Intrusion Detection and Deterrence for Critical Infrastructures | J. Murrey Atkins Library (2024)

Ali, M. (2016). Intrusion Detection and Deterrence for Critical Infrastructures. Unc Charlotte Electronic Theses And Dissertations.

Analytics

376 views ◎
288 downloads ⇓

Abstract

Critical infrastructures are the systems and networks that are so vital that their unavailability would have a major impact on national security, economy, safety, or any combination thereof. Examples of critical infrastructure are power systems, financial services, emergency services, health care, defense sector, and others. While these infrastructures are readily available, they are inherently vulnerable to attacks. New emerging threats have been highlighted in the recent literature with respect to critical infrastructures. Therefore, ensuring both accurate detection and robust deterrence is highly important for protecting these infrastructures from devastating, sophisticated, and evasive cyber and cyber-physical attacks. Deterrence is the ability to make intrusions very unlikely or highly expensive. However, the intrusion detection and deterrence techniques for critical infrastructure face many challenges. First, intrusion detection techniques should be real-time, accurate, robust against stealthy attacks, and economically feasible. Second, intrusion deterrence techniques should be unpredictable, computationally inexpensive, and effective against persistent attackers. In this thesis, we focus on intrusion detection and deterrence for energy delivery systems (EDS) of smart grids. This thesis has two key goals. The first goal is to develop real-time intrusion detection and robust deterrence techniques to protect EDS against stealthy attacks that can undermine the system's integrity. The second goal is to identify the limitations of existing intrusion detection techniques that allow for evasive attacks and develop techniques to reduce evasion margin for attackers. We, particularly, investigate advanced metering infrastructure (AMI) and automatic generation control (AGC) in the supervisory control and data acquisition network (SCADA) of smart grids. We show, based on statistical analysis of AMI and AGC operational data, that both AMI and AGC exhibit a predictable behavior that can be exploited to develop accurate and robust intrusion detection and deterrence techniques. First, we model AMI configuration specification using stochastic temporal properties that can be used to detect anomalous activities. As the AMI exhibits static behavior that can be exploited to launch mimicry and evasive attacks, we developed a new deterrence approach that randomizes the AMI configuration frequently to mislead attackers, without breaking the system operational integrity.Second, we address the AGC attacks that might result from manipulating sensor measurements that can bypass bad data detection algorithms. We developed a data-driven multi-tier intrusion detection technique for a single and multiple AGC, which exploits the temporal dependence of the measurements to identify potential anomalous behavior at real-time, and then incorporate system-wide knowledge through an offline process to reduce false positives. Last and third, we investigate the inherent limitations of existing intrusion detection systems against evasive attacks and developed a key-based deterrence approach to reduce the attack evasion margin by introducing a notion of randomized thresholds in intrusion detection systems.

Details

Author

Ali, Muhammad

Title

Intrusion Detection and Deterrence for Critical Infrastructures

Physical Description

1 online resource (148 pages) : PDF

Date

2016

Degree Granting Institution

University of North Carolina at Charlotte

Abstract

Critical infrastructures are the systems and networks that are so vital that their unavailability would have a major impact on national security, economy, safety, or any combination thereof. Examples of critical infrastructure are power systems, financial services, emergency services, health care, defense sector, and others. While these infrastructures are readily available, they are inherently vulnerable to attacks. New emerging threats have been highlighted in the recent literature with respect to critical infrastructures. Therefore, ensuring both accurate detection and robust deterrence is highly important for protecting these infrastructures from devastating, sophisticated, and evasive cyber and cyber-physical attacks. Deterrence is the ability to make intrusions very unlikely or highly expensive. However, the intrusion detection and deterrence techniques for critical infrastructure face many challenges. First, intrusion detection techniques should be real-time, accurate, robust against stealthy attacks, and economically feasible. Second, intrusion deterrence techniques should be unpredictable, computationally inexpensive, and effective against persistent attackers. In this thesis, we focus on intrusion detection and deterrence for energy delivery systems (EDS) of smart grids. This thesis has two key goals. The first goal is to develop real-time intrusion detection and robust deterrence techniques to protect EDS against stealthy attacks that can undermine the system's integrity. The second goal is to identify the limitations of existing intrusion detection techniques that allow for evasive attacks and develop techniques to reduce evasion margin for attackers. We, particularly, investigate advanced metering infrastructure (AMI) and automatic generation control (AGC) in the supervisory control and data acquisition network (SCADA) of smart grids. We show, based on statistical analysis of AMI and AGC operational data, that both AMI and AGC exhibit a predictable behavior that can be exploited to develop accurate and robust intrusion detection and deterrence techniques. First, we model AMI configuration specification using stochastic temporal properties that can be used to detect anomalous activities. As the AMI exhibits static behavior that can be exploited to launch mimicry and evasive attacks, we developed a new deterrence approach that randomizes the AMI configuration frequently to mislead attackers, without breaking the system operational integrity.Second, we address the AGC attacks that might result from manipulating sensor measurements that can bypass bad data detection algorithms. We developed a data-driven multi-tier intrusion detection technique for a single and multiple AGC, which exploits the temporal dependence of the measurements to identify potential anomalous behavior at real-time, and then incorporate system-wide knowledge through an offline process to reduce false positives. Last and third, we investigate the inherent limitations of existing intrusion detection systems against evasive attacks and developed a key-based deterrence approach to reduce the attack evasion margin by introducing a notion of randomized thresholds in intrusion detection systems.

Genre

doctoral dissertations

Subjects--Topics

Computer science
Information technology

Degree

Ph.D.

Keywords

Advanced Metering Infrastructure
Anomaly Detection
Automatic Generation Control
Intrusion Detection
SCADA
Smart Grid

Subject Area

Information Technology

Advisor(s)

Al-Shaer, Ehab

Committee Members

Wang, Weichao
Wang, Yongge
Bobba, Rakesh
Wang, Yu

Degree Note

Thesis (Ph.D.)--University of North Carolina at Charlotte, 2016.

Rights Statement

This Item is protected by copyright and/or related rights. You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s). For additional information, see http://rightsstatements.org/page/InC/1.0/.

Rights Holder Information

Copyright is held by the author unless otherwise indicated.

Identifier

Ali_uncc_0694D_11230

Permalink

http://hdl.handle.net/20.500.13093/etd:1116

Intrusion Detection and Deterrence for Critical Infrastructures | J. Murrey Atkins Library (2024)

References

Top Articles
Latest Posts
Article information

Author: Chrissy Homenick

Last Updated:

Views: 5726

Rating: 4.3 / 5 (74 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Chrissy Homenick

Birthday: 2001-10-22

Address: 611 Kuhn Oval, Feltonbury, NY 02783-3818

Phone: +96619177651654

Job: Mining Representative

Hobby: amateur radio, Sculling, Knife making, Gardening, Watching movies, Gunsmithing, Video gaming

Introduction: My name is Chrissy Homenick, I am a tender, funny, determined, tender, glorious, fancy, enthusiastic person who loves writing and wants to share my knowledge and understanding with you.