Skip to main content

A Modular Hybrid Learning Approach for Black-Box Security Testing of CPS

  • Conference paper
  • First Online:
Applied Cryptography and Network Security (ACNS 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11464))

Included in the following conference series:

Abstract

Evaluating the security of Cyber-Physical Systems (CPS) is challenging, mainly because it brings risks that are not acceptable in mission-critical systems like Industrial Control Systems (ICS). Model-based approaches help to address such challenges by keeping the risk associated with testing low. This paper presents a novel modelling framework and methodology that can easily be adapted to different CPS. Based on our experiments, HybLearner takes less than 140 s to build a model from historical data of a real-world water treatment testbed, and HybTester can simulate accurately about 60 min ahead of normal behaviour of the system including transitions of control strategies. We also introduce a security metrics (time-to-critical-state) that gives a measurement of how fast the system might reach a critical state, which is one of the use cases of the proposed framework to build a model-based attack detection mechanism.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://itrust.sutd.edu.sg/research/testbeds/secure-water-treatment-swat/.

  2. 2.

    https://scapy.net/.

  3. 3.

    https://neomodel.readthedocs.io/en/latest/.

  4. 4.

    Database toolkit for Python (https://www.sqlalchemy.org/).

  5. 5.

    https://scikit-learn.org/stable/.

  6. 6.

    Gaussian process in Python (https://sheffieldml.github.io/GPy/).

  7. 7.

    https://neo4j.com/.

References

  1. Adepu, S., Mathur, A.: An investigation into the response of a water treatment system to cyber attacks. In: 2016 IEEE 17th International Symposium on High Assurance Systems Engineering (HASE) (2016)

    Google Scholar 

  2. Alur, R.: Principles of Cyber-Physical Systems. MIT Press, Cambridge (2015)

    Google Scholar 

  3. Carcano, A., Coletta, A., Guglielmi, M., Masera, M., Fovino, I.N., Trombetta, A.: A multidimensional critical state analysis for detecting intrusions in SCADA systems. IEEE Trans. Ind. Inform. 7, 179–186 (2011)

    Article  Google Scholar 

  4. Cárdenas, A.A., Amin, S., Lin, Z.S., Huang, Y.L., Huang, C.Y., Sastry, S.: Attacks against process control systems: risk assessment, detection, and response. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (CCS) (2011)

    Google Scholar 

  5. Castellanos, J.H., Ochoa, M., Zhou, J.: Finding dependencies between cyber-physical domains for security testing of industrial control systems. In: Proceedings of the 34th Annual Computer Security Applications Conference (ACSAC) (2018)

    Google Scholar 

  6. Etigowni, S., Hossain-McKenzie, S., Kazerooni, M., Davis, K., Zonouz, S.: Crystal (ball): I look at physics and predict control flow! just-ahead-of-time controller recovery. In: Proceedings of the 34th Annual Computer Security Applications Conference (ACSAC) (2018)

    Google Scholar 

  7. Garulli, A., Paoletti, S., Vicino, A.: A survey on switched and piecewise affine system identification. In: IFAC Proceedings Volumes (2012)

    Google Scholar 

  8. Goebel, R., Teel, A.R., Sanfelice, R.G.: Hybrid Dynamical Systems: Modeling, Stability, and Robustness. Princeton University Press, Princeton (2012)

    Book  MATH  Google Scholar 

  9. Goh, J., Adepu, S., Junejo, K.N., Mathur, A.: A dataset to support research in the design of secure water treatment systems. In: Havarneanu, G., Setola, R., Nassopoulos, H., Wolthusen, S. (eds.) CRITIS 2016. LNCS, vol. 10242, pp. 88–99. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-71368-7_8

    Chapter  Google Scholar 

  10. Goh, J., Adepu, S., Tan, M., Shan, L.Z.: Anomaly detection in cyber physical systems using recurrent neural networks. In: 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE) (2017)

    Google Scholar 

  11. Henzinger, T.A.: The theory of hybrid automata. In: Inan, M.K., Kurshan, R.P. (eds.) Verification of Digital and Hybrid Systems. NATO ASI Series, vol. 170, pp. 265–292. Springer, Heidelberg (2000). https://doi.org/10.1007/978-3-642-59615-5_13

    Chapter  Google Scholar 

  12. Krotofil, M., Cárdenas, A.A.: Resilience of process control systems to cyber-physical attacks. In: Riis Nielson, H., Gollmann, D. (eds.) NordSec 2013. LNCS, vol. 8208, pp. 166–182. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-41488-6_12

    Chapter  Google Scholar 

  13. Kwon, C., Liu, W., Hwang, I.: Security analysis for cyber-physical systems against stealthy deception attacks. In: American Control Conference (ACC) (2013)

    Google Scholar 

  14. Lin, Q., Adepu, S., Verwer, S., Mathur, A.: TABOR: a graphical model-based approach for anomaly detection in industrial control systems. In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security (2018)

    Google Scholar 

  15. Ljung, L.: System identification. In: Procházka, A., Uhlíř, J., Rayner, P.W.J., Kingsbury, N.G. (eds.) Signal Analysis and Prediction. ANHA, pp. 163–173. Springer, Boston (1998). https://doi.org/10.1007/978-1-4612-1768-8_11

    Chapter  Google Scholar 

  16. Murguia, C., van de Wouw, N., Ruths, J.: Reachable sets of hidden CPS sensor attacks: analysis and synthesis tools. IFAC-PapersOnLine (2017)

    Google Scholar 

  17. Pasqualetti, F., Dörfler, F., Bullo, F.: Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Control 58, 2715–2729 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  18. Raffelt, H., Steffen, B.: LearnLib: a library for automata learning and experimentation. In: Baresi, L., Heckel, R. (eds.) FASE 2006. LNCS, vol. 3922, pp. 377–380. Springer, Heidelberg (2006). https://doi.org/10.1007/11693017_28

    Chapter  Google Scholar 

  19. Santana, P.H., Lane, S., Timmons, E., Williams, B.C., Forster, C.: Learning hybrid models with guarded transitions. In: Conference on Artificial Intelligence (2015)

    Google Scholar 

  20. Teixeira, A., Amin, S., Sandberg, H., Johansson, K.H., Sastry, S.S.: Cyber security analysis of state estimators in electric power systems. In: 49th IEEE Conference on Decision and Control (CDC) (2010)

    Google Scholar 

  21. Urbina, D.I., et al.: Limiting the impact of stealthy attacks on industrial control systems. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS) (2016)

    Google Scholar 

  22. Van Der Schaft, A.J., Schumacher, J.M.: An Introduction to Hybrid Dynamical Systems, vol. 251. Springer, London (2000). https://doi.org/10.1007/BFb0109998

    Book  MATH  Google Scholar 

  23. Zimmerschied, R., Isermann, R.: Nonlinear system identification of block-oriented systems using local affine models. In: IFAC Proceedings Volumes (2009)

    Google Scholar 

Download references

Acknowledgments

This work was partly supported by SUTD start-up research grant SRG-ISTD-2017-124.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to John Henry Castellanos or Jianying Zhou .

Editor information

Editors and Affiliations

Appendices

A Model-Based Detection Mechanism

Here we show additional examples how HybTester can be used as a model-based detection mechanism for two attacks (A1 and A2) described in Sect. 6.4 (Figs. 10 and 11).

Fig. 10.
figure 10

Attack A1 which starts in step \(k=48\) (A1.0) and ends in step \(k=481\) (A1.1). The attack is detected in step \(k=49\) (D).

Fig. 11.
figure 11

Attack A2 which starts in step \(k=200\) (A2.0) and ends in step \(k=718\) (A2.1). The attack is detected in step \(k=201\) (D).

B Continuous-Time Models for Stage One of SWaT

Figure 12 shows all nine derivatives \(\dot{y}\) for lit101.

Fig. 12.
figure 12

Continuous-time model \(\bar{\mathbb {C}}\).

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Castellanos, J.H., Zhou, J. (2019). A Modular Hybrid Learning Approach for Black-Box Security Testing of CPS. In: Deng, R., Gauthier-Umaña, V., Ochoa, M., Yung, M. (eds) Applied Cryptography and Network Security. ACNS 2019. Lecture Notes in Computer Science(), vol 11464. Springer, Cham. https://doi.org/10.1007/978-3-030-21568-2_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-21568-2_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-21567-5

  • Online ISBN: 978-3-030-21568-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics