usenix conference policies
A Model-based Approach to Self-Protection in SCADA Systems
Qian Chen and Sherif Abdelwahed, Mississippi State University
Supervisory Control and Data Acquisition (SCADA) systems, which are widely used in monitoring and controlling critical infrastructure sectors, are highly vulnerable to cyber attacks. Current security solutions can protect SCADA systems from known cyber assaults, but most solutions require human intervention. This paper applies autonomic computing technology to monitor SCADA system performance, and proactively estimate upcoming attacks for a given system model of a physical infrastructure. We also present the feasibility of intrusion detection systems for known and unknown attack detection. A dynamic intrusion response system is designed to evaluate recommended responses, and appropriate responses are executed to influence attack impacts. We used a case study of a water storage tank to develop an attack that modifies Modbus messages transmitted between slaves and masters. Experimental results show that, with little or no human intervention, the proposed approach enhances the security of the SCADA system, reduces protection time delays, and maintains water storage tank performance.
Open Access Media
USENIX is committed to Open Access to the research presented at our events. Papers and proceedings are freely available to everyone once the event begins. Any video, audio, and/or slides that are posted after the event are also free and open to everyone. Support USENIX and our commitment to Open Access.
author = {Qian Chen and Sherif Abdelwahed},
title = {A Model-based Approach to {Self-Protection} in {SCADA} Systems},
booktitle = {9th International Workshop on Feedback Computing (Feedback Computing 14)},
year = {2014},
address = {Philadelphia, PA},
url = {https://www.usenix.org/conference/feedbackcomputing14/workshop-program/presentation/chen},
publisher = {USENIX Association},
month = jun
}
connect with us