Cargando…

Controller Cyber-Attack Detection and Isolation †

This article deals with the cyber security of industrial control systems. Methods for detecting and isolating process faults and cyber-attacks, consisting of elementary actions named “cybernetic faults” that penetrate the control system and destructively affect its operation, are analysed. FDI fault...

Descripción completa

Detalles Bibliográficos
Autores principales: Sztyber-Betley, Anna, Syfert, Michał, Kościelny, Jan Maciej, Górecka, Zuzanna
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10007557/
https://www.ncbi.nlm.nih.gov/pubmed/36904980
http://dx.doi.org/10.3390/s23052778
_version_ 1784905551496347648
author Sztyber-Betley, Anna
Syfert, Michał
Kościelny, Jan Maciej
Górecka, Zuzanna
author_facet Sztyber-Betley, Anna
Syfert, Michał
Kościelny, Jan Maciej
Górecka, Zuzanna
author_sort Sztyber-Betley, Anna
collection PubMed
description This article deals with the cyber security of industrial control systems. Methods for detecting and isolating process faults and cyber-attacks, consisting of elementary actions named “cybernetic faults” that penetrate the control system and destructively affect its operation, are analysed. FDI fault detection and isolation methods and the assessment of control loop performance methods developed in the automation community are used to diagnose these anomalies. An integration of both approaches is proposed, which consists of checking the correct functioning of the control algorithm based on its model and tracking changes in the values of selected control loop performance indicators to supervise the control circuit. A binary diagnostic matrix was used to isolate anomalies. The presented approach requires only standard operating data (process variable ([Formula: see text]), setpoint ([Formula: see text]), and control signal ([Formula: see text]). The proposed concept was tested using the example of a control system for superheaters in a steam line of a power unit boiler. Cyber-attacks targeting other parts of the process were also included in the study to test the proposed approach’s applicability, effectiveness, and limitations and identify further research directions.
format Online
Article
Text
id pubmed-10007557
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-100075572023-03-12 Controller Cyber-Attack Detection and Isolation † Sztyber-Betley, Anna Syfert, Michał Kościelny, Jan Maciej Górecka, Zuzanna Sensors (Basel) Article This article deals with the cyber security of industrial control systems. Methods for detecting and isolating process faults and cyber-attacks, consisting of elementary actions named “cybernetic faults” that penetrate the control system and destructively affect its operation, are analysed. FDI fault detection and isolation methods and the assessment of control loop performance methods developed in the automation community are used to diagnose these anomalies. An integration of both approaches is proposed, which consists of checking the correct functioning of the control algorithm based on its model and tracking changes in the values of selected control loop performance indicators to supervise the control circuit. A binary diagnostic matrix was used to isolate anomalies. The presented approach requires only standard operating data (process variable ([Formula: see text]), setpoint ([Formula: see text]), and control signal ([Formula: see text]). The proposed concept was tested using the example of a control system for superheaters in a steam line of a power unit boiler. Cyber-attacks targeting other parts of the process were also included in the study to test the proposed approach’s applicability, effectiveness, and limitations and identify further research directions. MDPI 2023-03-03 /pmc/articles/PMC10007557/ /pubmed/36904980 http://dx.doi.org/10.3390/s23052778 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Sztyber-Betley, Anna
Syfert, Michał
Kościelny, Jan Maciej
Górecka, Zuzanna
Controller Cyber-Attack Detection and Isolation †
title Controller Cyber-Attack Detection and Isolation †
title_full Controller Cyber-Attack Detection and Isolation †
title_fullStr Controller Cyber-Attack Detection and Isolation †
title_full_unstemmed Controller Cyber-Attack Detection and Isolation †
title_short Controller Cyber-Attack Detection and Isolation †
title_sort controller cyber-attack detection and isolation †
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10007557/
https://www.ncbi.nlm.nih.gov/pubmed/36904980
http://dx.doi.org/10.3390/s23052778
work_keys_str_mv AT sztyberbetleyanna controllercyberattackdetectionandisolation
AT syfertmichał controllercyberattackdetectionandisolation
AT koscielnyjanmaciej controllercyberattackdetectionandisolation
AT goreckazuzanna controllercyberattackdetectionandisolation