Detecting and Mitigating Actuator Attacks on Cloud Control Systems through Digital Twins

Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceedingpeer-review

22 Downloads (Pure)

Abstract

Recently, the industry has been driven to move industrial control systems to the cloud due to the significant advantages it offers in terms of storage and computing resources. However, this shift also brings forth significant security challenges. By moving control systems to the cloud, the potential for attackers to infiltrate the system and launch damaging attacks increases. These attacks can result in severe disruptions and potentially catastrophic consequences. Hence, attack detection and mitigation mechanisms are crucial for cloud control systems. In this paper, we present an approach that leverages the digital twins concept and virtual actuator method to detect and mitigate deception attacks on control signals within cloud control systems. By conducting experiments on a real testbed and subjecting it to a set of attacks, we validate the effectiveness of our solution. Our proposed method successfully detects attacks in a timely manner and keeps the plant stable, with a good performance during the attack.
Original languageEnglish
Title of host publicationThe 31st International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2023)
PublisherIEEE - Institute of Electrical and Electronics Engineers Inc.
ISBN (Print)979-8-3503-0107-6
DOIs
Publication statusAccepted/In press - 2023
Event31st International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2023 - Split, Croatia
Duration: 2023 Sept 212023 Sept 23

Conference

Conference31st International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2023
Country/TerritoryCroatia
CitySplit
Period2023/09/212023/09/23

Subject classification (UKÄ)

  • Computer Systems

Fingerprint

Dive into the research topics of 'Detecting and Mitigating Actuator Attacks on Cloud Control Systems through Digital Twins'. Together they form a unique fingerprint.

Cite this