{"title":"IICPS 2014研讨会主题:通过故障和网络攻击进行计算:弹性智能电网的案例","authors":"Z. Kalbarczyk, E. Fulp","doi":"10.1109/IRI.2014.7051727","DOIUrl":null,"url":null,"abstract":"Rapid proliferation of cyber physical systems (CPS) in our society makes them an attractive target for miscreants, in particular when CPS monitors and controls physical processes within a critical infrastructure such as power grid or water distribution. By integrating computation and physical processes in a tight control loop, CPS enables rapid response to changes in the controlled environment. However, regardless of how well a system is engineered, it is a matter of time for it to fail and hence, computing through failures and cyber-attacks becomes a norm rather than an exception. This talk first discusses challenges in achieving resilient smart cyber physical systems using examples from: (i) empirical studies on impact of failures/attacks on SCADA (Supervisory Control and Data Acquisition) systems used in power grid and (ii) data on real attacks on a commercial CPS. Then, we use an example of the SCADA deployed in the power grid, where a sophisticated attacker exploits system vulnerabilities and issues malicious control commands to drive remote facilities into an unsecure state without exhibiting any protocol-level anomalies. In order to detect such attacks, methods that combine system knowledge on both cyber and physical infrastructure in the power grid are needed to estimate execution consequences of control commands and thus, to reveal attacker's malicious intentions. We present an example method to address the challenge.","PeriodicalId":89460,"journal":{"name":"Proceedings of the ... IEEE International Conference on Information Reuse and Integration. IEEE International Conference on Information Reuse and Integration","volume":"46 1","pages":"xxx-xxxi"},"PeriodicalIF":0.0000,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"IICPS 2014 workshop keynote: Computing through failures and cyber attacks: Case for resilient smart power grid\",\"authors\":\"Z. Kalbarczyk, E. Fulp\",\"doi\":\"10.1109/IRI.2014.7051727\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Rapid proliferation of cyber physical systems (CPS) in our society makes them an attractive target for miscreants, in particular when CPS monitors and controls physical processes within a critical infrastructure such as power grid or water distribution. By integrating computation and physical processes in a tight control loop, CPS enables rapid response to changes in the controlled environment. However, regardless of how well a system is engineered, it is a matter of time for it to fail and hence, computing through failures and cyber-attacks becomes a norm rather than an exception. This talk first discusses challenges in achieving resilient smart cyber physical systems using examples from: (i) empirical studies on impact of failures/attacks on SCADA (Supervisory Control and Data Acquisition) systems used in power grid and (ii) data on real attacks on a commercial CPS. Then, we use an example of the SCADA deployed in the power grid, where a sophisticated attacker exploits system vulnerabilities and issues malicious control commands to drive remote facilities into an unsecure state without exhibiting any protocol-level anomalies. In order to detect such attacks, methods that combine system knowledge on both cyber and physical infrastructure in the power grid are needed to estimate execution consequences of control commands and thus, to reveal attacker's malicious intentions. We present an example method to address the challenge.\",\"PeriodicalId\":89460,\"journal\":{\"name\":\"Proceedings of the ... IEEE International Conference on Information Reuse and Integration. IEEE International Conference on Information Reuse and Integration\",\"volume\":\"46 1\",\"pages\":\"xxx-xxxi\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the ... IEEE International Conference on Information Reuse and Integration. IEEE International Conference on Information Reuse and Integration\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IRI.2014.7051727\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the ... IEEE International Conference on Information Reuse and Integration. IEEE International Conference on Information Reuse and Integration","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IRI.2014.7051727","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
IICPS 2014 workshop keynote: Computing through failures and cyber attacks: Case for resilient smart power grid
Rapid proliferation of cyber physical systems (CPS) in our society makes them an attractive target for miscreants, in particular when CPS monitors and controls physical processes within a critical infrastructure such as power grid or water distribution. By integrating computation and physical processes in a tight control loop, CPS enables rapid response to changes in the controlled environment. However, regardless of how well a system is engineered, it is a matter of time for it to fail and hence, computing through failures and cyber-attacks becomes a norm rather than an exception. This talk first discusses challenges in achieving resilient smart cyber physical systems using examples from: (i) empirical studies on impact of failures/attacks on SCADA (Supervisory Control and Data Acquisition) systems used in power grid and (ii) data on real attacks on a commercial CPS. Then, we use an example of the SCADA deployed in the power grid, where a sophisticated attacker exploits system vulnerabilities and issues malicious control commands to drive remote facilities into an unsecure state without exhibiting any protocol-level anomalies. In order to detect such attacks, methods that combine system knowledge on both cyber and physical infrastructure in the power grid are needed to estimate execution consequences of control commands and thus, to reveal attacker's malicious intentions. We present an example method to address the challenge.