Aerospace and Electronic Systems Magazine May 2017 - 36

Security of SCADA Systems against Cyber-Physical Attacks

Figure 3.

Attack detection and isolation methods.

method to reveal this attack by triggering data losses on control
signals.
Covert attack: Covert attacks on NCSs have been investigated in [12]. The strategy consists of coordinating control
signals and sensor measurements into a concerted malicious
attack. This attack is designed as follows. First, the state attack vector can be chosen freely based on malicious targets
and available resources. Second, the sensor attack vector is designed in such a way that it can compensate for the effects of the
state attack vector on the sensor measurements. The covert attack strategy can be considered the worst-case attack because of
its ability to bypass traditional anomaly detectors. However, the
covert attack needs to compromise numerous sensors to assure
its stealth. Therefore, SCADA system defenders can obviate a
covert attack by protecting some critical sensors or purchasing
new secure sensors [38].
Surge attack, bias attack, and geometric attack: While studying the security of process control systems against cyber attacks,
the authors in [5] designed three types of stealthy attacks: the surge
attack, the bias attack, and the geometric attack. The surge attack
seeks to maximize damage as soon as possible, while the bias attack tries to modify the system by small perturbations over a long
period. Finally, the geometric attack integrates the surge attack and
the bias attack by shifting the system behavior gradually at the beginning and maximizing the damage at the end.

ATTACK DETECTION AND ISOLATION METHODS
As shown in Figure 3, attack detection and isolation methods can
be broadly classified into three main categories: information security, data-based, and model-based approaches.
36

INFORMATION SECURITY APPROACH
The information security approach focuses mainly on ensuring
the confidentiality, integrity, and availability of information [75].
Data confidentiality is related to nondisclosure of information to
unauthorized parties. The confidentiality of data is generally performed by authentication or access control methods. In contrast,
the integrity of data refers to the trustworthiness of data (i.e., there
is no unauthorized modification of data content or properties).
Data integrity is generally realized by both prevention mechanisms (e.g., encryption algorithms, authentication, and/or access
control) and detection mechanisms (e.g., integrity checking methods). The availability of data is concerned with the utilization of
information or resources when needed. An example of unavailability of data is DoS attacks.
Guidelines and methods [1], [2], [76], [77] have been proposed for improving the security of SCADA systems against cyber-physical attacks. Some examples include 1) designing specific
firewalls between the process network and the corporate network
or between MTUs and RTUs or PLCs, 2) using demilitarized zones
to isolate the process network from the corporate network, 3) exploiting virtual private networks (VPNs) for transmitting data over
public networks, and 4) developing IDSs for SCADA systems
[78]. In addition, sequential methods have been proposed in [79]
and [80] for the monitoring of network traffic in computer systems
against DoS attacks.
It is believed that the appropriate utilization of information security measures may help in reducing the number of
cyber incidents, as well as mitigating their consequences.
However, they are mainly applicable for protecting SCADA
systems from cyber attacks on the control center (i.e., attack
points A1-A3 in Figure 2) and on the communication layer

IEEE A&E SYSTEMS MAGAZINE

MAY 2017



Table of Contents for the Digital Edition of Aerospace and Electronic Systems Magazine May 2017

No label
Aerospace and Electronic Systems Magazine May 2017 - No label
Aerospace and Electronic Systems Magazine May 2017 - Cover2
Aerospace and Electronic Systems Magazine May 2017 - 1
Aerospace and Electronic Systems Magazine May 2017 - 2
Aerospace and Electronic Systems Magazine May 2017 - 3
Aerospace and Electronic Systems Magazine May 2017 - 4
Aerospace and Electronic Systems Magazine May 2017 - 5
Aerospace and Electronic Systems Magazine May 2017 - 6
Aerospace and Electronic Systems Magazine May 2017 - 7
Aerospace and Electronic Systems Magazine May 2017 - 8
Aerospace and Electronic Systems Magazine May 2017 - 9
Aerospace and Electronic Systems Magazine May 2017 - 10
Aerospace and Electronic Systems Magazine May 2017 - 11
Aerospace and Electronic Systems Magazine May 2017 - 12
Aerospace and Electronic Systems Magazine May 2017 - 13
Aerospace and Electronic Systems Magazine May 2017 - 14
Aerospace and Electronic Systems Magazine May 2017 - 15
Aerospace and Electronic Systems Magazine May 2017 - 16
Aerospace and Electronic Systems Magazine May 2017 - 17
Aerospace and Electronic Systems Magazine May 2017 - 18
Aerospace and Electronic Systems Magazine May 2017 - 19
Aerospace and Electronic Systems Magazine May 2017 - 20
Aerospace and Electronic Systems Magazine May 2017 - 21
Aerospace and Electronic Systems Magazine May 2017 - 22
Aerospace and Electronic Systems Magazine May 2017 - 23
Aerospace and Electronic Systems Magazine May 2017 - 24
Aerospace and Electronic Systems Magazine May 2017 - 25
Aerospace and Electronic Systems Magazine May 2017 - 26
Aerospace and Electronic Systems Magazine May 2017 - 27
Aerospace and Electronic Systems Magazine May 2017 - 28
Aerospace and Electronic Systems Magazine May 2017 - 29
Aerospace and Electronic Systems Magazine May 2017 - 30
Aerospace and Electronic Systems Magazine May 2017 - 31
Aerospace and Electronic Systems Magazine May 2017 - 32
Aerospace and Electronic Systems Magazine May 2017 - 33
Aerospace and Electronic Systems Magazine May 2017 - 34
Aerospace and Electronic Systems Magazine May 2017 - 35
Aerospace and Electronic Systems Magazine May 2017 - 36
Aerospace and Electronic Systems Magazine May 2017 - 37
Aerospace and Electronic Systems Magazine May 2017 - 38
Aerospace and Electronic Systems Magazine May 2017 - 39
Aerospace and Electronic Systems Magazine May 2017 - 40
Aerospace and Electronic Systems Magazine May 2017 - 41
Aerospace and Electronic Systems Magazine May 2017 - 42
Aerospace and Electronic Systems Magazine May 2017 - 43
Aerospace and Electronic Systems Magazine May 2017 - 44
Aerospace and Electronic Systems Magazine May 2017 - 45
Aerospace and Electronic Systems Magazine May 2017 - 46
Aerospace and Electronic Systems Magazine May 2017 - 47
Aerospace and Electronic Systems Magazine May 2017 - 48
Aerospace and Electronic Systems Magazine May 2017 - 49
Aerospace and Electronic Systems Magazine May 2017 - 50
Aerospace and Electronic Systems Magazine May 2017 - 51
Aerospace and Electronic Systems Magazine May 2017 - 52
Aerospace and Electronic Systems Magazine May 2017 - 53
Aerospace and Electronic Systems Magazine May 2017 - 54
Aerospace and Electronic Systems Magazine May 2017 - 55
Aerospace and Electronic Systems Magazine May 2017 - 56
Aerospace and Electronic Systems Magazine May 2017 - 57
Aerospace and Electronic Systems Magazine May 2017 - 58
Aerospace and Electronic Systems Magazine May 2017 - 59
Aerospace and Electronic Systems Magazine May 2017 - 60
Aerospace and Electronic Systems Magazine May 2017 - 61
Aerospace and Electronic Systems Magazine May 2017 - 62
Aerospace and Electronic Systems Magazine May 2017 - 63
Aerospace and Electronic Systems Magazine May 2017 - 64
Aerospace and Electronic Systems Magazine May 2017 - Cover3
Aerospace and Electronic Systems Magazine May 2017 - Cover4
http://www.brightcopy.net/allen/aesm/34-2s
http://www.brightcopy.net/allen/aesm/34-2
http://www.brightcopy.net/allen/aesm/34-1
http://www.brightcopy.net/allen/aesm/33-12
http://www.brightcopy.net/allen/aesm/33-11
http://www.brightcopy.net/allen/aesm/33-10
http://www.brightcopy.net/allen/aesm/33-09
http://www.brightcopy.net/allen/aesm/33-8
http://www.brightcopy.net/allen/aesm/33-7
http://www.brightcopy.net/allen/aesm/33-5
http://www.brightcopy.net/allen/aesm/33-4
http://www.brightcopy.net/allen/aesm/33-3
http://www.brightcopy.net/allen/aesm/33-2
http://www.brightcopy.net/allen/aesm/33-1
http://www.brightcopy.net/allen/aesm/32-10
http://www.brightcopy.net/allen/aesm/32-12
http://www.brightcopy.net/allen/aesm/32-9
http://www.brightcopy.net/allen/aesm/32-11
http://www.brightcopy.net/allen/aesm/32-8
http://www.brightcopy.net/allen/aesm/32-7s
http://www.brightcopy.net/allen/aesm/32-7
http://www.brightcopy.net/allen/aesm/32-6
http://www.brightcopy.net/allen/aesm/32-5
http://www.brightcopy.net/allen/aesm/32-4
http://www.brightcopy.net/allen/aesm/32-3
http://www.brightcopy.net/allen/aesm/32-2
http://www.brightcopy.net/allen/aesm/32-1
http://www.brightcopy.net/allen/aesm/31-12
http://www.brightcopy.net/allen/aesm/31-11s
http://www.brightcopy.net/allen/aesm/31-11
http://www.brightcopy.net/allen/aesm/31-10
http://www.brightcopy.net/allen/aesm/31-9
http://www.brightcopy.net/allen/aesm/31-8
http://www.brightcopy.net/allen/aesm/31-7
https://www.nxtbookmedia.com