Raymond Borges Hink, Justin M. Beaver, M. Buckner, T. Morris, U. Adhikari, S. Pan
{"title":"Machine learning for power system disturbance and cyber-attack discrimination","authors":"Raymond Borges Hink, Justin M. Beaver, M. Buckner, T. Morris, U. Adhikari, S. Pan","doi":"10.1109/ISRCS.2014.6900095","DOIUrl":"https://doi.org/10.1109/ISRCS.2014.6900095","url":null,"abstract":"Power system disturbances are inherently complex and can be attributed to a wide range of sources, including both natural and man-made events. Currently, the power system operators are heavily relied on to make decisions regarding the causes of experienced disturbances and the appropriate course of action as a response. In the case of cyber-attacks against a power system, human judgment is less certain since there is an overt attempt to disguise the attack and deceive the operators as to the true state of the system. To enable the human decision maker, we explore the viability of machine learning as a means for discriminating types of power system disturbances, and focus specifically on detecting cyber-attacks where deception is a core tenet of the event. We evaluate various machine learning methods as disturbance discriminators and discuss the practical implications for deploying machine learning systems as an enhancement to existing power system architectures.","PeriodicalId":205922,"journal":{"name":"2014 7th International Symposium on Resilient Control Systems (ISRCS)","volume":"21 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120852824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resiliency techniques for systems-of-systems extending and applying the Cyber Resiliency Engineering Framework to the space domain","authors":"D. Bodeau, J. Brtis, R. Graubart, Jon Salwen","doi":"10.1109/ISRCS.2014.6900099","DOIUrl":"https://doi.org/10.1109/ISRCS.2014.6900099","url":null,"abstract":"This paper describes how resiliency techniques apply to an acknowledged system-of-systems. The Cyber Resiliency Engineering Framework is extended to apply to resilience in general, with a focus on resilience of space systems. Resiliency techniques can improve system-of-systems operations. Both opportunities and challenges are identified for resilience as an emergent property in an acknowledged system-of-systems.","PeriodicalId":205922,"journal":{"name":"2014 7th International Symposium on Resilient Control Systems (ISRCS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128500425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Balchanos, J. C. Domercant, Huy T. Tran, D. Mavris
{"title":"Metrics-based analysis and evaluation framework for engineering resilient systems","authors":"M. Balchanos, J. C. Domercant, Huy T. Tran, D. Mavris","doi":"10.1109/ISRCS.2014.6900107","DOIUrl":"https://doi.org/10.1109/ISRCS.2014.6900107","url":null,"abstract":"The DoD's ERS initiative calls for affordable, effective, and adaptable systems development. In support of this, a metrics-based analysis framework is introduced to address certain challenges for the design of future C2 military System-of-Systems (SoS). The interpretation of the concept of resilience, as well as a supporting threat analysis procedure for military SoS applications, have been the key driver for the evaluation of a system's ability to maintain its mission capability and health, when under attack due to given threats. An agent-based C2 UAV communication network application has been developed for the demonstration of the framework. Scenario-based case studies that involved communication jamming by the adversary forces are introduced for the evaluation the C2 system's response to a threat, including both degradation and recovery periods.","PeriodicalId":205922,"journal":{"name":"2014 7th International Symposium on Resilient Control Systems (ISRCS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124597607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Matt Bosack, J. Kollmer, Bogdan Niemoczynski, S. Biswas
{"title":"Closed loop control of hysteretic magnetization","authors":"Matt Bosack, J. Kollmer, Bogdan Niemoczynski, S. Biswas","doi":"10.1109/ISRCS.2014.6900091","DOIUrl":"https://doi.org/10.1109/ISRCS.2014.6900091","url":null,"abstract":"This paper presents a novel method for closed loop control of magnetization of ferrite material using concepts from nonlinear control theory. A first principle nonlinear mathematical model of magnetization has been developed that describes the temporal dynamics of the magnetization process. Using concepts from nonlinear control theory, it is shown that the developed control system is able to maintain the magnetization of the structure at a desired level in the presence of arbitrary ambient excitation. Simulation of the nonlinear controller, and experimental PID studies are presented to illustrate the proposed method of closed loop control of magnetization.","PeriodicalId":205922,"journal":{"name":"2014 7th International Symposium on Resilient Control Systems (ISRCS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128511504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A prototyping environment for research on human-machine interfaces in process control use of Microsoft WPF for microworld and distributed control system development","authors":"Roger T. Lew, R. Boring, T. Ulrich","doi":"10.1109/ISRCS.2014.6900111","DOIUrl":"https://doi.org/10.1109/ISRCS.2014.6900111","url":null,"abstract":"Operators of critical processes, such as nuclear power production, must contend with highly complex systems, procedures, and regulations. Developing human-machine interfaces (HMIs) that better support operators is a high priority for ensuring the safe and reliable operation of critical processes. Human factors engineering (HFE) provides a rich and mature set of tools for evaluating the performance of HMIs, but the set of tools for developing and designing HMIs is still in its infancy. Here we propose that Microsoft Windows Presentation Foundation (WPF) is well suited for many roles in the research and development of HMIs for process control.","PeriodicalId":205922,"journal":{"name":"2014 7th International Symposium on Resilient Control Systems (ISRCS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130105912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Feng Xie, Yong Peng, Wei Zhao, Xuefeng Han, Hui Li, Ru Zhang, J. Zhao, Jianyi Liu
{"title":"Using simulation platform to analyze radio modem security in SCADA","authors":"Feng Xie, Yong Peng, Wei Zhao, Xuefeng Han, Hui Li, Ru Zhang, J. Zhao, Jianyi Liu","doi":"10.1109/ISRCS.2014.6900097","DOIUrl":"https://doi.org/10.1109/ISRCS.2014.6900097","url":null,"abstract":"Radio modems are the most common long-range communication equipments in supervisory control and data acquisition (SCADA) systems such as water treatment plants and petrochemical factories. However, since there are lack of security mechanisms in radio modems, many traditional cyber attacks can have an impact on the data transmission via radio modems. In this paper, a simulation platform based on radio modems is built. And many attacks, e.g. communication jam, data eavesdropping and tamper as well as DOS attack, are carried out in this platform to test the security of radio modem. Experimental results indicate that there is something wrong in data transmission in SCADA systems when facing these cyber attacks, which means that some security measures should be applied to protect radio modems.","PeriodicalId":205922,"journal":{"name":"2014 7th International Symposium on Resilient Control Systems (ISRCS)","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125904204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Craig Miles, Arun Lakhotia, Charles LeDoux, Aaron Newsom, Vivek Notani
{"title":"VirusBattle: State-of-the-art malware analysis for better cyber threat intelligence","authors":"Craig Miles, Arun Lakhotia, Charles LeDoux, Aaron Newsom, Vivek Notani","doi":"10.1109/ISRCS.2014.6900103","DOIUrl":"https://doi.org/10.1109/ISRCS.2014.6900103","url":null,"abstract":"Discovered interrelationships among instances of malware can be used to infer connections among seemingly unconnected objects, including actors, machines, and the malware itself. However, such malware interrelationships are currently underutilized in the cyber threat intelligence arena. To fill that gap, we are developing VirusBattle, a system employing state-of-the-art malware analyses to automatically discover interrelationships among instances of malware. VirusBattle analyses mine malware interrelationships over many types of malware artifacts, including the binary, code, code semantics, dynamic behaviors, malware metadata, distribution sites and e-mails. The result is a malware interrelationships graph which can be explored automatically or interactively to infer previously unknown connections.","PeriodicalId":205922,"journal":{"name":"2014 7th International Symposium on Resilient Control Systems (ISRCS)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122987949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resilient consensus protocol in the presence of trusted nodes","authors":"W. Abbas, Yevgeniy Vorobeychik, X. Koutsoukos","doi":"10.1109/ISRCS.2014.6900100","DOIUrl":"https://doi.org/10.1109/ISRCS.2014.6900100","url":null,"abstract":"In this paper, we propose a scheme for a resilient distributed consensus problem through a set of trusted nodes within the network. Currently, algorithms that solve resilient consensus problem demand networks to have high connectivity to overrule the effects of adversaries, or require nodes to have access to some non-local information. In our scheme, we incorporate the notion of trusted nodes to guarantee distributed consensus despite any number of adversarial attacks, even in sparse networks. A subset of nodes, which are more secured against the attacks, constitute a set of trusted nodes. It is shown that the network becomes resilient against any number of attacks whenever the set of trusted nodes form a connected dominating set within the network. We also study a relationship between trusted nodes and the network robustness. Simulations are presented to illustrate and compare our scheme with the existing ones.","PeriodicalId":205922,"journal":{"name":"2014 7th International Symposium on Resilient Control Systems (ISRCS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127671923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resilient control systems Practical metrics basis for defining mission impact","authors":"C. Rieger","doi":"10.1109/ISRCS.2014.6900108","DOIUrl":"https://doi.org/10.1109/ISRCS.2014.6900108","url":null,"abstract":"“Resilience” describes how systems operate at an acceptable level of normalcy despite disturbances or threats. In this paper we first consider the cognitive, cyber-physical interdependencies inherent in critical infrastructure systems and how resilience differs from reliability to mitigate these risks. Terminology and metrics basis are provided to integrate the cognitive, cyber-physical aspects that should be considered when defining solutions for resilience. A practical approach is taken to roll this metrics basis up to system integrity and business case metrics that establish “proper operation” and “impact.” A notional chemical processing plant is the use case for demonstrating how the system integrity metrics can be applied to establish performance, and as well, the effects on the process that roll into the business case.","PeriodicalId":205922,"journal":{"name":"2014 7th International Symposium on Resilient Control Systems (ISRCS)","volume":"423 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122799129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-time algorithm for nonlinear systems with incomplete state information using finite-horizon optimal control technique","authors":"Ahmed Khamis, D. Subbaram Naidu","doi":"10.1109/ISRCS.2014.6900094","DOIUrl":"https://doi.org/10.1109/ISRCS.2014.6900094","url":null,"abstract":"This paper discusses a novel efficient real-time technique used for finite-horizon nonlinear regulator problems with incomplete state information. This technique based on integrating the Kalman filter algorithm and the finite-horizon differential State Dependent Riccati Equation (SDRE) technique. In this technique, the optimal control problem of the nonlinear system is solved by using finite-horizon differential SDRE algorithm, which makes this technique effective for a wide range of operating points. A nonlinear mechanical crane is given to show the effectiveness of the proposed technique.","PeriodicalId":205922,"journal":{"name":"2014 7th International Symposium on Resilient Control Systems (ISRCS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125706185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}