Fuzzy-Decision Algorithms for Cyber Security Analysis of Advanced SCADA and Remote Monitoring Systems

Fuzzy-Decision Algorithms for Cyber Security Analysis of Advanced SCADA and Remote Monitoring Systems

Saša D. Milić
DOI: 10.4018/978-1-7998-2910-2.ch007
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This chapter provides a complex data analysis of critical infrastructure SCADA vulnerabilities and exploits using fuzzy-decision algorithms. These algorithms are presented in two case studies describing possible scenarios of the cyber attack on two vital multi-parameter remote monitoring systems. The main objects of the cyber attack analysis are data obtained from their common SCADA system. The main focus is on multiparameter remote monitoring systems for monitoring electricity production and water traffic processes in the lock of hydropower plant. Newly developed fuzzy decision algorithms for comprehensive data analysis are presented to recognize the cyber attack. The results of the fuzzy modeling are directly dependent on the complex choice of the if-then rules on the basis of which decisions are made. In addition, two fuzzy logic systems (FLS-T1 and FLS-T2) are used for modeling several cyber attack scenarios.
Chapter Preview
Top

Introduction

World economy faces unprecedented challenges, whether from soaring population growth, energy resource constraints, or warming climate and myopic financial markets. Today's trends and financial climate in the electricity market dictate the constant need for improving operations in the power system. Market liberalization and market operations in the electricity sector have set new requirements to improve the strategies of maintenance and electricity production in power plants. Consumers have a major impact on the market, mostly through companies that are involved in trade with electricity. There are also several powerful strategic weapons used by market and industry leaders to leverage their positional advantages (Lin, Chen, & Chu, 2015).

Sustainable technology and sustainable development are different facets of the same approach. Despite of the rising awareness of the urgency in finding more efficient and effective ways to achieve sustainable development, comprehensive and consistent meaning is still elusive both in theory and practice (Jakšić, Rakićević, & Jovanović, 2018; Ritala, Olander, Michailova, & Husted, 2015).

Supervisory Control and Data Acquisition (SCADA) system is a computer-based monitor and control system. In other words, SCADA is a main networked system for monitoring and controlling all technical systems and processes in the power facilities. The older SCADA systems were isolated and localized from conventional networks having specialist protocols such as Modbus, Profibus, etc. for interfaces with devices on the basic level. These protocols are a commonly available means of connecting industrial electronic devices such as smart sensors, programmable logic controllers (PLCs), microprocessor-controlled electronic devices, remote terminal units (RTUs), and industrial computers.

The end of the 20th century was marked by a rapid expansion of the Internet. The expansion of the Internet is accompanied by a widespread application of the Transmission Control Protocol/Internet Protocol (TCP/IP). It is a communication protocol used to interconnect network devices on the internet, intranet, and extranet.

Today we have gone a step further. The need for connecting devices over the Internet has required new communication concepts. Internet of Things (IoT) encompasses everything connected to the internet. Industrial Internet of Things (IIoT) is the network of multitude of smart electronic devices (smart sensors, PLCs, monitoring systems, alarm and warning units) connected by communications technologies. IIoT enables better monitoring of technological processes, the use of cloud technology, comprehensive multiparametric analysis, better fault and aging prediction and timely decision making. The growth of the IIoT is drastically changing how experts, engineers and managers of power plants interact with multiparameter remote monitoring systems, smart sensors, alarm and warning units, and different kind of RTUs (Boyes, Hallaq, Cunningham, & Watson, 2018; Sisinni, Saifullah, Han, Jennehag, & Gidlund, 2018). Today, a large number of embedded devices, RTUs, smart sensors, and complex monitoring systems are used in safety and security-critical applications such as SCADA systems and Machine to Machine (M2M) communication in power plants and traffic infrastructure (Babić, Milić, & Rakić, 2017; Milić & Srećković, 2008; Milić, Žigić, & Ponjavić, 2013; Misović, Milić, & Đurović, 2016). SCADA systems are used in many critical infrastructure applications (Falco, Caldera, & Shrobe, 2018). These applications are increasingly becoming the targets of cyber attacks. The IIoT changes in the power system and traffic by creating a new imperative to share data from smart sensors and monitoring systems managed by SCADA with alarm, warning and control systems. This data sharing concept brings many benefits. Some of these benefits are: energy savings, timely maintenance, condition based maintenance, prediction based maintenance, maintenance based on risk assessment, better assessment of fault probability, better investment planning, more reliable production, staff reduction, etc. A detailed economic analysis shows even greater benefits when taking into account the savings from production and traffic optimization.

Key Terms in this Chapter

Upper and Bottom Door Position: The process of starting the lock door takes some time and the current position of the door at the time of alarm generation is very important. By analyzing this parameter, cyber attack can be detected.

Vessels Distance: This parameter shows the distance of the vessel from the lock (the approach of the vessel to the lock).

Temperature Monitoring System (TMS): TMS is online temperature remote monitoring system of the hydrogenerator.

Fuzzy Logic Controller (FLC): It is controller based on fuzzy logic principles.

Alarm Number: This parameter describes the number of simultaneous SCADA number. In the real production of electricity and the day-to-day process of transporting ships through the river lock, it is not possible to have multiple simultaneous alarms.

Vessel Presence: This parameter shows the distance of the vessel from the lock door (the vessel is located near the lock door).

SCADA Alarms: This parameter describes the number of simultaneous alarms that occur on SCADA.

Generator Power: Power parameters describe the operation mode of the generator.

Asset Management (AM): It is one of many management theories relating to the process of managing and disposing of assets and goods.

Laser Monitoring System (LMS): LMS is online laser remote monitoring system of the river lock.

Complete Chapter List

Search this Book:
Reset