Font Size: a A A

Deceptive Attack And Information Security Protection Of Process Control Systems

Posted on:2016-03-05Degree:MasterType:Thesis
Country:ChinaCandidate:Y N WangFull Text:PDF
GTID:2298330467477379Subject:Control Science and Engineering
Abstract/Summary:PDF Full Text Request
Although awareness about security is constantly rising, industrial computer network can be exposed to serious cyber threat. The countermeasures developed from general-purpose computer work cannot be efficiently adopted in those situations where a physical system is managed through some information and communication technology. Fault diagnosis in industrial control system only can detect some kinds of process parameters anomalies, cannot analysis attacks from network. Unfortunately, several examples of successful attacks carried out in the last decade, and more frequently in the recent years, which resulted in serious consequences. That prompted domestic and international information security pay more attention to the security of control system.This paper analyzed the current status of information security in industrial control systems, especially the deceptive attack. The attackers could control or tamper with the parameters of systems, and made the operators to obtain false information, which may make the wrong operation or decision. This paper proposed and developed a proposal with hardware-in-loop of TE process controller, and did some attack tests on this testbed. Studies have shown that in the presence of man-made attacks, the conventional fault detection algorithm has poor performance. The paper proposed to establish a zone boundary security, host computer defense, bus monitor and security management platform, these four levels of information security in industrial control systems to isolation the attacks.
Keywords/Search Tags:control industrial system, fault detection, deception attack, PCA
PDF Full Text Request
Related items