Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/HASE.2016.14guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

An Investigation into the Response of a Water Treatment System to Cyber Attacks

Published: 07 January 2016 Publication History
  • Get Citation Alerts
  • Abstract

    An experimental investigation was undertaken to understand the impact of single-point cyber attacks on a Secure Water Treatment (SWaT) system. Cyber attacks were launched on SWaT through its SCADA server that connects to the Programmable Logic Controllers (PLCs) that in turn are connected to sensors and actuators. Attacks were designed to meet attacker objectives selected from a novel attacker model. Outcome of the experiments led to a better understanding of (a) the propagation of an attack across the system measured in terms of the number of components affected and (b) the behavior of the water treatment process in SWaT in response to the attacks. The observed response to various attacks was then used to propose attack detection mechanisms based on various physical properties measured during the treatment process.

    Cited By

    View all
    • (2024)CIDF:Combined Intrusion Detection Framework in Industrial Control Systems based on Packet Signature and Enhanced FSFDPProceedings of the 15th Asia-Pacific Symposium on Internetware10.1145/3671016.3674812(417-426)Online publication date: 24-Jul-2024
    • (2021)Timely and accurate detection of model deviation in self-adaptive software-intensive systemsProceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering10.1145/3468264.3468548(168-180)Online publication date: 20-Aug-2021
    • (2021)Threat Modelling of Cyber–Physical Systems Using an Applied π-CalculusInternational Journal of Critical Infrastructure Protection10.1016/j.ijcip.2021.10046635:COnline publication date: 1-Dec-2021
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    HASE '16: Proceedings of the 2016 IEEE 17th International Symposium on High Assurance Systems Engineering (HASE)
    January 2016
    300 pages
    ISBN:9781467399135

    Publisher

    IEEE Computer Society

    United States

    Publication History

    Published: 07 January 2016

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 30 Jul 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)CIDF:Combined Intrusion Detection Framework in Industrial Control Systems based on Packet Signature and Enhanced FSFDPProceedings of the 15th Asia-Pacific Symposium on Internetware10.1145/3671016.3674812(417-426)Online publication date: 24-Jul-2024
    • (2021)Timely and accurate detection of model deviation in self-adaptive software-intensive systemsProceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering10.1145/3468264.3468548(168-180)Online publication date: 20-Aug-2021
    • (2021)Threat Modelling of Cyber–Physical Systems Using an Applied π-CalculusInternational Journal of Critical Infrastructure Protection10.1016/j.ijcip.2021.10046635:COnline publication date: 1-Dec-2021
    • (2020)Domain-Based Fuzzing for Supervised Learning of Anomaly Detection in Cyber-Physical SystemsProceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops10.1145/3387940.3391486(237-244)Online publication date: 27-Jun-2020
    • (2020)Evaluating Cascading Impact of Attacks on Resilience of Industrial Control Systems: A Design-Centric Modeling ApproachProceedings of the 6th ACM on Cyber-Physical System Security Workshop10.1145/3384941.3409587(42-53)Online publication date: 6-Oct-2020
    • (2018)TABORProceedings of the 2018 on Asia Conference on Computer and Communications Security10.1145/3196494.3196546(525-536)Online publication date: 29-May-2018
    • (2017)Towards Formal Security Analysis of Industrial Control SystemsProceedings of the 2017 ACM on Asia Conference on Computer and Communications Security10.1145/3052973.3053024(114-126)Online publication date: 2-Apr-2017
    • (2016)Behaviour-Based Attack Detection and Classification in Cyber Physical Systems Using Machine LearningProceedings of the 2nd ACM International Workshop on Cyber-Physical System Security10.1145/2899015.2899016(34-43)Online publication date: 30-May-2016
    • (2016)Model-based security analysis of a water treatment systemProceedings of the 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systems10.1145/2897035.2897041(22-28)Online publication date: 14-May-2016

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media