skip to main content
10.1145/2459976.2460022acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Causal event graphs cyber-physical system intrusion detection system

Published: 08 January 2013 Publication History

Abstract

This paper proposes to model the causal relationship between devices in a cyber-physical system using a Bayesian Networks and a new Bayesian Network expansion called causal event graphs. Unique paths through causal event graphs are used to model deterministic signatures which can be used by an intrusion detection system to classify events. A case study is provided to demonstrate the effectiveness of the method for classifying cyber and physical events in an electric transmission system. Bulk electric transmission systems are dynamic cyber-physical systems. Cyber monitoring and control systems are used to remotely operate the power system and to detect and react to physical disturbances. The communication layer associated with this monitoring and control functionality also enables cyber attacks against transmission systems. Existing regulations require utilities to use monitoring techniques such as intrusion detection systems to monitor cyber activity at electronic security perimeter boundaries. Recent attacks demonstrate that monitoring restricted to boundaries is insufficient to detect all attack threats. The methodology described in this paper provides a means to develop a model based defense in depth solution for electric transmission system intrusion detection.

References

[1]
Hurtgen, M. and Maun, J. C. "Advantages of power system state estimation using phasor measurement units," 16th Power Systems Computation Conference. Glasgow, Scotland. July 14--18, 2008.
[2]
Ning, J. "Wide-area monitoring and recognition for power system disturbances using data mining and knowledge discovery theory," Ph.D. Dissertation, Tennessee Technol. Univ., Cookeville, TN, Aug. 2010
[3]
Restrepo, J. "A real-time wide-area control for Mitigating small-signal instability in large electric power systems," Phd thesis, Washington State University, 2005
[4]
Sanguesa, R., Cortès, U. "Learning causal networks from data: a survey and a new algorithm for recovering possibilistic causal networks", A. I. Communications, 10 (1997), pp. 31--36
[5]
Morris, T., Vaughn, R., Dandass, Y. A Retrofit Network Intrusion Detection System for MODBUS RTU and ASCII Industrial Control Systems. Proceedings of the 45th IEEE Hawaii International Conference on System Sciences (HICSS -- 45). January 4--7, 2012. Grand Wailea, Maui.
[6]
Peterson, D.; "Quickdraw: Generating Security Log Events for Legacy SCADA and Control System Devices," Conference For Homeland Security, 2009. CATCH '09. Cybersecurity Applications & Technology, vol., no., pp.227--229, 3--4 March 2009
[7]
Morris, T., Pan, S., Lewis, J., Moorhead, J., Reaves, B., Younan, N., King, R, Freund, M., Madani, V. Cybersecurity Testing of Substation Phasor Measurement Units and Phasor Data Concentrators. The 7th Annual ACM Cyber Security and Information Intelligence Research Workshop (CSIIRW). October 12--14, 2011. Oak Ridge, TN.

Cited By

View all
  • (2025)Causality for Trustworthy Artificial Intelligence: Status, Challenges and PerspectivesACM Computing Surveys10.1145/366549457:6(1-30)Online publication date: 10-Feb-2025
  • (2024)Fault Detection and Isolation of Cyber-Physical System under Cyber-Attack Using Bayesian Network2024 IEEE International Conference on Prognostics and Health Management (ICPHM)10.1109/ICPHM61352.2024.10627322(84-92)Online publication date: 17-Jun-2024
  • (2020)Factor of Security (FoS): Quantifying the Security Effectiveness of Redundant Smart Grid SubsystemsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2020.3009931(1-1)Online publication date: 2020
  • Show More Cited By

Index Terms

  1. Causal event graphs cyber-physical system intrusion detection system

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      CSIIRW '13: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
      January 2013
      282 pages
      ISBN:9781450316873
      DOI:10.1145/2459976

      Sponsors

      • Los Alamos National Labs: Los Alamos National Labs
      • Sandia National Labs: Sandia National Laboratories
      • DOE: Department of Energy
      • Oak Ridge National Laboratory
      • Lawrence Livermore National Lab.: Lawrence Livermore National Laboratory
      • BERKELEYLAB: Lawrence National Berkeley Laboratory
      • Argonne Natl Lab: Argonne National Lab
      • Idaho National Lab.: Idaho National Laboratory
      • Pacific Northwest National Laboratory
      • Nevada National Security Site: Nevada National Security Site

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 08 January 2013

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. cybersecurity
      2. smart grid

      Qualifiers

      • Research-article

      Conference

      CSIIRW '13
      Sponsor:
      • Los Alamos National Labs
      • Sandia National Labs
      • DOE
      • Lawrence Livermore National Lab.
      • BERKELEYLAB
      • Argonne Natl Lab
      • Idaho National Lab.
      • Nevada National Security Site
      CSIIRW '13: Cyber Security and Information Intelligence
      January 8 - 10, 2013
      Tennessee, Oak Ridge, USA

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)12
      • Downloads (Last 6 weeks)2
      Reflects downloads up to 07 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2025)Causality for Trustworthy Artificial Intelligence: Status, Challenges and PerspectivesACM Computing Surveys10.1145/366549457:6(1-30)Online publication date: 10-Feb-2025
      • (2024)Fault Detection and Isolation of Cyber-Physical System under Cyber-Attack Using Bayesian Network2024 IEEE International Conference on Prognostics and Health Management (ICPHM)10.1109/ICPHM61352.2024.10627322(84-92)Online publication date: 17-Jun-2024
      • (2020)Factor of Security (FoS): Quantifying the Security Effectiveness of Redundant Smart Grid SubsystemsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2020.3009931(1-1)Online publication date: 2020
      • (2020)Anti-Honeypot Enabled Optimal Attack Strategy for Industrial Cyber-Physical SystemsIEEE Open Journal of the Computer Society10.1109/OJCS.2020.30308251(250-261)Online publication date: 2020
      • (2019)Feature Extraction Optimization for Bitstream Communication Protocol Format Reverse Analysis2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)10.1109/TrustCom/BigDataSE.2019.00094(662-669)Online publication date: Aug-2019
      • (2019)Bitstream Protocol Classification Mechanism Based on Feature Extraction2019 International Conference on Networking and Network Applications (NaNA)10.1109/NaNA.2019.00050(241-246)Online publication date: Oct-2019
      • (2018)Critical States Distance Filter Based Approach for Detection and Blockage of Cyberattacks in Industrial Control SystemsDiagnosability, Security and Safety of Hybrid Dynamic and Cyber-Physical Systems10.1007/978-3-319-74962-4_5(117-145)Online publication date: 9-Mar-2018
      • (2017)Bayesian Network Models in Cyber Security: A Systematic ReviewSecure IT Systems10.1007/978-3-319-70290-2_7(105-122)Online publication date: 4-Nov-2017
      • (2014)A causal event graph for cyber-power system events using synchrophasor2014 IEEE PES General Meeting | Conference & Exposition10.1109/PESGM.2014.6939285(1-5)Online publication date: Jul-2014
      • (2014)A cyber-physical power system test bed for intrusion detection systems2014 IEEE PES General Meeting | Conference & Exposition10.1109/PESGM.2014.6939262(1-5)Online publication date: Jul-2014

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media