Detecting cyber attacks on nuclear power plants

Julian Rrushi, Roy Campbell

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

This paper proposes an unconventional anomaly detection approach that provides digital instrumentation and control (I&C) systems in a nuclear power plant (NPP) with the capability to probabilistically discern between legitimate protocol frames and attack frames. The stochastic activity network (SAN) formalism is used to model the fusion of protocol activity in each digital I&C system and the operation of physical components of an NPP. SAN models are employed to analyze links between protocol frames as streams of bytes, their semantics in terms of NPP operations, control data as stored in the memory of I&C systems, the operations of I&C systems on NPP components, and NPP processes. Reward rates and impulse rewards are defined in the SAN models based on the activity-marking reward structure to estimate NPP operation profiles. These profiles are then used to probabilistically estimate the legitimacy of the semantics and payloads of protocol frames received by I&C systems.

Original languageEnglish (US)
Title of host publicationCritical Infrastructure Protection II
EditorsMauricio Papa, Sujeet Shenoi
Pages41-54
Number of pages14
DOIs
StatePublished - 2008
Externally publishedYes

Publication series

NameIFIP International Federation for Information Processing
Volume290
ISSN (Print)1571-5736

Keywords

  • Instrusion detection
  • Nuclear plants
  • Stochastic activity networks

ASJC Scopus subject areas

  • Information Systems and Management

Fingerprint

Dive into the research topics of 'Detecting cyber attacks on nuclear power plants'. Together they form a unique fingerprint.

Cite this