3,422 research outputs found

    Assessing and augmenting SCADA cyber security: a survey of techniques

    Get PDF
    SCADA systems monitor and control critical infrastructures of national importance such as power generation and distribution, water supply, transportation networks, and manufacturing facilities. The pervasiveness, miniaturisations and declining costs of internet connectivity have transformed these systems from strictly isolated to highly interconnected networks. The connectivity provides immense benefits such as reliability, scalability and remote connectivity, but at the same time exposes an otherwise isolated and secure system, to global cyber security threats. This inevitable transformation to highly connected systems thus necessitates effective security safeguards to be in place as any compromise or downtime of SCADA systems can have severe economic, safety and security ramifications. One way to ensure vital asset protection is to adopt a viewpoint similar to an attacker to determine weaknesses and loopholes in defences. Such mind sets help to identify and fix potential breaches before their exploitation. This paper surveys tools and techniques to uncover SCADA system vulnerabilities. A comprehensive review of the selected approaches is provided along with their applicability

    Cross-layer system reliability assessment framework for hardware faults

    Get PDF
    System reliability estimation during early design phases facilitates informed decisions for the integration of effective protection mechanisms against different classes of hardware faults. When not all system abstraction layers (technology, circuit, microarchitecture, software) are factored in such an estimation model, the delivered reliability reports must be excessively pessimistic and thus lead to unacceptably expensive, over-designed systems. We propose a scalable, cross-layer methodology and supporting suite of tools for accurate but fast estimations of computing systems reliability. The backbone of the methodology is a component-based Bayesian model, which effectively calculates system reliability based on the masking probabilities of individual hardware and software components considering their complex interactions. Our detailed experimental evaluation for different technologies, microarchitectures, and benchmarks demonstrates that the proposed model delivers very accurate reliability estimations (FIT rates) compared to statistically significant but slow fault injection campaigns at the microarchitecture level.Peer ReviewedPostprint (author's final draft

    A Fast Blind Impulse Detector for Bernoulli-Gaussian Noise in Underspread Channel

    Full text link
    The Bernoulli-Gaussian (BG) model is practical to characterize impulsive noises that widely exist in various communication systems. To estimate the BG model parameters from noise measurements, a precise impulse detection is essential. In this paper, we propose a novel blind impulse detector, which is proven to be fast and accurate for BG noise in underspread communication channels.Comment: v2 to appear in IEEE ICC 2018, Kansas City, MO, USA, May 2018 Minor erratums added in v

    Application of Bayesian Belief Networks to assess hydrogen gas retention hazards and equipment reliability in nuclear chemical plants

    Get PDF
    Many nuclear waste reprocessing and storage plant processes result in the generation of hydrogen gas. Radiolysis of radioactive liquors and corrosion of metallic magnesium waste are the main mechanisms for generating hydrogen in such facilities. Corrosion products such as magnesium hydroxide sludge are also formed which require storage in transportable vessels. Demonstration of sufficient reliability of systems such as purge air and ventilation extract is therefore required to protect against releases of hydrogen. Factors affecting hydrogen ignition and removal in nuclear environments as well as the identification of appropriate hazard management strategies have been the key areas of research for decommissioning and reprocessing plants. However, a knowledge gap has been identified in terms of assessing the likelihood of hydrogen retention within the sludge and waste matrix resulting in a sudden release of the gas into a vessel ullage. Hydrogen gas retention and the potential for a sudden release are affected by numerous factors such as faults leading to adverse waste disturbance. As such an appropriate technique must be applied to analyse the uncertainty from this gas behaviour. Bayesian Belief Networks (BBN) is an emerging statistical technique which allows uncertainty and dependencies between multiple variables to be taken into account in a quantified risk assessment. A BBN analysis has been undertaken to determine the key factors that would lead to disturbance of the sludge waste and the subsequent sudden release of hydrogen into the ullage space of a process vessel. The results show that the key sensitivities are adverse disturbance of the vessel sludge waste caused by faults leading to uncontrolled movements and clashes of the vessel. The benefits of applying the BBN technique to assess reliability of the purge and ventilation extract systems against radiolytic hydrogen release have also been explored. The BBN model has shown to be particularly advantageous, as it has allowed input of probability distributions of the key variables, instead of single point values, thus providing an enhanced understanding of uncertainty. Furthermore, the BBN technique has allowed updating of the probability of a known variable given a particular condition of the other variables. This updating function has enabled the key sensitivities to be determined

    Improving SIEM for critical SCADA water infrastructures using machine learning

    Get PDF
    Network Control Systems (NAC) have been used in many industrial processes. They aim to reduce the human factor burden and efficiently handle the complex process and communication of those systems. Supervisory control and data acquisition (SCADA) systems are used in industrial, infrastructure and facility processes (e.g. manufacturing, fabrication, oil and water pipelines, building ventilation, etc.) Like other Internet of Things (IoT) implementations, SCADA systems are vulnerable to cyber-attacks, therefore, a robust anomaly detection is a major requirement. However, having an accurate anomaly detection system is not an easy task, due to the difficulty to differentiate between cyber-attacks and system internal failures (e.g. hardware failures). In this paper, we present a model that detects anomaly events in a water system controlled by SCADA. Six Machine Learning techniques have been used in building and evaluating the model. The model classifies different anomaly events including hardware failures (e.g. sensor failures), sabotage and cyber-attacks (e.g. DoS and Spoofing). Unlike other detection systems, our proposed work helps in accelerating the mitigation process by notifying the operator with additional information when an anomaly occurs. This additional information includes the probability and confidence level of event(s) occurring. The model is trained and tested using a real-world dataset

    Overview of Remaining Useful Life prediction techniques in Through-life Engineering Services

    Get PDF
    Through-life Engineering Services (TES) are essential in the manufacture and servicing of complex engineering products. TES improves support services by providing prognosis of run-to-failure and time-to-failure on-demand data for better decision making. The concept of Remaining Useful Life (RUL) is utilised to predict life-span of components (of a service system) with the purpose of minimising catastrophic failure events in both manufacturing and service sectors. The purpose of this paper is to identify failure mechanisms and emphasise the failure events prediction approaches that can effectively reduce uncertainties. It will demonstrate the classification of techniques used in RUL prediction for optimisation of products’ future use based on current products in-service with regards to predictability, availability and reliability. It presents a mapping of degradation mechanisms against techniques for knowledge acquisition with the objective of presenting to designers and manufacturers ways to improve the life-span of components
    • …
    corecore