global warming and alleviate the dangers associated with the continued warming of our planet. Reduced energy consumption, increased energy efficiency, increased use of renewable energy sources, and the reduction in Green House Gas (GHG) emissions may yet become one of this generation’s defining moments.","PeriodicalId":182326,"journal":{"name":"2016 World Congress on Industrial Control Systems Security (WCICSS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132324170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber-resilient industrial control system with diversified architecture and bus monitoring 具有多种结构和总线监控的网络弹性工业控制系统
2016 World Congress on Industrial Control Systems Security (WCICSS) Pub Date : 2016-12-01 DOI: 10.1109/WCICSS.2016.7882940
Charles Kim
{"title":"Cyber-resilient industrial control system with diversified architecture and bus monitoring","authors":"Charles Kim","doi":"10.1109/WCICSS.2016.7882940","DOIUrl":"https://doi.org/10.1109/WCICSS.2016.7882940","url":null,"abstract":"This paper focuses on exploitable cyber vulnerabilities in industrial control systems (ICS) and on a new approach of resiliency against them. Even with numerous metrics and methods for intrusion detection and mitigation strategy, a complete detection and deterrence of cyber-attacks for ICS is impossible. Countering the impact and consequence of possible malfunctions caused by such attacks in the safety-critical ICS’s, this paper proposes new controller architecture to fail-operate even under compromised situations. The proposed new ICS is realized with diversification of hardware/software and unidirectional communication in alerting suspicious infiltration to upper-level management. Equipped with control bus monitoring, this operation-basis approach of infiltration detection would become a truly cyber-resilient ICS. The proposed system is tested in a lab hardware experimentation setup and on a cybersecurity test bed, DeterLab, for validation.","PeriodicalId":182326,"journal":{"name":"2016 World Congress on Industrial Control Systems Security (WCICSS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134234146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Resilience of logistics network: analysis and design 物流网络弹性:分析与设计
2016 World Congress on Industrial Control Systems Security (WCICSS) Pub Date : 2016-12-01 DOI: 10.1109/WCICSS.2016.7882936
C. Lam
{"title":"Resilience of logistics network: analysis and design","authors":"C. Lam","doi":"10.1109/WCICSS.2016.7882936","DOIUrl":"https://doi.org/10.1109/WCICSS.2016.7882936","url":null,"abstract":"Logistics entities are interrelated to each other, any disruption or sudden unavailability of the entities may cause severe cascading disruption effects on the functioning of the entire logistics network. In analyze the cascading disruption effects, it is important to actively concern the normal logistics practices, rather than passively emphasize on learning from the past incidents. This paper proposes a resilience analysis framework for the analysis and design of logistics network on how to help the network to cope with complexity under disruption. Under the resilience analysis framework, the logistics network is modeled as a probabilistic network graph, the resilience can then be analyzed by the reliability of all the independent connection paths among the logistics entities with connection weightings. The design of the logistics network is then further proposed by (1) risk sharing and resilience enhancement by means of the redundancy effect, and (2) restoration and recovery of the network by means of dependency routing. Therefore, this paper can provide an efficient way to analyze and design the stability of the logistics network as well as to understand the ability of the network to return to a stable state after disruptions from failure.","PeriodicalId":182326,"journal":{"name":"2016 World Congress on Industrial Control Systems Security (WCICSS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132572237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Machine learning algorithms for process analytical technology 过程分析技术的机器学习算法
2016 World Congress on Industrial Control Systems Security (WCICSS) Pub Date : 2016-12-01 DOI: 10.1109/WCICSS.2016.7882607
Niall O' Mahony, Trevor Murphy, Krishna Panduru, D. Riordan, Joseph Walsh
{"title":"Machine learning algorithms for process analytical technology","authors":"Niall O' Mahony, Trevor Murphy, Krishna Panduru, D. Riordan, Joseph Walsh","doi":"10.1109/WCICSS.2016.7882607","DOIUrl":"https://doi.org/10.1109/WCICSS.2016.7882607","url":null,"abstract":"Increased globalisation and competition are drivers for process analytical technologies (PAT) that enable seamless process control, greater flexibility and cost efficiency in the process industries. The paper will discuss process modelling and control for industrial applications with an emphasis on solutions enabling the real-time data analytics of sensor measurements that PAT demands. This research aims to introduce an integrated process control approach, embedding novel sensors for monitoring in real time the critical control parameters of key processes in the minerals, ceramics, non-ferrous metals, and chemical process industries. The paper presents a comparison of machine learning algorithms applied to sensor data collected for a polymerisation process. Several machine learning algorithms including Adaptive Neuro-Fuzzy Inference Systems, Neural Networks and Genetic Algorithms were implemented using MATLAB® Software and compared in terms of accuracy (MSE) and robustness in modelling process progression. The results obtained show that machine learning-based approaches produce significantly more accurate and robust process models compared to models developed manually while also being more adaptable to new data. The paper presents perspectives on the potential benefits of machine learning algorithms with a view to their future in the industrial process industry.","PeriodicalId":182326,"journal":{"name":"2016 World Congress on Industrial Control Systems Security (WCICSS)","volume":"15 43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124253528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
SCADA-SST: a SCADA security testbed SCADA- sst: SCADA安全测试平台
2016 World Congress on Industrial Control Systems Security (WCICSS) Pub Date : 2016-12-01 DOI: 10.1109/WCICSS.2016.7882610
Asem Ghaleb, Sami Zhioua, Ahmad Almulhem
{"title":"SCADA-SST: a SCADA security testbed","authors":"Asem Ghaleb, Sami Zhioua, Ahmad Almulhem","doi":"10.1109/WCICSS.2016.7882610","DOIUrl":"https://doi.org/10.1109/WCICSS.2016.7882610","url":null,"abstract":"The number of reported cybersecurity incidents on SCADA (Supervisory Control and Data Acquisition) systems increased significantly in the past few years. One contributing factor is the fact that security testing of live SCADA systems is not practical as such systems are expected to be operational 24/7. Also and most importantly, conducting live security testing on these types of systems is generally costly. A practical and cost-effective solution is to carry out security testing on a simulated version of the physical setting. The main contribution of this paper is to present a SCADA simulation environment (SCADA-SST) suitable for security testing. The simulation environment is generic, easy to setup (comes with a detailed manual), and supports hybrid architectures (involving simulated as well as physical components). We show how SCADA-SST can be used to simulate two realistic settings, namely, Water distribution and Electrical power grid. Finally, for the sake of security testing example, we show how SCADASST can be used to assess the resilience of common SCADA nodes to DOS attacks.","PeriodicalId":182326,"journal":{"name":"2016 World Congress on Industrial Control Systems Security (WCICSS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116414771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
PLC access control: a security analysis PLC访问控制:安全性分析
2016 World Congress on Industrial Control Systems Security (WCICSS) Pub Date : 2016-12-01 DOI: 10.1109/WCICSS.2016.7882935
Haroon Wardak, Sami Zhioua, Ahmad Almulhem
{"title":"PLC access control: a security analysis","authors":"Haroon Wardak, Sami Zhioua, Ahmad Almulhem","doi":"10.1109/WCICSS.2016.7882935","DOIUrl":"https://doi.org/10.1109/WCICSS.2016.7882935","url":null,"abstract":"A Programmable Logic Controller (PLC) is a very common industrial control system device used to control output devices based on data received (and processed) from input devices. Given the central role that PLCs play in deployed industrial control systems, it has been a preferred target of ICS attackers. A quick search in the ICS-CERT repository reveals that out of a total of 589 advisories, more than 80 target PLCs. Stuxnet attack, considered the most famous reported incident on ICS, targeted mainly PLCs. Most of the PLC reported incidents are rooted in the fact that the PLC being accessed in an unauthorized way. In this paper, we investigate the PLC access control problem. We discuss several access control models but we focus mainly on the commonly adopted password-based access control. We show how such passwordbased mechanism can be compromised in a realistic scenario as well as the list the attacks that can be derived as a consequence. This paper details a set of vulnerabilities targeting recent versions of PLCs (2016) which have not been reported in the literature.","PeriodicalId":182326,"journal":{"name":"2016 World Congress on Industrial Control Systems Security (WCICSS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122271025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Fixed structure Hα control of couple tank system and anti-integral windup PID control strategy for actuator saturation 耦合油箱系统的固定结构Hα控制及作动器饱和反积分上卷PID控制策略
2016 World Congress on Industrial Control Systems Security (WCICSS) Pub Date : 2016-12-01 DOI: 10.1109/WCICSS.2016.7882608
Muhammad Zia Ur Rahman, I. Shaikh, Ahsan Ali, Nasir Ahmad
{"title":"Fixed structure Hα control of couple tank system and anti-integral windup PID control strategy for actuator saturation","authors":"Muhammad Zia Ur Rahman, I. Shaikh, Ahsan Ali, Nasir Ahmad","doi":"10.1109/WCICSS.2016.7882608","DOIUrl":"https://doi.org/10.1109/WCICSS.2016.7882608","url":null,"abstract":"This paper considered two main issues. First is about the complete mathematical modelling and Fixed-Structure α robust controller design for couple tank system in frequency domain. This system is nonlinear and classical Proportional Integral Derivative (PID) controller may not give appropriate performance. Although classical PID controllers are more practical due their simplicity and linearity but they have some limitations. Especially in case of nonlinear system or small variations in parameters, they may not give desired transient specification. The proposed controller is a robust controller which contains a fixed structure and fixed order, and its parameters are optimized using non smooth Hα optimization in frequency domain. Also Fixed-Structure Hα controller also gives satisfied performance in case of parameters variation. Couple tank system is widely used in industry. For example its most important applications are water purification, effluent treatment, dairy filtration, chemical processing and also this system is used in pharmaceutical industry. Actuator saturation is a major nonlinearity that may exist in couple tank systems. And this nonlinearity may lead to performance degradation or instability of controller and whole system. This problem is known as integral windup and to deal this problem, an Anti-Integral Windup PID control strategy is introduced in the second part of this paper.","PeriodicalId":182326,"journal":{"name":"2016 World Congress on Industrial Control Systems Security (WCICSS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132841278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quaternion public key cryptosystems 四元数公钥密码系统
2016 World Congress on Industrial Control Systems Security (WCICSS) Pub Date : 2016-12-01 DOI: 10.1109/WCICSS.2016.7882612
M. R. Valluri, S. V. Narayan
{"title":"Quaternion public key cryptosystems","authors":"M. R. Valluri, S. V. Narayan","doi":"10.1109/WCICSS.2016.7882612","DOIUrl":"https://doi.org/10.1109/WCICSS.2016.7882612","url":null,"abstract":"In this paper, quaternion key exchange protocol and quaternion public key encryption scheme are proposed. The security of proposals relies on hardness of the hidden quaternion conjugacy search problem, that is, difficulty of solving the simultaneous quaternion discrete logarithmic problem and quaternion conjugacy search problem over quaternion rings modulo prime, p. Also, the performance and the security related issues of the proposals have been discussed.","PeriodicalId":182326,"journal":{"name":"2016 World Congress on Industrial Control Systems Security (WCICSS)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130474514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信