Cargando…
Controller Cyber-Attack Detection and Isolation †
This article deals with the cyber security of industrial control systems. Methods for detecting and isolating process faults and cyber-attacks, consisting of elementary actions named “cybernetic faults” that penetrate the control system and destructively affect its operation, are analysed. FDI fault...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10007557/ https://www.ncbi.nlm.nih.gov/pubmed/36904980 http://dx.doi.org/10.3390/s23052778 |
_version_ | 1784905551496347648 |
---|---|
author | Sztyber-Betley, Anna Syfert, Michał Kościelny, Jan Maciej Górecka, Zuzanna |
author_facet | Sztyber-Betley, Anna Syfert, Michał Kościelny, Jan Maciej Górecka, Zuzanna |
author_sort | Sztyber-Betley, Anna |
collection | PubMed |
description | This article deals with the cyber security of industrial control systems. Methods for detecting and isolating process faults and cyber-attacks, consisting of elementary actions named “cybernetic faults” that penetrate the control system and destructively affect its operation, are analysed. FDI fault detection and isolation methods and the assessment of control loop performance methods developed in the automation community are used to diagnose these anomalies. An integration of both approaches is proposed, which consists of checking the correct functioning of the control algorithm based on its model and tracking changes in the values of selected control loop performance indicators to supervise the control circuit. A binary diagnostic matrix was used to isolate anomalies. The presented approach requires only standard operating data (process variable ([Formula: see text]), setpoint ([Formula: see text]), and control signal ([Formula: see text]). The proposed concept was tested using the example of a control system for superheaters in a steam line of a power unit boiler. Cyber-attacks targeting other parts of the process were also included in the study to test the proposed approach’s applicability, effectiveness, and limitations and identify further research directions. |
format | Online Article Text |
id | pubmed-10007557 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-100075572023-03-12 Controller Cyber-Attack Detection and Isolation † Sztyber-Betley, Anna Syfert, Michał Kościelny, Jan Maciej Górecka, Zuzanna Sensors (Basel) Article This article deals with the cyber security of industrial control systems. Methods for detecting and isolating process faults and cyber-attacks, consisting of elementary actions named “cybernetic faults” that penetrate the control system and destructively affect its operation, are analysed. FDI fault detection and isolation methods and the assessment of control loop performance methods developed in the automation community are used to diagnose these anomalies. An integration of both approaches is proposed, which consists of checking the correct functioning of the control algorithm based on its model and tracking changes in the values of selected control loop performance indicators to supervise the control circuit. A binary diagnostic matrix was used to isolate anomalies. The presented approach requires only standard operating data (process variable ([Formula: see text]), setpoint ([Formula: see text]), and control signal ([Formula: see text]). The proposed concept was tested using the example of a control system for superheaters in a steam line of a power unit boiler. Cyber-attacks targeting other parts of the process were also included in the study to test the proposed approach’s applicability, effectiveness, and limitations and identify further research directions. MDPI 2023-03-03 /pmc/articles/PMC10007557/ /pubmed/36904980 http://dx.doi.org/10.3390/s23052778 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Sztyber-Betley, Anna Syfert, Michał Kościelny, Jan Maciej Górecka, Zuzanna Controller Cyber-Attack Detection and Isolation † |
title | Controller Cyber-Attack Detection and Isolation † |
title_full | Controller Cyber-Attack Detection and Isolation † |
title_fullStr | Controller Cyber-Attack Detection and Isolation † |
title_full_unstemmed | Controller Cyber-Attack Detection and Isolation † |
title_short | Controller Cyber-Attack Detection and Isolation † |
title_sort | controller cyber-attack detection and isolation † |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10007557/ https://www.ncbi.nlm.nih.gov/pubmed/36904980 http://dx.doi.org/10.3390/s23052778 |
work_keys_str_mv | AT sztyberbetleyanna controllercyberattackdetectionandisolation AT syfertmichał controllercyberattackdetectionandisolation AT koscielnyjanmaciej controllercyberattackdetectionandisolation AT goreckazuzanna controllercyberattackdetectionandisolation |