Uncovering cyber-threats to nuclear system sensing and observability

Cyber-physical systems are engineered systems that integrate physical processes and computational resources. But, by integrating cyber and physical worlds, the physical assets are vulnerable to cyber-attack. Two things are of importance for the security of cyber-physical assets: access to control in...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Nuclear engineering and design 2018-05, Vol.331, p.204-210
Hauptverfasser: Maccarone, Lee T., D’Angelo, Christopher J., Cole, Daniel G.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 210
container_issue
container_start_page 204
container_title Nuclear engineering and design
container_volume 331
creator Maccarone, Lee T.
D’Angelo, Christopher J.
Cole, Daniel G.
description Cyber-physical systems are engineered systems that integrate physical processes and computational resources. But, by integrating cyber and physical worlds, the physical assets are vulnerable to cyber-attack. Two things are of importance for the security of cyber-physical assets: access to control inputs by the attacker, and the ability of an attacker to mask inputs. This combination of attacker control and masking measurements can allow an attacker to cause significant damage to a system while remaining undetected. By masking certain measurement signals, an attacker may affect the observability of the system and create a condition where part of the state space is unobservable, meaning that it is impossible to reconstruct those states. This is called an observability attack. This paper presents a technique for analyzing observability attacks. How an attacker can design an attack to maximize the impact on the unobservable states while minimizing the possibility of detection is discussed. Criteria for maintaining a stealthy attack are given, and a design method is provided. For a nuclear balance of plant system, combinations of sensor omissions are analyzed to find an observability attack with maximum impact and minimum detection. An appropriate attack input signal is created, an attack is simulated, and the system response is shown.
doi_str_mv 10.1016/j.nucengdes.2018.02.028
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2068483790</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0029549318301833</els_id><sourcerecordid>2068483790</sourcerecordid><originalsourceid>FETCH-LOGICAL-c343t-b633ba8f7b2356333931466db3a58cf4cbe889273ce21d93231035e538c9384c3</originalsourceid><addsrcrecordid>eNqFUMlqwzAQFaWFpss31NCzU0njRTqGdIVALw30JiR5nMokdiopAf99ZVJ67fBg5vAW5hFyx-icUVY9dPP-YLHfNBjmnDIxpzxBnJEZEzXP61J-npMZpVzmZSHhklyF0NFpJJ-Rx3VvhyN6128yOxr0efzyqGPI4pAl4y1qn4UxRNxlAfsw8XTfZIMJ6I_auK2L4w25aPU24O3vvibr56eP5Wu-en95Wy5WuYUCYm4qAKNFWxsOZbpBAiuqqjGgS2HbwhoUQvIaLHLWSODAKJRYgrASRGHhmtyffPd--D5giKobDr5PkYrTShQCakkTqz6xrB9C8NiqvXc77UfFqJoqU536q0xNlSnKE0RSLk5KTE8cHXoVrMPeYuM82qiawf3r8QPqCXkC</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2068483790</pqid></control><display><type>article</type><title>Uncovering cyber-threats to nuclear system sensing and observability</title><source>Elsevier ScienceDirect Journals</source><creator>Maccarone, Lee T. ; D’Angelo, Christopher J. ; Cole, Daniel G.</creator><creatorcontrib>Maccarone, Lee T. ; D’Angelo, Christopher J. ; Cole, Daniel G.</creatorcontrib><description>Cyber-physical systems are engineered systems that integrate physical processes and computational resources. But, by integrating cyber and physical worlds, the physical assets are vulnerable to cyber-attack. Two things are of importance for the security of cyber-physical assets: access to control inputs by the attacker, and the ability of an attacker to mask inputs. This combination of attacker control and masking measurements can allow an attacker to cause significant damage to a system while remaining undetected. By masking certain measurement signals, an attacker may affect the observability of the system and create a condition where part of the state space is unobservable, meaning that it is impossible to reconstruct those states. This is called an observability attack. This paper presents a technique for analyzing observability attacks. How an attacker can design an attack to maximize the impact on the unobservable states while minimizing the possibility of detection is discussed. Criteria for maintaining a stealthy attack are given, and a design method is provided. For a nuclear balance of plant system, combinations of sensor omissions are analyzed to find an observability attack with maximum impact and minimum detection. An appropriate attack input signal is created, an attack is simulated, and the system response is shown.</description><identifier>ISSN: 0029-5493</identifier><identifier>EISSN: 1872-759X</identifier><identifier>DOI: 10.1016/j.nucengdes.2018.02.028</identifier><language>eng</language><publisher>Amsterdam: Elsevier B.V</publisher><subject>Access control ; Computer applications ; Computer simulation ; Cyber-attack ; Cyber-physical systems ; Cybersecurity ; Decomposition ; Kalman decomposition ; Kalman filters ; Masking ; Nuclear power plants ; Observability ; Observability (systems) ; Security ; Vulnerability analysis</subject><ispartof>Nuclear engineering and design, 2018-05, Vol.331, p.204-210</ispartof><rights>2018 Elsevier B.V.</rights><rights>Copyright Elsevier BV May 2018</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c343t-b633ba8f7b2356333931466db3a58cf4cbe889273ce21d93231035e538c9384c3</citedby><cites>FETCH-LOGICAL-c343t-b633ba8f7b2356333931466db3a58cf4cbe889273ce21d93231035e538c9384c3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.sciencedirect.com/science/article/pii/S0029549318301833$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,776,780,3537,27901,27902,65306</link.rule.ids></links><search><creatorcontrib>Maccarone, Lee T.</creatorcontrib><creatorcontrib>D’Angelo, Christopher J.</creatorcontrib><creatorcontrib>Cole, Daniel G.</creatorcontrib><title>Uncovering cyber-threats to nuclear system sensing and observability</title><title>Nuclear engineering and design</title><description>Cyber-physical systems are engineered systems that integrate physical processes and computational resources. But, by integrating cyber and physical worlds, the physical assets are vulnerable to cyber-attack. Two things are of importance for the security of cyber-physical assets: access to control inputs by the attacker, and the ability of an attacker to mask inputs. This combination of attacker control and masking measurements can allow an attacker to cause significant damage to a system while remaining undetected. By masking certain measurement signals, an attacker may affect the observability of the system and create a condition where part of the state space is unobservable, meaning that it is impossible to reconstruct those states. This is called an observability attack. This paper presents a technique for analyzing observability attacks. How an attacker can design an attack to maximize the impact on the unobservable states while minimizing the possibility of detection is discussed. Criteria for maintaining a stealthy attack are given, and a design method is provided. For a nuclear balance of plant system, combinations of sensor omissions are analyzed to find an observability attack with maximum impact and minimum detection. An appropriate attack input signal is created, an attack is simulated, and the system response is shown.</description><subject>Access control</subject><subject>Computer applications</subject><subject>Computer simulation</subject><subject>Cyber-attack</subject><subject>Cyber-physical systems</subject><subject>Cybersecurity</subject><subject>Decomposition</subject><subject>Kalman decomposition</subject><subject>Kalman filters</subject><subject>Masking</subject><subject>Nuclear power plants</subject><subject>Observability</subject><subject>Observability (systems)</subject><subject>Security</subject><subject>Vulnerability analysis</subject><issn>0029-5493</issn><issn>1872-759X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><recordid>eNqFUMlqwzAQFaWFpss31NCzU0njRTqGdIVALw30JiR5nMokdiopAf99ZVJ67fBg5vAW5hFyx-icUVY9dPP-YLHfNBjmnDIxpzxBnJEZEzXP61J-npMZpVzmZSHhklyF0NFpJJ-Rx3VvhyN6128yOxr0efzyqGPI4pAl4y1qn4UxRNxlAfsw8XTfZIMJ6I_auK2L4w25aPU24O3vvibr56eP5Wu-en95Wy5WuYUCYm4qAKNFWxsOZbpBAiuqqjGgS2HbwhoUQvIaLHLWSODAKJRYgrASRGHhmtyffPd--D5giKobDr5PkYrTShQCakkTqz6xrB9C8NiqvXc77UfFqJoqU536q0xNlSnKE0RSLk5KTE8cHXoVrMPeYuM82qiawf3r8QPqCXkC</recordid><startdate>201805</startdate><enddate>201805</enddate><creator>Maccarone, Lee T.</creator><creator>D’Angelo, Christopher J.</creator><creator>Cole, Daniel G.</creator><general>Elsevier B.V</general><general>Elsevier BV</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>7ST</scope><scope>7TB</scope><scope>8FD</scope><scope>C1K</scope><scope>FR3</scope><scope>KR7</scope><scope>L7M</scope><scope>SOI</scope></search><sort><creationdate>201805</creationdate><title>Uncovering cyber-threats to nuclear system sensing and observability</title><author>Maccarone, Lee T. ; D’Angelo, Christopher J. ; Cole, Daniel G.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c343t-b633ba8f7b2356333931466db3a58cf4cbe889273ce21d93231035e538c9384c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Access control</topic><topic>Computer applications</topic><topic>Computer simulation</topic><topic>Cyber-attack</topic><topic>Cyber-physical systems</topic><topic>Cybersecurity</topic><topic>Decomposition</topic><topic>Kalman decomposition</topic><topic>Kalman filters</topic><topic>Masking</topic><topic>Nuclear power plants</topic><topic>Observability</topic><topic>Observability (systems)</topic><topic>Security</topic><topic>Vulnerability analysis</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Maccarone, Lee T.</creatorcontrib><creatorcontrib>D’Angelo, Christopher J.</creatorcontrib><creatorcontrib>Cole, Daniel G.</creatorcontrib><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Environment Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Environmental Sciences and Pollution Management</collection><collection>Engineering Research Database</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Environment Abstracts</collection><jtitle>Nuclear engineering and design</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Maccarone, Lee T.</au><au>D’Angelo, Christopher J.</au><au>Cole, Daniel G.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Uncovering cyber-threats to nuclear system sensing and observability</atitle><jtitle>Nuclear engineering and design</jtitle><date>2018-05</date><risdate>2018</risdate><volume>331</volume><spage>204</spage><epage>210</epage><pages>204-210</pages><issn>0029-5493</issn><eissn>1872-759X</eissn><abstract>Cyber-physical systems are engineered systems that integrate physical processes and computational resources. But, by integrating cyber and physical worlds, the physical assets are vulnerable to cyber-attack. Two things are of importance for the security of cyber-physical assets: access to control inputs by the attacker, and the ability of an attacker to mask inputs. This combination of attacker control and masking measurements can allow an attacker to cause significant damage to a system while remaining undetected. By masking certain measurement signals, an attacker may affect the observability of the system and create a condition where part of the state space is unobservable, meaning that it is impossible to reconstruct those states. This is called an observability attack. This paper presents a technique for analyzing observability attacks. How an attacker can design an attack to maximize the impact on the unobservable states while minimizing the possibility of detection is discussed. Criteria for maintaining a stealthy attack are given, and a design method is provided. For a nuclear balance of plant system, combinations of sensor omissions are analyzed to find an observability attack with maximum impact and minimum detection. An appropriate attack input signal is created, an attack is simulated, and the system response is shown.</abstract><cop>Amsterdam</cop><pub>Elsevier B.V</pub><doi>10.1016/j.nucengdes.2018.02.028</doi><tpages>7</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0029-5493
ispartof Nuclear engineering and design, 2018-05, Vol.331, p.204-210
issn 0029-5493
1872-759X
language eng
recordid cdi_proquest_journals_2068483790
source Elsevier ScienceDirect Journals
subjects Access control
Computer applications
Computer simulation
Cyber-attack
Cyber-physical systems
Cybersecurity
Decomposition
Kalman decomposition
Kalman filters
Masking
Nuclear power plants
Observability
Observability (systems)
Security
Vulnerability analysis
title Uncovering cyber-threats to nuclear system sensing and observability
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-03T13%3A31%3A43IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Uncovering%20cyber-threats%20to%20nuclear%20system%20sensing%20and%20observability&rft.jtitle=Nuclear%20engineering%20and%20design&rft.au=Maccarone,%20Lee%20T.&rft.date=2018-05&rft.volume=331&rft.spage=204&rft.epage=210&rft.pages=204-210&rft.issn=0029-5493&rft.eissn=1872-759X&rft_id=info:doi/10.1016/j.nucengdes.2018.02.028&rft_dat=%3Cproquest_cross%3E2068483790%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2068483790&rft_id=info:pmid/&rft_els_id=S0029549318301833&rfr_iscdi=true