Skip to main content

Detection and Mitigation of Time Delay Injection Attacks on Industrial Control Systems with PLCs

  • Conference paper
  • First Online:
Computer Network Security (MMM-ACNS 2017)

Abstract

National security agencies are increasingly concerned about cyber threats to Industrial Control Systems (ICS). For this reason, the detection and mitigation of cyber-attacks on ICS, as well as addressing the consequences of these attacks, are extensively researched. This paper describes the efforts of the cyber research team at Binghamton University that created an experimental cyber research testbed, designed as a power station equipped with low-watt electric machinery and industrial control and sensory systems, common in modern ICS. This paper presents a comprehensive study of time delay injection attacks on networked control systems, in which an attacker injects extra time delays into the feedback and forward channels of control systems. These attacks enable the adversary to interfere with the control system and create system instability, causing anomalous operational regimes and potentially forcing the system to crash. A technology based on an online recursive estimation of network time delays is proposed and validated by simulation studies and experiments on the testbed to mitigate any time delay injection attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. ICS-CERT monitor. https://ics-cert.us-cert.gov/sites/default/files/Monitors/ICS-CERTMonitorMay-Jun2015.pdf. Accessed 14 July 2016

  2. Antonioli, D., Tippenhauer, N.O.: Minicps: a toolkit for security research on cps networks. In: Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or Privacy, pp. 91–100. ACM (2015)

    Google Scholar 

  3. Cruz, T., Barrigas, J., Proença, J., Graziano, A., Panzieri, S., Lev, L., Simões, P.: Improving network security monitoring for industrial control systems. In: 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp. 878–881. IEEE (2015)

    Google Scholar 

  4. Fan, W.-H., Cai, H., Chen, Q.-W., Hu, W.-L.: Stability of networked control systems with time-delay. Kongzhi Lilun yu Yingyong/Control Theory Appl. (China), 21(6), 880–884 (2004)

    Google Scholar 

  5. Michiels, W., Niculescu, S.-I.: Stability, control, and computation for time-delay systems: an eigenvalue-based approach, vol. 27. Siam (2014)

    Google Scholar 

  6. Wang, F.-Y., Liu, D.: Networked control systems. Springer, London (2008)

    Book  Google Scholar 

  7. Xiao, L., Hassibi, A., How, J. P.: Control with random communication delays via a discrete-time jump system approach. In: Proceedings of the 2000 American Control Conference. vol. 3, pp. 2199–2204. IEEE (2000)

    Google Scholar 

  8. Lee, Y., Lee, J., Park, S.: PID controller tuning for integrating and unstable processes with time delay. Chem. Eng. Sci. 55(17), 3481–3493 (2000)

    Article  Google Scholar 

  9. Gupta, R.A., Chow, M.-Y.: Performance assessment and compensation for secure networked control systems. In: 34th Annual Conference of IEEE Industrial Electronics. IECON 2008, pp. 2929–2934. IEEE (2008)

    Google Scholar 

  10. Larsen, J.: Controlling without modifying: the stale data problem. In: S4x16, Miami, US, January 2016

    Google Scholar 

  11. Krotofil, M., Cardenas, A., Larsen, J., Gollmann, D.: Vulnerabilities of cyber-physical systems to stale data: determining the optimal time to launch attacks. Int. J. Crit. Infrastruct. Prot. 7(4), 213–232 (2014)

    Article  Google Scholar 

  12. Lee, P., Clark, A., Bushnell, L., Poovendran, R.: A passivity framework for modeling and mitigating wormhole attacks on networked control systems. IEEE Trans. Autom. Control 59(12), 3224–3237 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  13. Hu, Y.-C., Perrig, A., Johnson, D.B.: Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 370–380 (2006)

    Article  Google Scholar 

  14. Sridhar, S., Hahn, A., Govindarasu, M.: Cyber–physical system security for the electric power grid. Proc. IEEE 100(1), 210–224 (2012)

    Article  Google Scholar 

  15. Sargolzaei, A., Yen, K.K., Abdelghani, M.: Time-delay switch attack on load frequency control in smart grid. Adv. Commun. Technol. 5, 55–64 (2013)

    Google Scholar 

  16. Sargolzaei, A., Yen, K.K., Abdelghani, M.: Preventing time-delay switch attack on load frequency control in distributed power systems. IEEE Trans. Smart Grid 7(2), 1176–1185 (2016)

    Google Scholar 

  17. Korkmaz, E., Dolgikh, A., Davis, M., Skormin, V.: Industrial control systems security testbed. In: 11th Annual Symposium on Information Assurance (ASIA 2016), pp. 13–18, June 2016

    Google Scholar 

  18. Rizzo, L.: Dummynet: a simple approach to the evaluation of network protocols. ACM SIGCOMM Comput. Commun. Rev. 27(1), 31–41 (1997)

    Article  Google Scholar 

  19. Carbone, M., Rizzo, L.: Dummynet revisited. ACM SIGCOMM Comput. Commun. Rev. 40(2), 12–20 (2010)

    Article  Google Scholar 

  20. Hu, J., Wang, Z., Gao, H., Stergioulas, L.K.: Robust sliding mode control for discrete stochastic systems with mixed time delays, randomly occurring uncertainties, and randomly occurring nonlinearities. IEEE Trans. Ind. Electron. 59(7), 3008–3015 (2012)

    Article  Google Scholar 

  21. Yang, R., Liu, G.-P., Shi, P., Thomas, C., Basin, M.V.: Predictive output feedback control for networked control systems. IEEE Trans. Ind. Electron. 61(1), 512–520 (2014)

    Article  Google Scholar 

  22. Skormin, V.: Introduction to Process Control. Springer, Cham (2016)

    Book  Google Scholar 

  23. Dolgikh, A., Birnbaum, Z., Skormin, V.: Customized behavioral normalcy profiles for critical infrastructure protection. In: 8th Annual Symposium on Information Assurance (ASIA 2013), Albany, NY, pp. 15–22, June 2013

    Google Scholar 

  24. Liu, G.-P., Xia, Y., Chen, J., Rees, D., Hu, W.: Networked predictive control of systems with random network delays in both forward and feedback channels. IEEE Trans. Ind. Electron. 54(3), 1282–1297 (2007)

    Article  Google Scholar 

  25. Dunning, G.: Controllogix Programmable Automation Controllers with Labs Second Edition. Delmar Cengage Learning (2014)

    Google Scholar 

Download references

Acknowledgement

This research was funded in parts by the Air Force Office of Scientific Research grant “Semantic Approach to Behavior Based IDS and its Applications” (Number FA9550-12-10077) and by the Office of Naval Research grant “Security Approach for Industrial Control Systems” (Number N00014-15-1-2759).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Matthew Davis .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Korkmaz, E., Davis, M., Dolgikh, A., Skormin, V. (2017). Detection and Mitigation of Time Delay Injection Attacks on Industrial Control Systems with PLCs. In: Rak, J., Bay, J., Kotenko, I., Popyack, L., Skormin, V., Szczypiorski, K. (eds) Computer Network Security. MMM-ACNS 2017. Lecture Notes in Computer Science(), vol 10446. Springer, Cham. https://doi.org/10.1007/978-3-319-65127-9_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-65127-9_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-65126-2

  • Online ISBN: 978-3-319-65127-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics