Aerospace and Electronic Systems Magazine May 2017 - 42

Security of SCADA Systems against Cyber-Physical Attacks
count for the interaction between the cyber layer and the physical
world.
The data-based approach, which does not require the physical
and mathematical model of SCADA systems, consists of analyzing hidden patterns in observed data. The detection and isolation
tasks can be realized by one-class classification [87], [91] and
multiclass classification techniques, respectively. However, the
model-based approach consists of developing the system and attack models. The decision-making process is based on the comparison between system observations and model outputs. This
problem can be solved by exploiting classical results in fault diagnosis. FDI techniques have been revised to adapt to the online
monitoring of safety-critical infrastructures against cyber-physical attacks [29], [38], [39], [112].
It is natural to consider a semiparametric approach to cyber-
physical attack detection that combines the advantages of each
method (i.e., model based or parametric and data based or nonparametric) to obviate their drawbacks. Mathematically, a semiparametric model consists of three components: a parametric model,
a nonparametric model, and random noises. Then, the semiparametric model of the system under both normal operation and
abnormal behavior is specified. This semiparametric approach is
expected to offer better performance than data-based and modelbased approaches.

[9]

[10]

[11]

[12]

[13]

[14]

[15]

[16]

ACKNOWLEDGMENT
This work received financial support from the French National
Research Agency (ANR) and technical collaboration with Suez
Environnement (Ondeo Systems SAS) through project SCALA
(Surveillance Continue d'Activité et Localisation d'Agression).

REFERENCES
[1]
[2]
[3]

[4]
[5]

[6]

[7]

[8]

42

[17]

[18]

[19]

Stouffer, K., Falco, J., and Scarfone, K. Guide to industrial control
systems (ICS) security. NIST Special Publication, 800-882, 2011.
Krutz, R. Securing SCADA Systems. Wiley, 2006.
Fovino, I. N., Coletta, A., and Masera, M. Taxonomy of security solutions for the SCADA sector. Joint Research Centre of the European
Commission, 2010.
Galloway, B., and Hancke, G. P. Introduction to industrial control networks.
IEEE Communications Surveys & Tutorials, Vol. 15, 2 (2013), 860-880.
Cádenas, A. A., Amin, S., Lin, Z.-S., Huang, Y.-L., Huang, C.-Y., and
Sastry, S. Attacks against process control systems: Risk assessment,
detection, and response. In Proceedings of the 6th ACM Symposium
on Information, Computer and Communications Security, 2011, 355-
366.
Kwon, C., Liu, W., and Hwang, I. Security analysis for cyber-physical systems against stealthy deception attacks. In Proceedings of the
American Control Conference (ACC), IEEE, 2013, 3344-3349.
Pasqualetti, F., Dorfler, F., and Bullo, F. Attack detection and identification in cyber-physical systems. IEEE Transactions on Automatic
Control, Vol. 58, 11 (2013), 2715-2729.
Teixeira, A., Shames, I., Sandberg, H., and Johansson, K. H. J. A secure control framework for resource-limited adversaries. Automatica,
2014.

[20]
[21]
[22]

[23]

[24]

[25]

[26]

IEEE A&E SYSTEMS MAGAZINE

Mo, Y., Chabukswar, R., and Sinopoli, B. Detecting integrity attacks
on SCADA systems. IEEE Transactions on Control Systems Technology, 23, 4 (2014), 1396-1407.
Mo, Y., and Sinopoli, B. False data injection attacks in control systems. In Preprints of the 1st Workshop on Secure Control Systems,
2010.
Teixeira, A., Shames, I., Sandberg, H., and Johansson, K. H. Revealing stealthy attacks in control systems. In Proceedings of the 50th Annual Allerton Conference on Communication, Control, and Computing, IEEE, 2012, 1806-1813.
Smith, R. S. A decoupled feedback structure for covertly appropriating networked control systems. In Proceedings of the IFAC World
Congress, 2011, 90-95.
Andersson, G., Esfahani, P. M., Vrakopoulou, M., Margellos, K., Lygeros, J., Teixeira, A., Dá, G., Sandberg, H., and Johansson, K. H.
Cyber-security of SCADA systems. In Proceedings of IEEE Innovative Smart Grid Technologies (ISGT), 2012, 1-2.
Sridhar, S., Hahn, A., and Govindarasu, M. Cyber-physical system
security for the electric power grid. Proceedings of the IEEE, Vol. 100,
1 (2012), 210-224.
Sridhar, S., and Manimaran, G. Data integrity attacks and their impacts on SCADA control system. In Proceedings of the IEEE Power
and Energy Society General Meeting, 2010, 1-6.
Esfahani, P. M., Vrakopoulou, M., Margellos, K., Lygeros, J., and Andersson, G. A robust policy for automatic generation control cyber
attack in two area power network. In Proceedings of the 49th IEEE
Conference on Decision and Control (CDC), IEEE, 2010, 5973-5978.
Mohsenian-Rad, A.-H., and Leon-Garcia, A. Distributed Internetbased load altering attacks against smart power grids. IEEE Transactions on Smart Grid, Vol. 2, 4 (2011), 667-674.
Yuan, Y., Li, Z., and Ren, K. Modeling load redistribution attacks in
power systems. IEEE Transactions on Smart Grid, Vol. 2, 2 (2011),
382-390.
Teixeira, A., Sandberg, H., Dan, G., and Johansson, K. H. Optimal
power flow: Closing the loop over corrupted data. In Proceedings of
the American Control Conference (ACC), IEEE, 2012, 3534-3540.
Schweppe, F. C., and Handschin, E. J. Static state estimation in electric
power systems. Proceedings of the IEEE, Vol. 62, 7 (1974), 972-982.
Abur, A., and Exposito, A. G. Power System State Estimation: Theory
and Implementation. CRC Press, 2004.
Liu, Y., Ning, P., and Reiter, M. False data injection attacks against
state estimation in electric power grids. ACM Transactions on Information and System Security (TISSEC), Vol. 14, 1 (2011), 13.
Teixeira, A., Amin, S., Sandberg, H., Johansson, K., and Sastry, S.
Cyber security analysis of state estimators in electric power systems.
In Proceedings of the 2010 49th IEEE Conference on Decision and
Control (CDC), 2010, 5991-5998.
Rahman, M. A., and Mohsenian-Rad, H. False data injection attacks
with incomplete information against smart power grids. In Proceedings of the IEEE Global Communications Conference (GLOBECOM),
2012, 3153-3158.
Xie, L., Mo, Y., and Sinopoli, B. False data injection attacks in electricity markets. In Proceedings of the 1st IEEE International Conference
on Smart Grid Communications (SmartGridComm), 2010, 226-231.
Xie, L., Mo, Y., and Sinopoli, B. Integrity data attacks in power market
operations. IEEE Transactions on Smart Grid, Vol. 2, 4 (2011), 659-666.

MAY 2017



Table of Contents for the Digital Edition of Aerospace and Electronic Systems Magazine May 2017

No label
Aerospace and Electronic Systems Magazine May 2017 - No label
Aerospace and Electronic Systems Magazine May 2017 - Cover2
Aerospace and Electronic Systems Magazine May 2017 - 1
Aerospace and Electronic Systems Magazine May 2017 - 2
Aerospace and Electronic Systems Magazine May 2017 - 3
Aerospace and Electronic Systems Magazine May 2017 - 4
Aerospace and Electronic Systems Magazine May 2017 - 5
Aerospace and Electronic Systems Magazine May 2017 - 6
Aerospace and Electronic Systems Magazine May 2017 - 7
Aerospace and Electronic Systems Magazine May 2017 - 8
Aerospace and Electronic Systems Magazine May 2017 - 9
Aerospace and Electronic Systems Magazine May 2017 - 10
Aerospace and Electronic Systems Magazine May 2017 - 11
Aerospace and Electronic Systems Magazine May 2017 - 12
Aerospace and Electronic Systems Magazine May 2017 - 13
Aerospace and Electronic Systems Magazine May 2017 - 14
Aerospace and Electronic Systems Magazine May 2017 - 15
Aerospace and Electronic Systems Magazine May 2017 - 16
Aerospace and Electronic Systems Magazine May 2017 - 17
Aerospace and Electronic Systems Magazine May 2017 - 18
Aerospace and Electronic Systems Magazine May 2017 - 19
Aerospace and Electronic Systems Magazine May 2017 - 20
Aerospace and Electronic Systems Magazine May 2017 - 21
Aerospace and Electronic Systems Magazine May 2017 - 22
Aerospace and Electronic Systems Magazine May 2017 - 23
Aerospace and Electronic Systems Magazine May 2017 - 24
Aerospace and Electronic Systems Magazine May 2017 - 25
Aerospace and Electronic Systems Magazine May 2017 - 26
Aerospace and Electronic Systems Magazine May 2017 - 27
Aerospace and Electronic Systems Magazine May 2017 - 28
Aerospace and Electronic Systems Magazine May 2017 - 29
Aerospace and Electronic Systems Magazine May 2017 - 30
Aerospace and Electronic Systems Magazine May 2017 - 31
Aerospace and Electronic Systems Magazine May 2017 - 32
Aerospace and Electronic Systems Magazine May 2017 - 33
Aerospace and Electronic Systems Magazine May 2017 - 34
Aerospace and Electronic Systems Magazine May 2017 - 35
Aerospace and Electronic Systems Magazine May 2017 - 36
Aerospace and Electronic Systems Magazine May 2017 - 37
Aerospace and Electronic Systems Magazine May 2017 - 38
Aerospace and Electronic Systems Magazine May 2017 - 39
Aerospace and Electronic Systems Magazine May 2017 - 40
Aerospace and Electronic Systems Magazine May 2017 - 41
Aerospace and Electronic Systems Magazine May 2017 - 42
Aerospace and Electronic Systems Magazine May 2017 - 43
Aerospace and Electronic Systems Magazine May 2017 - 44
Aerospace and Electronic Systems Magazine May 2017 - 45
Aerospace and Electronic Systems Magazine May 2017 - 46
Aerospace and Electronic Systems Magazine May 2017 - 47
Aerospace and Electronic Systems Magazine May 2017 - 48
Aerospace and Electronic Systems Magazine May 2017 - 49
Aerospace and Electronic Systems Magazine May 2017 - 50
Aerospace and Electronic Systems Magazine May 2017 - 51
Aerospace and Electronic Systems Magazine May 2017 - 52
Aerospace and Electronic Systems Magazine May 2017 - 53
Aerospace and Electronic Systems Magazine May 2017 - 54
Aerospace and Electronic Systems Magazine May 2017 - 55
Aerospace and Electronic Systems Magazine May 2017 - 56
Aerospace and Electronic Systems Magazine May 2017 - 57
Aerospace and Electronic Systems Magazine May 2017 - 58
Aerospace and Electronic Systems Magazine May 2017 - 59
Aerospace and Electronic Systems Magazine May 2017 - 60
Aerospace and Electronic Systems Magazine May 2017 - 61
Aerospace and Electronic Systems Magazine May 2017 - 62
Aerospace and Electronic Systems Magazine May 2017 - 63
Aerospace and Electronic Systems Magazine May 2017 - 64
Aerospace and Electronic Systems Magazine May 2017 - Cover3
Aerospace and Electronic Systems Magazine May 2017 - Cover4
http://www.brightcopy.net/allen/aesm/34-2s
http://www.brightcopy.net/allen/aesm/34-2
http://www.brightcopy.net/allen/aesm/34-1
http://www.brightcopy.net/allen/aesm/33-12
http://www.brightcopy.net/allen/aesm/33-11
http://www.brightcopy.net/allen/aesm/33-10
http://www.brightcopy.net/allen/aesm/33-09
http://www.brightcopy.net/allen/aesm/33-8
http://www.brightcopy.net/allen/aesm/33-7
http://www.brightcopy.net/allen/aesm/33-5
http://www.brightcopy.net/allen/aesm/33-4
http://www.brightcopy.net/allen/aesm/33-3
http://www.brightcopy.net/allen/aesm/33-2
http://www.brightcopy.net/allen/aesm/33-1
http://www.brightcopy.net/allen/aesm/32-10
http://www.brightcopy.net/allen/aesm/32-12
http://www.brightcopy.net/allen/aesm/32-9
http://www.brightcopy.net/allen/aesm/32-11
http://www.brightcopy.net/allen/aesm/32-8
http://www.brightcopy.net/allen/aesm/32-7s
http://www.brightcopy.net/allen/aesm/32-7
http://www.brightcopy.net/allen/aesm/32-6
http://www.brightcopy.net/allen/aesm/32-5
http://www.brightcopy.net/allen/aesm/32-4
http://www.brightcopy.net/allen/aesm/32-3
http://www.brightcopy.net/allen/aesm/32-2
http://www.brightcopy.net/allen/aesm/32-1
http://www.brightcopy.net/allen/aesm/31-12
http://www.brightcopy.net/allen/aesm/31-11s
http://www.brightcopy.net/allen/aesm/31-11
http://www.brightcopy.net/allen/aesm/31-10
http://www.brightcopy.net/allen/aesm/31-9
http://www.brightcopy.net/allen/aesm/31-8
http://www.brightcopy.net/allen/aesm/31-7
https://www.nxtbookmedia.com