Industrial Control Systems (ICSs) rely on insecure protocols and devices to monitor and operate critical infrastructure. Prior work has demonstrated that powerful attackers with detailed system knowledge can manipulate exchanged sensor data to deteriorate performance of the process, even leading to full shutdowns of plants. Identifying those attacks requires iterating over all possible sensor values, and running detailed system simulation or analysis to identify optimal attacks. That setup allows adversaries to identify attacks that are most impactful when applied on the system for the first time, before the system operators become aware of the manipulations. In this work, we investigate if constrained attackers without detailed system knowledge and simulators can identify comparable attacks. In particular, the attacker only requires abstract knowledge on general information flow in the plant, instead of precise algorithms, operating parameters, process models, or simulators. We propose an approach that allows single-shot attacks, i.e., near-optimal attacks that are reliably shutting down a system on the first try. The approach is applied and validated on two use cases, and demonstrated to achieve comparable results to prior work, which relied on detailed system information and simulations.
翻译:工业控制系统(ICS)依靠不安全的协议和装置来监测和操作关键基础设施。先前的工作表明,具有详细系统知识的强力攻击者可以操纵交换的传感器数据,使过程的性能恶化,甚至导致工厂全面关闭。识别这些攻击需要对所有可能的传感器值进行循环,并运行详细的系统模拟或分析,以确定最佳攻击。这种设置使对手能够在系统操作者了解操作操作之前,首次在系统上发现最有影响的攻击。在这项工作中,我们调查的是,没有详细系统知识和模拟器的受限制攻击者是否可以识别可比攻击。特别是,攻击者只需要对工厂的一般信息流有抽象的了解,而不是精确的算法、操作参数、过程模型或模拟器。我们建议一种允许单发攻击的方法,即近最佳攻击,这种攻击在系统第一次试验时可以可靠地关闭系统。在两个使用的情况下应用和验证了该方法,并证明该方法可以取得与以前的工作可比的结果,而以前的工作依赖于详细的系统信息和模拟。