New Algorithm Lets SCADA Devices Detect, Deflect Attacks

  /     /     /  
Publicated : 22/11/2024   Category : security


New Algorithm Lets SCADA Devices Detect, Deflect Attacks


Embedded software prototype operates under the new normal that many SCADA environments have already been breached



Researchers have built a prototype that lets SCADA devices police one another in order to catch and cut off a fellow power plant or factory floor device that has been compromised.
The so-called secure distributed control methodology outfits SCADA systems, such as robots or PLCs, with embedded software that uses a specially created algorithm to detect devices behaving badly. The software, which was developed by researchers at NC State University with funding from the National Science Foundation, detects and then isolates a neighboring device that has been compromised.
It uses a reputation manager for the devices, so that if one robot or PLC starts doing something its not supposed to do -- or exceeds a certain threshold such as improperly accelerating or slowing its speed -- fellow robots or other devices detect the uncharacteristic behavior, sound an alarm, and cut it off from their operations to minimize or stop any damage.
This peer-level SCADA security would augment existing and emerging SCADA security products and features, the researchers say. The algorithm could be added into existing software in control systems, with some minor coding modifications, according to the researchers.
Commercial SCADA security uses a police car and travels and monitors the area. Ours is more like a community [neighborhood] watch, says Mo-Yuen Chow, a professor of electrical and computer engineering at NC State and co-author of the research. Each of the devices watch each other and talk to [their] neighbor.
Its a next-generation security technology for the new normal of assuming youve been breached and focusing on minimizing any damage. Our [technology] assumes the attack is already [occurring] and the device is already compromised, says Wente Zeng, an NC State Ph.D. student who worked on the prototype. After that, it [focuses on] how can we still make sure the rest of the system can work well and uninterrupted, he says.
[Industrial control systems vendors are starting to patch security bugs, but actually installing the fixes can invite more trouble. See
The SCADA Patch Problem
.]
Each local SCADA device monitors the others so that if one device behaves abnormally, the others shut down its communications, Zeng explains. So we can isolate the attack from the system.
The researchers ran a simulation with robots outfitted with the embedded software and controller. If one robot is compromised, it will affect other robots, so some of them would go to the wrong place, Zeng says. With our code, each is monitoring each other, so if this robot behaves weirdly, it is cut off, he says. Theres a controller on the robot ... and they talk to each other with the simple algorithm.
The researchers say they plan to patent the algorithm and explore commercialization prospects for the technology.
But distinguishing between normal and abnormal behavior isnt always so straightforward, and sophisticated attackers could find ways to taint the information in some way, according to some security experts.
The NC State researchers will present their technical paper,
Convergence and Recovery Analysis of the Secure Distributed Control Methodology for D-NCS
(PDF), later this month at the IEEE International Symposium on Industrial Electronics in Taipei, Taiwan.
Have a comment on this story? Please click Add Your Comment below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ Travel agency fined £150,000 for breaking Data Protection Act. ◂
Discovered: 23/12/2024
Category: security

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
New Algorithm Lets SCADA Devices Detect, Deflect Attacks