Skip to main content
U.S. Department of Energy
Office of Scientific and Technical Information

Towards a Cyber Defense Framework for SCADA Systems Based on Power Consumption Monitoring

Conference ·
OSTI ID:1356903

Supervisory control and data acquisition (SCADA) is an industrial automation system that remotely monitor, and control critical infrastructures. SCADA systems are major targets for espionage and sabotage attackers. According to the 2015 Dell security annual threat report, the number of cyber-attacks against SCADA systems has doubled in the past year. Cyber-attacks (i.e., buffer overflow, rootkits and code injection) could cause serious financial losses and physical infrastructure damages. Moreover, some specific cyber-attacks against SCADA systems could become a threat to human life. Current commercial off-the-shelf security solutions are insufficient in protecting SCADA systems against sophisticated cyber-attacks. In 2014 a report by Mandiant stated that only 69% of organizations learned about their breaches from third entities, meaning that these companies lack of their own detection system. Furthermore, these breaches are not detected in real-time or fast enough to prevent further damages. The average time between compromise and detection (for those intrusions that were detected) was 205 days. To address this challenge, we propose an Intrusion Detection System (IDS) that detects SCADA-specific cyber-attacks by analyzing the power consumption of a SCADA device. Specifically, to validate the proposed approach, we chose to monitor in real-time the power usage of a a Programmable Logic Controller (PLC). To this end, we configured the hardware of the tetsbed by installing the required sensors to monitor and collect its power consumption. After that two SCADA-specific cyber-attacks were simulated and TracerDAQ Pro was used to collect the power consumption of the PLC under normal and anomalous scenarios. Results showed that is possible to distinguish between the regular power usage of the PLC and when the PLC was under specific cyber-attacks.

Research Organization:
Oak Ridge National Laboratory (ORNL), Oak Ridge, TN (United States)
Sponsoring Organization:
ORNL LDRD Seed-Money
DOE Contract Number:
AC05-00OR22725
OSTI ID:
1356903
Country of Publication:
United States
Language:
English

Similar Records

An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications
Conference · Mon Dec 31 23:00:00 EST 2012 · OSTI ID:1111444

Security Evaluation of Two Intrusion Detection Systems in Smart Grid SCADA Environment
Conference · Sat Sep 01 00:00:00 EDT 2018 · 2018 North American Power Symposium (NAPS) · OSTI ID:1985687

Testbed-based Evaluation of SIEM Tool for Cyber Kill Chain Model in Power Grid SCADA System
Conference · Tue Oct 01 00:00:00 EDT 2019 · 2019 North American Power Symposium (NAPS) · OSTI ID:1985678

Related Subjects