skip to main content
10.1145/3386164.3387297acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiscsicConference Proceedingsconference-collections
research-article

Framework for Continuous System Security Protection in SWaT

Authors Info & Claims
Published:06 June 2020Publication History

ABSTRACT

Researchers implemented algorithms and attack techniques in programmable logic controllers of cyber physical systems like water treatment testbeds and power testbeds. However, in a reallife water plant such methods are almost impossible to be realised because the public utility company will not risk the damages may cause to the existing system by the software changes as the plant is actively producing water for the consumers. A reduction or stoppage of water due to system modifications will affect the daily life of many people.

Thus, this paper focuses on the architecture framework to generate, run, and test research techniques particularly machine learning invariants in Secure Water Treatment (SWaT) that can be used in a real-life water treatment plant through a non-intrusive method. This framework has been thoroughly tested in SWaT using single or multiple invariants. The software in this framework allows substantial code reuse of data structures and algorithms. The programs to generate, run, and test the invariants are written in Python. The supervised machine learning invariants can detect anomalies without any false alarms for continuous systems in SWaT through physical device attacks and software generated attacks. This framework is also applicable to other cyber physical systems like power and gas testbeds with certain modifications such as the access interfaces and invariant designs. The future direction of this research is to provide a wider coverage protection solution framework to detect anomalies for discrete and continuous systems in cyber physical systems.

References

  1. A. Hanif, M. A. Choudhry, T. Mehmood (2005), A Systematic Approach to Develop PLC Program for Automation of a Backwash Water Treatment Plant, Pakistan Section Multitopic Conference, Karachi, Pakistan.Google ScholarGoogle ScholarCross RefCross Ref
  2. A. B. Sharma, H. Chen, M. Ding, K. Yoshihira and G. Jiang (2013), Fault Detection and Localization in Distributed using Invariant Relationships, 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Budapest, Hungary, 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. D. Hendricks (2015), The Trouble with the Internet of Things, London Datastore, Greater London Authority.Google ScholarGoogle Scholar
  4. D. Shalyga, P. Filonov, and A. Lavrentyev (2018), Anomaly Detection for Water Treatment System based on Neural Network with Automatic Architecture Optimization, https://arxiv.org/pdf/1807.07282, 19 July 2018.Google ScholarGoogle Scholar
  5. E. Brown (2016), Who Needs the Internet of Things?, Linux.com, 13 September 2016.Google ScholarGoogle Scholar
  6. F. Cheng, T. Li, and D. Chana (2017), Bloom Filters and LSTM Networks for Anomaly Detection in Industrial Control Systems, 7th IEEE/IFIP International Conference on Dependable Systems and Networks, pp 1--12, Washington, USA, 2017.Google ScholarGoogle Scholar
  7. iTrust datasets at http://itrust.sutd.edu.sg/dataset/Google ScholarGoogle Scholar
  8. J. Goh, S. Adepu, M. Tan and Z. S. Lee (2017), Anomaly Detection in Cyber Physical Systems Using Recurrent Neural Networks, 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE), Singapore, Singapore, 2017, pp. 140--145.Google ScholarGoogle ScholarCross RefCross Ref
  9. J. Heng and C.H. Yoong (2019), Machine Learning Invariants to Detect Anomalies in Secure Water Treatment, International Conference on Machine Learning and Communications Systems (ICMLCS), January, 2019.Google ScholarGoogle Scholar
  10. Jun Inoue, Yoriyuki Yamagata, Yuqi Chen, Christopher M. Poskitt and Jun Sun (2017), Anomaly Detection for a water treatment system using unsupervised machine learning, IEEE International Conference on Data Mining, 2017.Google ScholarGoogle Scholar
  11. K. Pal, S. Adepu, and J. Goh (2017), Effectiveness of Association Rules Mining for Invariants Generatio in Cyber Physical Systems, 18th IEEE Symposium on High Assurance Systems Engineering, pp 124--127, Singapore, 2017.Google ScholarGoogle Scholar
  12. K. Stouffer, V. Pillitteri, S. Lightman, M. Abrams, and A. Hahn (2015), Guide to Industrial Control System (ICS) Security, National Institute of Standards and Technology, May 2015.Google ScholarGoogle ScholarCross RefCross Ref
  13. R. Mitchell and IR. Chen (2014), A Survey of Intrusion Detection Techniques for Cyber-Physical Systems, ACM Computing Surveys, Vol. 46, No. 4, March 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. S. Adepu and A. Mathur (2016), Generalized attacker and attack modes for Cyber Physical System, IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), June 2016.Google ScholarGoogle ScholarCross RefCross Ref
  15. S. Adepu and A. Mathur (2018), Distributed Attack Detection in a Water Treatment Plant: Method and Case Study, IEEE Transactions on Dependable and Secure Computing, September 2018.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. S. Adepu and A. Mathur (2016), Distributed Detection of a Single-stage Multipoint Cyber Attacks in a Water Treatment Plant, Asia CCS '16, 11th ACM on Asia Conference on Computer and Communications Security, June 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Framework for Continuous System Security Protection in SWaT

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            ISCSIC 2019: Proceedings of the 2019 3rd International Symposium on Computer Science and Intelligent Control
            September 2019
            397 pages
            ISBN:9781450376617
            DOI:10.1145/3386164

            Copyright © 2019 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 6 June 2020

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed limited

            Acceptance Rates

            ISCSIC 2019 Paper Acceptance Rate77of152submissions,51%Overall Acceptance Rate192of401submissions,48%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader