Detecting cyber attacks on nuclear power plants

14Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper proposes an unconventional anomaly detection approach that provides digital instrumentation and control (I&C) systems in a nuclear power plant (NPP) with the capability to probabilistically discern between legitimate protocol frames and attack frames. The stochastic activity network (SAN) formalism is used to model the fusion of protocol activity in each digital I&C system and the operation of physical components of an NPP. SAN models are employed to analyze links between protocol frames as streams of bytes, their semantics in terms of NPP operations, control data as stored in the memory of I&C systems, the operations of I&C systems on NPP components, and NPP processes. Reward rates and impulse rewards are defined in the SAN models based on the activity-marking reward structure to estimate NPP operation profiles. These profiles are then used to probabilistically estimate the legitimacy of the semantics and payloads of protocol frames received by I&C systems. © 2008 International Federation for Information Processing.

Cite

CITATION STYLE

APA

Rrushi, J., & Campbell, R. (2008). Detecting cyber attacks on nuclear power plants. IFIP International Federation for Information Processing, 290, 41–54. https://doi.org/10.1007/978-0-387-88523-0_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free