(419g) Limitations of Control-Theoretic Control System Cyberattack Detection for Distributed Control Leading to Cost/Benefit Analysis for Control System Cybersecurity
AIChE Annual Meeting
2022
2022 Annual Meeting
Topical Conference: Next-Gen Manufacturing
Cybersecurity and High-Performance Computing in Next-Gen Manufacturing
Tuesday, November 15, 2022 - 5:42pm to 6:00pm
Cyberattacks targeting hardware components and software have potential to cause adverse events resulting in the loss of control of a process. Detection and removal of a cyberattack is critical for keeping processes online. In the case of centralized control, where a single controller operates the process, detection methods have been developed to flag cyberattacks on a system, however to direct attack removal methods it is important to diagnose which specific components are being attacked (e.g. a compromised thermocouple which is sending false temperature readings). Distributed control frameworks, which utilize communicating networks of controllers operating on process subsystems and are potentially attractive for reducing computation time of control actions for large scale processes, have an increased number of components and communication links that could facilitate their attack. However, distributed control also has potential to operate processes safely in the event that a controller or subsystem must be taken offline (due to, for example, an attack diagnosed on a certain part of the system), making cyberattack diagnosis critical for continuous operation. Thus, distributed control seems as though it may be attractive for applications in cyberattack resilient ICS frameworks.
Despite the seeming promise of distributed control architectures for handling cyberattacks on control systems, we discuss how the extension of the integrated cyberattack detection and control strategies in [4] can proceed in a straightforward manner. We discuss a variety of concepts for attempting to cause the larger number of controllers to cross-check one another to attempt to obtain a degree of agreement among controllers that the system appears to be functioning appropriately. However, attempts to diagnose and validate the operation of the system through cross-checking can add cost due to redundancy and complexity, and showcase the value in seeking solutions to the cyberattack diagnosis problem that go beyond breaking the system up into many cross-validating components. We also discuss closed-loop stability considerations which govern when removal of attacked distributed control components may be feasible, and what those conditions imply about how attackers could gain the upper hand over the distributed detection system by taking control of it when it is in a condition from which removal of a component does not permit stabilization by the remaining controllers when the attacked actuators have a certain policy. We conclude by discussing how our work fits within the context of information technology-based approaches, and how one might begin to think about comparing the use of control-theoretic cybersecurity measures with information technology approaches, with cost/benefit analyses for pairings of different technologies.
[1] Candell, Richard, et al. "A cybersecurity testbed for industrial control systems." Proceedings of the 2014 Process Control and Safety Symposium. (2014).
[2] Iaiani, Matteo, et al. "Analysis of past cybersecurity-related incidents in the process industry and the like." Chemical Engineering Transactions 82 (2020): 163-168.
[3] McLaughlin, Stephen, et al. "The cybersecurity landscape in industrial control systems." Proceedings of the IEEE 104.5 (2016): 1039-1057.
[4] Oyama, Henrique, and Durand, Helen. "Integrated cyberattack detection and resilient control strategies using Lyapunovâbased economic model predictive control." AIChE Journal 66.12 (2020): e17084.