A. Patel, T. Schenk, S. Knorn, H. Patzlaff, D. Obradovic, Andrés Botero Halblaub
{"title":"基于仿真的工业厂房网络安全攻击实时识别","authors":"A. Patel, T. Schenk, S. Knorn, H. Patzlaff, D. Obradovic, Andrés Botero Halblaub","doi":"10.1109/CSR51186.2021.9527938","DOIUrl":null,"url":null,"abstract":"This paper considers the problem of cyber attacks onto industrial plants and proposes to use a digital twin to detect and localize such attacks. The digital twin consists of a representation of the nominal plant behavior, i.e., not under attack, for which differential-algebraic equation systems or discrete state models may be used. By simulating the nominal behavior of the system online, i.e., in parallel to the process, and continuously comparing the simulated behavior to the measured values allows to detect attacks. Their localization is facilitated through a root-cause analysis, which is also based on the model description of the plant. The concept has been implemented and tested on a small scale industrial prototype.","PeriodicalId":253300,"journal":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Real-time, Simulation-based Identification of Cyber-Security Attacks of Industrial Plants\",\"authors\":\"A. Patel, T. Schenk, S. Knorn, H. Patzlaff, D. Obradovic, Andrés Botero Halblaub\",\"doi\":\"10.1109/CSR51186.2021.9527938\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper considers the problem of cyber attacks onto industrial plants and proposes to use a digital twin to detect and localize such attacks. The digital twin consists of a representation of the nominal plant behavior, i.e., not under attack, for which differential-algebraic equation systems or discrete state models may be used. By simulating the nominal behavior of the system online, i.e., in parallel to the process, and continuously comparing the simulated behavior to the measured values allows to detect attacks. Their localization is facilitated through a root-cause analysis, which is also based on the model description of the plant. The concept has been implemented and tested on a small scale industrial prototype.\",\"PeriodicalId\":253300,\"journal\":{\"name\":\"2021 IEEE International Conference on Cyber Security and Resilience (CSR)\",\"volume\":\"78 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-07-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE International Conference on Cyber Security and Resilience (CSR)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSR51186.2021.9527938\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSR51186.2021.9527938","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Real-time, Simulation-based Identification of Cyber-Security Attacks of Industrial Plants
This paper considers the problem of cyber attacks onto industrial plants and proposes to use a digital twin to detect and localize such attacks. The digital twin consists of a representation of the nominal plant behavior, i.e., not under attack, for which differential-algebraic equation systems or discrete state models may be used. By simulating the nominal behavior of the system online, i.e., in parallel to the process, and continuously comparing the simulated behavior to the measured values allows to detect attacks. Their localization is facilitated through a root-cause analysis, which is also based on the model description of the plant. The concept has been implemented and tested on a small scale industrial prototype.