IDEAS home Printed from https://ideas.repec.org/a/gam/jeners/v15y2022i17p6212-d898530.html
   My bibliography  Save this article

Integrated Approach to Diagnostics of Failures and Cyber-Attacks in Industrial Control Systems

Author

Listed:
  • Michał Syfert

    (Institute of Automatic Control and Robotics, Faculty of Mechatronics, Warsaw University of Technology, ul. Św. A. Boboli 8, 02-525 Warsaw, Poland)

  • Andrzej Ordys

    (Institute of Automatic Control and Robotics, Faculty of Mechatronics, Warsaw University of Technology, ul. Św. A. Boboli 8, 02-525 Warsaw, Poland)

  • Jan Maciej Kościelny

    (Institute of Automatic Control and Robotics, Faculty of Mechatronics, Warsaw University of Technology, ul. Św. A. Boboli 8, 02-525 Warsaw, Poland)

  • Paweł Wnuk

    (Institute of Automatic Control and Robotics, Faculty of Mechatronics, Warsaw University of Technology, ul. Św. A. Boboli 8, 02-525 Warsaw, Poland)

  • Jakub Możaryn

    (Institute of Automatic Control and Robotics, Faculty of Mechatronics, Warsaw University of Technology, ul. Św. A. Boboli 8, 02-525 Warsaw, Poland)

  • Krzysztof Kukiełka

    (Institute of Automatic Control and Robotics, Faculty of Mechatronics, Warsaw University of Technology, ul. Św. A. Boboli 8, 02-525 Warsaw, Poland)

Abstract

This paper is concerned with the issue of the diagnostics of process faults and the detection of cyber-attacks in industrial control systems. This problem is of significant importance to energy production and distribution, which, being part of critical infrastructure, is usually equipped with process diagnostics and, at the same time, is often subject to cyber-attacks. A commonly used approach would be to separate the two types of anomalies. The detection of process faults would be handled by a control team, often with a help of dedicated diagnostic tools, whereas the detection of cyber-attacks would be handled by an information technology team. In this article, it is postulated here that the two can be usefully merged together into one, comprehensive, anomaly detection system. For this purpose, firstly, the main types of cyber-attacks and the main methods of detecting cyber-attacks are being reviewed. Subsequently, in the analogy to “process fault”—a term well established in process diagnostics—the term “cyber-fault” is introduced. Within this context a cyber-attack is considered as a vector containing a number of cyber-faults. Next, it is explained how methods used in process diagnostics for fault detection and isolation can be applied to the detection of cyber-attacks and, in some cases, also to isolation of the components of such attacks, i.e., cyber-faults. A laboratory stand and a simulator have been developed to test the proposed approach. Some test results are presented, demonstrating that, similarly to equipment/process faults, residua can be established and cyber-faults can be identified based on the mismatch between the real data from the system and the outputs of the simulation model.

Suggested Citation

  • Michał Syfert & Andrzej Ordys & Jan Maciej Kościelny & Paweł Wnuk & Jakub Możaryn & Krzysztof Kukiełka, 2022. "Integrated Approach to Diagnostics of Failures and Cyber-Attacks in Industrial Control Systems," Energies, MDPI, vol. 15(17), pages 1-24, August.
  • Handle: RePEc:gam:jeners:v:15:y:2022:i:17:p:6212-:d:898530
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1996-1073/15/17/6212/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1996-1073/15/17/6212/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Zhe Wu & Fahad Albalawi & Junfeng Zhang & Zhihao Zhang & Helen Durand & Panagiotis D. Christofides, 2018. "Detecting and Handling Cyber-Attacks in Model Predictive Control of Chemical Processes," Mathematics, MDPI, vol. 6(10), pages 1-22, September.
    2. Kazimierz T. Kosmowski & Emilian Piesik & Jan Piesik & Marcin Śliwiński, 2022. "Integrated Functional Safety and Cybersecurity Evaluation in a Framework for Business Continuity Management," Energies, MDPI, vol. 15(10), pages 1-21, May.
    3. Jan Maciej Kościelny & Michał Syfert & Paweł Wnuk, 2022. "Diagnostic Column Reasoning Based on Multi-Valued Evaluation of Residuals and the Elementary Symptoms Sequence," Energies, MDPI, vol. 15(7), pages 1-22, April.
    4. Luo, Xiaoyuan & Wang, Xinyu & Zhang, Mingyue & Guan, Xinping, 2019. "Distributed detection and isolation of bias injection attack in smart energy grid via interval observer," Applied Energy, Elsevier, vol. 256(C).
    5. Genge, Béla & Kiss, István & Haller, Piroska, 2015. "A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures," International Journal of Critical Infrastructure Protection, Elsevier, vol. 10(C), pages 3-17.
    6. Jan Maciej Kościelny & Michał Syfert & Paweł Wnuk, 2021. "Diagnostic Row Reasoning Method Based on Multiple-Valued Evaluation of Residuals and Elementary Symptoms Sequence," Energies, MDPI, vol. 14(9), pages 1-18, April.
    7. Arash Mohammadi & Chun Yang & Qing-wei Chen, 2018. "Attack Detection/Isolation via a Secure Multisensor Fusion Framework for Cyberphysical Systems," Complexity, Hindawi, vol. 2018, pages 1-8, February.
    8. Kriaa, Siwar & Pietre-Cambacedes, Ludovic & Bouissou, Marc & Halgand, Yoran, 2015. "A survey of approaches combining safety and security for industrial control systems," Reliability Engineering and System Safety, Elsevier, vol. 139(C), pages 156-178.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Jakub Filip Możaryn & Michał Frątczak & Krzysztof Stebel & Tomasz Kłopot & Witold Nocoń & Andrzej Ordys & Stepan Ozana, 2023. "Stealthy Cyberattacks Detection Based on Control Performance Assessment Methods for the Air Conditioning Industrial Installation," Energies, MDPI, vol. 16(3), pages 1-15, January.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Siwar Kriaa & Marc Bouissou & Youssef Laarouchi, 2019. "A new safety and security risk analysis framework for industrial control systems," Journal of Risk and Reliability, , vol. 233(2), pages 151-174, April.
    2. Hayes, Darren R. & Cappa, Francesco, 2018. "Open-source intelligence for risk assessment," Business Horizons, Elsevier, vol. 61(5), pages 689-697.
    3. Wang, Wei & Cammi, Antonio & Di Maio, Francesco & Lorenzi, Stefano & Zio, Enrico, 2018. "A Monte Carlo-based exploration framework for identifying components vulnerable to cyber threats in nuclear power plants," Reliability Engineering and System Safety, Elsevier, vol. 175(C), pages 24-37.
    4. González, Santiago G. & Dormido Canto, S. & Sánchez Moreno, José, 2020. "Obtaining high preventive and resilience capacities in critical infrastructure by industrial automation cells," International Journal of Critical Infrastructure Protection, Elsevier, vol. 29(C).
    5. Kim, Hee Eun & Son, Han Seong & Kim, Jonghyun & Kang, Hyun Gook, 2017. "Systematic development of scenarios caused by cyber-attack-induced human errors in nuclear power plants," Reliability Engineering and System Safety, Elsevier, vol. 167(C), pages 290-301.
    6. Athira M. Mohan & Nader Meskin & Hasan Mehrjerdi, 2020. "A Comprehensive Review of the Cyber-Attacks and Cyber-Security on Load Frequency Control of Power Systems," Energies, MDPI, vol. 13(15), pages 1-33, July.
    7. Zio, E., 2018. "The future of risk assessment," Reliability Engineering and System Safety, Elsevier, vol. 177(C), pages 176-190.
    8. Li, Yunfeng & Xue, Wenli & Wu, Ting & Wang, Huaizhi & Zhou, Bin & Aziz, Saddam & He, Yang, 2021. "Intrusion detection of cyber physical energy system based on multivariate ensemble classification," Energy, Elsevier, vol. 218(C).
    9. Iaiani, Matteo & Tugnoli, Alessandro & Macini, Paolo & Cozzani, Valerio, 2021. "Outage and asset damage triggered by malicious manipulation of the control system in process plants," Reliability Engineering and System Safety, Elsevier, vol. 213(C).
    10. Chatzis, Petros & Stavrou, Eliana, 2022. "Cyber-threat landscape of border control infrastructures," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    11. Bolbot, Victor & Kulkarni, Ketki & Brunou, Päivi & Banda, Osiris Valdez & Musharraf, Mashrura, 2022. "Developments and research directions in maritime cybersecurity: A systematic literature review and bibliometric analysis," International Journal of Critical Infrastructure Protection, Elsevier, vol. 39(C).
    12. Du, Dajun & Zhu, Minggao & Wu, Dakui & Li, Xue & Fei, Minrui & Hu, Yukun & Li, Kang, 2024. "Distributed security state estimation-based carbon emissions and economic cost analysis for cyber–physical power systems under hybrid attacks," Applied Energy, Elsevier, vol. 353(PA).
    13. Chen, Chunyu & Cui, Mingjian & Fang, Xin & Ren, Bixing & Chen, Yang, 2020. "Load altering attack-tolerant defense strategy for load frequency control system," Applied Energy, Elsevier, vol. 280(C).
    14. Cheng, Ruijun & Cheng, Yu & Chen, Dewang & Song, Haifeng, 2021. "Online quantitative safety monitoring approach for unattended train operation system considering stochastic factors," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    15. Carreras Guzman, Nelson H. & Zhang, Jin & Xie, Jing & Glomsrud, Jon Arne, 2021. "A Comparative Study of STPA-Extension and the UFoI-E Method for Safety and Security Co-analysis," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
    16. Qianxiang Zhu & Yuanqing Qin & Chunjie Zhou & Weiwei Gao, 2018. "Extended multilevel flow model-based dynamic risk assessment for cybersecurity protection in industrial production systems," International Journal of Distributed Sensor Networks, , vol. 14(6), pages 15501477187, June.
    17. Galbraith, John W. & Iuliani, Luca, 2019. "Measures of robustness for networked critical infrastructure: An empirical comparison on four electrical grids," International Journal of Critical Infrastructure Protection, Elsevier, vol. 27(C).
    18. Chatterjee, Samrat & Thekdi, Shital, 2020. "An iterative learning and inference approach to managing dynamic cyber vulnerabilities of complex systems," Reliability Engineering and System Safety, Elsevier, vol. 193(C).
    19. Adrian-Silviu Roman, 2023. "Evaluating the Privacy and Utility of Time-Series Data Perturbation Algorithms," Mathematics, MDPI, vol. 11(5), pages 1-21, March.
    20. Bolbot, Victor & Theotokatos, Gerasimos & Bujorianu, Luminita Manuela & Boulougouris, Evangelos & Vassalos, Dracos, 2019. "Vulnerabilities and safety assurance methods in Cyber-Physical Systems: A comprehensive review," Reliability Engineering and System Safety, Elsevier, vol. 182(C), pages 179-193.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jeners:v:15:y:2022:i:17:p:6212-:d:898530. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.