DocumentCode :
630841
Title :
An impact-aware defense against Stuxnet
Author :
Clark, Andrew ; Quanyan Zhu ; Poovendran, R. ; Basar, Tamer
Author_Institution :
Dept. of Electr. Eng., Univ. of Washington, Seattle, WA, USA
fYear :
2013
fDate :
17-19 June 2013
Firstpage :
4140
Lastpage :
4147
Abstract :
The Stuxnet worm is a sophisticated malware designed to sabotage industrial control systems (ICSs). It exploits vulnerabilities in removable drives, local area communication networks, and programmable logic controllers (PLCs) to penetrate the process control network (PCN) and the control system network (CSN). Stuxnet was successful in penetrating the control system network and sabotaging industrial control processes since the targeted control systems lacked security mechanisms for verifying message integrity and source authentication. In this work, we propose a novel proactive defense system framework, in which commands from the system operator to the PLC are authenticated using a randomized set of cryptographic keys. The framework leverages cryptographic analysis and control-and game-theoretic methods to quantify the impact of malicious commands on the performance of the physical plant. We derive the worst-case optimal randomization strategy as a saddle-point equilibrium of a game between an adversary attempting to insert commands and the system operator, and show that the proposed scheme can achieve arbitrarily low adversary success probability for a sufficiently large number of keys. We evaluate our proposed scheme, using a linear-quadratic regulator (LQR) as a case study, through theoretical and numerical analysis.
Keywords :
control system synthesis; game theory; invasive software; linear quadratic control; networked control systems; numerical analysis; private key cryptography; probability; process control; production engineering computing; programmable controllers; public key cryptography; CSN; ICS; LQR; PCN; PLC; Stuxnet worm; control system network; control-theoretic methods; cryptographic analysis; cryptographic keys; game-theoretic methods; impact-aware defense; industrial control process; linear-quadratic regulator; local area communication networks; malicious commands; malware; message integrity verification; numerical analysis; physical plant; proactive defense system framework; process control network; programmable logic controllers; removable drive vulnerabilities; sabotage industrial control systems; saddle-point equilibrium; security mechanisms; source authentication; system operator; worst-case optimal randomization strategy; Control systems; Cryptography; Grippers; Industrial control; Malware; Software;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
American Control Conference (ACC), 2013
Conference_Location :
Washington, DC
ISSN :
0743-1619
Print_ISBN :
978-1-4799-0177-7
Type :
conf
DOI :
10.1109/ACC.2013.6580475
Filename :
6580475
Link To Document :
بازگشت