skip to main content
10.1145/2523514.2523595acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
invited-talk

Security and protection of SCADA: a bigdata algorithmic approach

Published: 26 November 2013 Publication History

Abstract

Due to technological advances, it has been a common practice for quite some time to use embedded computers for the monitoring and control of physical processes/plants. These are essentially networked computer-based systems consisting of application-specific control-processing systems, actuators, sensors etc., used for digitally controlling physical systems (often in a federated manner) within a defined geographical location such as power plants, chemical plants etc. Different terminologies like distributed control systems (DCS), cyber-physical systems (CPS), supervisory control and data acquisition systems(SCADA) etc., are used to denoting similar usage. Technology has further made it possible to federate/ integrate heterogeneous (even built by different manufacturers) systems. While such capabilities have provided the needed flexibility and user convenience, it has also created challenges for system designers not only from the correctness point of view but also from the point of view of security and protection of the underlying physical plants. With the arrival of complex malwares, it has become very challenging to secure network and information systems from intruders and protect the systems from attackers. Recently, complex malwares like Stuxnet, Flame etc., have specifically targeted SCADA of public infrastructures like power grids/plants, and thus, bringing to the forefront the challenges in securing and protecting SCADA. The above mentioned malwares are horrendously complex and hence, need a wholesome approach for detection and protection. In these scenarios, apart from the classical IT security, there is a need to look at other plausible new attacks considering the domain of the physical systems in conjunction with the capabilities of the embedded computers, and arrive at methods of protection and risk evaluation.
In this paper, we shall describe an algorithmic data-intensive approach (referred to as Bigdata approach) for protecting and securing SCADA from malware attacks. The approach is based on using the data used by control-system designers for making the system robust, and then reducing the security and protection problem of control systems or SCADA, in general, to the problem of monitoring distributed streaming data. We further show that the method is algorithmically scalable and argue that such algorithmic Bigdata approaches enable securing and protecting of IT controlled public infrastructures.

References

[1]
Internet Security Threat Report, Symantec Ltd, Vol. 18, 2013, www.symantec.com.
[2]
Julian Rrushi. Composite Intrusion Detection in Process Control Networks. PhD thesis, Universita Degli Studi Di Milano, 2009.
[3]
Izchak Sharman and Assaf Schuster, A Geometric Approach to Monitoring Threshold Functions over Distributed Streams, ACM TODS, Vol 32, Nov. 2007, pp. 23:1--23:29.
[4]
Y. Mo., T. Hyun-Jin Kim, K. Branick, D. Dickinson, H. Lee, A. Perrig and B. Sinopoli, Cyber-Physical Security of a Smart-Grid Infrastructure, Proc. IEEE 2011.
[5]
Alvaro A. Cárdenasx, Saurabh Aminz, Zong-Syun Liny, Yu-Lun Huangy, Chi-Yen Huangy and Shankar Sastryz, Attacks Against Process Control Systems: Risk Assessment, Detection, and Response, ASIACCS 2011, March 22--24, Hongkong, pp. 355--366.
[6]
R. K. Shyamasundar, Security and Protection of SCADA using an algorithmic data-intensive approach, manuscript, TIFR, 2013.
[7]
Eric Filiol, Computer viruses: from theory to applications", First edition, IRIS International Series, Springer Verlag, france, ISBN 2-287-23939-1, June 2005
[8]
Eric Filiol, Malicious Mathematics and Malicious Cryptology, Chapter in the book Cryptography and Security in Computing, by Jaydip Sen Ed., Intech Publishing, ISBN 978-953-51-0179-6, February 2012.
[9]
Mihai Christodorescu, and Somesh Jha, Testing malware detectors, ISSTA '04: Proceedings of the 2004 ACM SIGSOFT international symposium on Software testing and analysis, 2004, pp. 34--44.
[10]
Mihai Christodorescu, Somesh Jha and Christopher Kruegel, Mining specifications of malicious behavior, ESEC/SIGSOFT FSE, 2007, pp. 5--14
[11]
Mihai Christodorescu, Somesh Jha, Sanjit A. Seshia, Dawn Xiaodong Song, and Randal E. Bryant, Semantics-Aware Malware Detection, IEEE Symp. On Security and Privacy, 2005, pp. 32--46
[12]
R. Sekar, M. Bendre, D. Dhurjati, and P. Bollineni. A fast automaton-based method for detecting anomalous program behaviors. In IEEE Symposium on Security and Privacy, pp. 144--155, 2001.
[13]
N. V. Narendra Kumar, Harshit Shah, R. K. Shyamasundar. Can We Certify Systems for Freedom From Malware, Int. Conference on Software Engineering (ICSE) 2010, New and Emergent Research, Cape Town, South Africa, pp. 175--178
[14]
N. V. Narendra Kumar, Harshit Shah, R. K. Shyamasundar, Benchmarking Program Behaviour for Detecting Malware Infection, European Institute of Anti Virus Researchers (EICAR) Conference 2010. May 2010, pp. 69--91
[15]
Narendra Kumar, RK Shyamasundar, G Sebastian, Saurav Yashashwee, Algorithmic Detection of Malware via Semantic Signatures, EICAR Conf., May 2011, Krems, Austria, pp. 49--76.
[16]
Zdeněk Breitenbacher, AVG Technologies, July 2010, private e-mail communication.
[17]
W32 Dossier on Stuxnet, www.symantec.com, 2013.
[18]
Richard A. Clarke, Rober K. Knake, Cyber War: The next threat to National Security and what to do about it, www.amazon.com, 2012.
[19]
John Hopcroft and Ravi Kannan, "Mathematics for Modern Computing", Forthcoming book, 2013.
[20]
Michele Basseville, Statistical Methods for Change Detection, Control Systems, Robotics and Automation, Vol. XVI, in Encyclopedia of Life Support Systems (EOLSS), 2013, forthcoming.

Cited By

View all
  • (2023)SCADA vulnerabilities and attacksComputers and Security10.1016/j.cose.2022.103028125:COnline publication date: 1-Feb-2023
  • (2016)Review of cybersecurity issues in industrial critical infrastructure: manufacturing in perspectiveJournal of Cyber Security Technology10.1080/23742917.2016.12522111:1(32-74)Online publication date: 7-Nov-2016
  • (2015)New Security Development and Trends to Secure the SCADA Sensors Automated Transmission during Critical SessionsSymmetry10.3390/sym70419457:4(1945-1980)Online publication date: 23-Oct-2015
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
SIN '13: Proceedings of the 6th International Conference on Security of Information and Networks
November 2013
483 pages
ISBN:9781450324984
DOI:10.1145/2523514
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

  • Macquarie U., Austarlia
  • MNIT: Malaviya National Institute of Technology
  • Aksaray Univ.: Aksaray University
  • SFedU: Southern Federal University

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 November 2013

Check for updates

Author Tags

  1. SCADA
  2. control systems
  3. malware protection
  4. monitoring
  5. monitoring distributed streams
  6. protection
  7. security of network and information systems

Qualifiers

  • Invited-talk

Conference

SIN '13
Sponsor:
  • MNIT
  • Aksaray Univ.
  • SFedU

Acceptance Rates

Overall Acceptance Rate 102 of 289 submissions, 35%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 28 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)SCADA vulnerabilities and attacksComputers and Security10.1016/j.cose.2022.103028125:COnline publication date: 1-Feb-2023
  • (2016)Review of cybersecurity issues in industrial critical infrastructure: manufacturing in perspectiveJournal of Cyber Security Technology10.1080/23742917.2016.12522111:1(32-74)Online publication date: 7-Nov-2016
  • (2015)New Security Development and Trends to Secure the SCADA Sensors Automated Transmission during Critical SessionsSymmetry10.3390/sym70419457:4(1945-1980)Online publication date: 23-Oct-2015
  • (2015)Online Monitoring of a Cyber Physical System Against Control Aware Cyber AttacksProcedia Computer Science10.1016/j.procs.2015.10.07970(238-244)Online publication date: 2015
  • (2015)A survey of cyber security management in industrial control systemsInternational Journal of Critical Infrastructure Protection10.1016/j.ijcip.2015.02.0029:C(52-80)Online publication date: 1-Jun-2015
  • (2015)Analysis of a multistage attack embedded in a video fileInformation Systems Frontiers10.1007/s10796-015-9570-517:5(1029-1037)Online publication date: 1-Oct-2015

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media