New Software Algorithm Detects & Isolates Cyber Attacks to Protect Networked Control Systems

May 24, 2013

Researchers from North Carolina State University have developed a software algorithm that detects and isolates cyber attacks on networked control systems, which are used to coordinate transportation, power and other infrastructure across the United States.

Researchers from North Carolina State University have developed a software algorithm that detects and isolates cyber attacks on networked control systems, which are used to coordinate transportation, power and other infrastructure across the United States.

Networked control systems are essentially pathways that connect and coordinate activities between computers and physical devices. For example, the systems that connect temperature sensors, heating systems and user controls in modern buildings are networked control systems.

But, on a much larger scale, these systems are also becoming increasingly important to national infrastructure, such as transportation and power. And, because they often rely on wireless or Internet connections, these systems are vulnerable to cyber attacks. “Flame” and “Stuxnet” are examples of costly, high-profile attacks on networked control systems in recent years.

As networked control systems have grown increasingly large and complex, system designers have moved away from having system devices—or “agents”—coordinate their activities through a single, centralized computer hub, or brain. Instead, designers have created “distributed network control systems” (D-NCSs) that allow all of the system agents to work together, like a bunch of mini-brains, to coordinate their activities. This allows the systems to operate more efficiently. And now these distributed systems can also operate more securely.

NC State researchers have developed a software algorithm that can detect when an individual agent in a D-NCS has been compromised by a cyber attack. The algorithm then isolates the compromised agent, protecting the rest of the system and allowing it to continue functioning normally. Researchers say this gives D-NCSs resilience and security advantages over systems that rely on a central computer hub, because the centralized design means the entire system would be compromised if the central computer is hacked.

RELATED: Is Stuxnet Dead?

“In addition, our security algorithm can be incorporated directly into the code used to operate existing distributed control systems, with minor modifications,” Dr. Mo-Yuen Chow, a professor of electrical and computer engineering at NC State and co-author of a paper on the work, said in a prepared statement. “It would not require a complete overhaul of existing systems.”

Wente Zeng, a Ph.D. student at NC State and lead author of the paper said, “We have demonstrated that the system works, and are now moving forward with additional testing under various cyber-attack scenarios to optimize the algorithm’s detection rate and system performance.”

The paper, “Convergence and Recovery Analysis of the Secure Distributed Control Methodology for D-NCS,” will be presented at the IEEE International Symposium on Industrial Electronics, May 28-31, in Taipei, Taiwan. The research was funded by the National Science Foundation.

Source: NC State

Sponsored Recommendations

Learn About: Micro Motion™ 4700 Config I/O Coriolis Transmitter

An Advanced Transmitter that Expands Connectivity

Micro Motion™ G-Series Compact, Drainable Coriolis Flow and Density Meters

Micro Motion G-Series Coriolis flow and density meters are ideally suited for Process Monitoring and Optimization applications, offering easy selection with pre-selected models...

Learn about: Micro Motion G-Series Coriolis Flow and Density Meters

The Micro Motion G-Series is designed to help you access the benefits of Coriolis technology even when available space is limited.

Micro Motion 4700 Coriolis Configurable Inputs and Outputs Transmitter

The Micro Motion 4700 Coriolis Transmitter offers a compact C1D1 (Zone 1) housing. Bluetooth and Smart Meter Verification are available.