State Compression and Quantitative Assessment Model for Assessing
Security Risks in the Oil and Gas Transmission Systems
- URL: http://arxiv.org/abs/2112.14137v1
- Date: Tue, 28 Dec 2021 13:35:40 GMT
- Title: State Compression and Quantitative Assessment Model for Assessing
Security Risks in the Oil and Gas Transmission Systems
- Authors: Hisham A. Kholidy
- Abstract summary: The SCADA system is the foundation of the large-scale industrial control system.
It is widely used in industries of petrochemistry, electric power, pipeline, etc.
The natural gas SCADA system is among the critical infrastructure systems that have security issues related to trusted communications.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The SCADA system is the foundation of the large-scale industrial control
system. It is widely used in industries of petrochemistry, electric power,
pipeline, etc. The natural gas SCADA system is among the critical
infrastructure systems that have security issues related to trusted
communications in transactions at the control system layer, and lack
quantitative risk assessment and mitigation models. However, to guarantee the
security of the Oil and Gas Transmission SCADA systems (OGTSS), there should be
a holistic security system that considers the nature of these SCADA systems. In
this paper, we augment our Security Awareness Framework with two new
contributions, (i) a Data Quantization and State Compression Approach (DQSCA)
that improves the classification accuracy, speeds up the detection algorithm,
and reduces the computational resource consumption. DQSCA reduces the size of
processed data while preserving original key events and patterns within the
datasets. (ii) A quantitative risk assessment model that carries out regular
system information security evaluation and assessment on the SCADA system using
a deductive process. Our experiments denote that DQSCA has a low negative
impact on the reduction of the detection accuracy (2.45% and 4.45%) while it
reduces the detection time much (27.74% and 42.06%) for the Turnipseed and Gao
datasets respectively. Furthermore, the mean absolute percentage error (MAPE)
rate for the proposed risk assessment model is lower than the intrusion
response system (Suricata) for the DOS, Response Injection, and Command
Injection attacks by 59.80%, 73.72%, and 66.96% respectively.
Related papers
- AI-in-the-Loop Sensing and Communication Joint Design for Edge Intelligence [65.29835430845893]
We propose a framework that enhances edge intelligence through AI-in-the-loop joint sensing and communication.
A key contribution of our work is establishing an explicit relationship between validation loss and the system's tunable parameters.
We show that our framework reduces communication energy consumption by up to 77 percent and sensing costs measured by the number of samples by up to 52 percent.
arXiv Detail & Related papers (2025-02-14T14:56:58Z) - EARBench: Towards Evaluating Physical Risk Awareness for Task Planning of Foundation Model-based Embodied AI Agents [53.717918131568936]
Embodied artificial intelligence (EAI) integrates advanced AI models into physical entities for real-world interaction.
Foundation models as the "brain" of EAI agents for high-level task planning have shown promising results.
However, the deployment of these agents in physical environments presents significant safety challenges.
This study introduces EARBench, a novel framework for automated physical risk assessment in EAI scenarios.
arXiv Detail & Related papers (2024-08-08T13:19:37Z) - ABCD: Trust enhanced Attention based Convolutional Autoencoder for Risk Assessment [0.0]
Anomaly detection in industrial systems is crucial for preventing equipment failures, ensuring risk identification, and maintaining overall system efficiency.
Traditional monitoring methods often rely on fixed thresholds and empirical rules, which may not be sensitive enough to detect subtle changes in system health and predict impending failures.
This paper proposes Attention-based convolutional autoencoder (ABCD) for risk detection and map the risk value derive to the maintenance planning.
ABCD learns the normal behavior of conductivity from historical data of a real-world industrial cooling system and reconstructs the input data, identifying anomalies that deviate from the expected patterns.
arXiv Detail & Related papers (2024-04-24T20:15:57Z) - Deep Generative Attacks and Countermeasures for Data-Driven Offline Signature Verification [2.0368479127360093]
This study investigates the vulnerabilities of data-driven offline signature verification (DASV) systems to generative attacks.
We explore the efficacy of Variversaational Autoencoders (VAEs) and Conditional Generative Adrial Networks (CGANs) in creating deceptive signatures that challenge DASV systems.
arXiv Detail & Related papers (2023-12-02T00:58:34Z) - KnowSafe: Combined Knowledge and Data Driven Hazard Mitigation in
Artificial Pancreas Systems [3.146076597280736]
KnowSafe predicts and mitigates safety hazards resulting from safety-critical malicious attacks or accidental faults targeting a CPS controller.
We integrate domain-specific knowledge of safety constraints and context-specific mitigation actions with machine learning (ML) techniques.
KnowSafe outperforms the state-of-the-art by achieving higher accuracy in predicting system state trajectories and potential hazards.
arXiv Detail & Related papers (2023-11-13T16:43:34Z) - Leveraging Traceability to Integrate Safety Analysis Artifacts into the
Software Development Process [51.42800587382228]
Safety assurance cases (SACs) can be challenging to maintain during system evolution.
We propose a solution that leverages software traceability to connect relevant system artifacts to safety analysis models.
We elicit design rationales for system changes to help safety stakeholders analyze the impact of system changes on safety.
arXiv Detail & Related papers (2023-07-14T16:03:27Z) - Quality-Based Conditional Processing in Multi-Biometrics: Application to
Sensor Interoperability [63.05238390013457]
We describe and evaluate the ATVS-UAM fusion approach submitted to the quality-based evaluation of the 2007 BioSecure Multimodal Evaluation Campaign.
Our approach is based on linear logistic regression, in which fused scores tend to be log-likelihood-ratios.
Results show that the proposed approach outperforms all the rule-based fusion schemes.
arXiv Detail & Related papers (2022-11-24T12:11:22Z) - Risk Verification of Stochastic Systems with Neural Network Controllers [0.0]
We present a data-driven framework for verifying the risk of dynamical systems with neural network (NN) controllers.
Given a control system, an NN controller, and a specification equipped with a notion of trace robustness, we collect trajectories from the system.
We compute risk metrics over these robustness values to estimate the risk that the NN controller will not satisfy the specification.
arXiv Detail & Related papers (2022-08-26T20:09:55Z) - Recursively Feasible Probabilistic Safe Online Learning with Control Barrier Functions [60.26921219698514]
We introduce a model-uncertainty-aware reformulation of CBF-based safety-critical controllers.
We then present the pointwise feasibility conditions of the resulting safety controller.
We use these conditions to devise an event-triggered online data collection strategy.
arXiv Detail & Related papers (2022-08-23T05:02:09Z) - No Need to Know Physics: Resilience of Process-based Model-free Anomaly
Detection for Industrial Control Systems [95.54151664013011]
We present a novel framework to generate adversarial spoofing signals that violate physical properties of the system.
We analyze four anomaly detectors published at top security conferences.
arXiv Detail & Related papers (2020-12-07T11:02:44Z) - Securing of Unmanned Aerial Systems (UAS) against security threats using
human immune system [1.2691047660244335]
An Intrusion Detection System (IDS) has been proposed to protect against the security problems using the human immune system (HIS)
The IDSs are used to detect and respond to attempts to compromise the target system.
arXiv Detail & Related papers (2020-03-01T19:05:16Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.