Reference Hub2
Intrusion Detection and Resilient Control for SCADA Systems

Intrusion Detection and Resilient Control for SCADA Systems

Bonnie Zhu, Shankar Sastry
ISBN13: 9781466626591|ISBN10: 1466626593|EISBN13: 9781466626904
DOI: 10.4018/978-1-4666-2659-1.ch015
Cite Chapter Cite Chapter

MLA

Zhu, Bonnie, and Shankar Sastry. "Intrusion Detection and Resilient Control for SCADA Systems." Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection, edited by Christopher Laing, et al., IGI Global, 2013, pp. 352-383. https://doi.org/10.4018/978-1-4666-2659-1.ch015

APA

Zhu, B. & Sastry, S. (2013). Intrusion Detection and Resilient Control for SCADA Systems. In C. Laing, A. Badii, & P. Vickers (Eds.), Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection (pp. 352-383). IGI Global. https://doi.org/10.4018/978-1-4666-2659-1.ch015

Chicago

Zhu, Bonnie, and Shankar Sastry. "Intrusion Detection and Resilient Control for SCADA Systems." In Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection, edited by Christopher Laing, Atta Badii, and Paul Vickers, 352-383. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-2659-1.ch015

Export Reference

Mendeley
Favorite

Abstract

Designed without cyber security in mind, most existing Supervisory Control And Data Acquisition (SCADA) systems make it a big challenge to modify the conventional Information Technology (IT) intrusion detection techniques, both to counter the threat of cyber attacks due to their standardization and connectivity to the Internet, and to achieve resilient control without fully retrofitting. The author presents a taxonomy and a set of metrics of SCAD-specific intrusion detection techniques by heightening their possible use in addition to explaining the nuance associated with such task and enumerating Intrusion Detection Systems (IDS) that have been proposed to undertake this endeavor. She identifies the deficits and voids in current research and offers recommendations on which strategies are most likely to succeed, in part through presenting a prototype of her efforts towards this goal. Specifically, she introduces an early anomaly detection and resilient estimation scheme consisting of a robust online recursive algorithm, which is based on the Kalman Filter in a state space model setting. This online window limited Robust Generalized Likelihood Ratio Test (RGLRT) that the author proposes identifies and detects outliers among real-time multidimensional measurements of dynamical systems without any a priori knowledge of the occurrence time or distribution of the outliers. It attains a low detection delay and an optimal stopping time that yields low rates in false alarm and miss detection while maintaining the optimal online estimation performance under normal conditions. The author proposes a set of qualitative and quantitative metric to measure its optimality in the context of cyber-physical systems.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.