Jump to main content
US EPA
United States Environmental Protection Agency
Search
Search
Main menu
Environmental Topics
Laws & Regulations
About EPA
Health & Environmental Research Online (HERO)
Contact Us
Print
Feedback
Export to File
Search:
This record has one attached file:
Add More Files
Attach File(s):
Display Name for File*:
Save
Citation
Tags
HERO ID
7137662
Reference Type
Journal Article
Title
Securing a Cyber Physical System in Nuclear Power Plants Using Least Square Approximation and Computational Geometric Approach
Author(s)
Gawand, HL; Bhattacharjee, AK; Roy, K; ,
Year
2017
Is Peer Reviewed?
1
Journal
Nuclear Engineering and Technology
ISSN:
1738-5733
Publisher
KOREAN NUCLEAR SOC
Location
DAEJEON
Volume
49
Issue
3
Page Numbers
484-494
DOI
10.1016/j.net.2016.10.009
Web of Science Id
WOS:000404665000004
Abstract
In industrial plants such as nuclear power plants, system operations are performed by embedded controllers orchestrated by Supervisory Control and Data Acquisition (SCADA) software. A targeted attack (also termed a control aware attack) on the controller/SCADA software can lead a control system to operate in an unsafe mode or sometimes to complete shutdown of the plant. Such malware attacks can result in tremendous cost to the organization for recovery, cleanup, and maintenance activity. SCADA systems in operational mode generate huge log files. These files are useful in analysis of the plant behavior and diagnostics during an ongoing attack. However, they are bulky and difficult for manual inspection. Data mining techniques such as least squares approximation and computational methods can be used in the analysis of logs and to take proactive actions when required. This paper explores methodologies and algorithms so as to develop an effective monitoring scheme against control aware cyber attacks. It also explains soft computation techniques such as the computational geometric method and least squares approximation that can be effective in monitor design. This paper provides insights into diagnostic monitoring of its effectiveness by attack simulations on a four-tank model and using computation techniques to diagnose it. Cyber security of instrumentation and control systems used in nuclear power plants is of paramount importance and hence could be a possible target of such applications. Copyright (C) 2017, Published by Elsevier Korea LLC on behalf of Korean Nuclear Society.
Keywords
Cyber Physical Systems (CPS); Convexity; Computational Geometry; Least Square Approximation (LSA); DataStream Analysis; Nuclear Power Plant (NPP); Real-time Control System; Sequential Probability Ratio Test (SPRT); Cumulative Sum (CUSUM); Security
Home
Learn about HERO
Using HERO
Search HERO
Projects in HERO
Risk Assessment
Transparency & Integrity