Model Based Approach for Cyber-Physical Attacks Detection in Water Distribution Systems

Mashor Housh, Ziv Ohar

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Water distribution systems (WDSs) operation relies on a set of rules and conditions aimed at maintaining a reliable water supply. The WDS operation is often controlled by supervisory control and data acquisition (SCADA) and programmable logic controllers (PLCs). As such, with the SCADA becoming a central component of WDSs these systems can be subjected to cyber-attacks. This paper offer a methodology for identifying cyber-attacks based on logical rules that are based on detailed hydraulic understanding of the WDS combined with a machine learning event detection system for identification of complex cyber-attacks that cannot be fully identified by the hydraulic based rules alone.

Original languageEnglish
Title of host publicationWorld Environmental and Water Resources Congress 2017
Subtitle of host publicationHydraulics and Waterways and Water Distribution Systems Analysis - Selected Papers from the World Environmental and Water Resources Congress 2017
EditorsBrian Van Weele, Christopher N. Dunn
PublisherAmerican Society of Civil Engineers (ASCE)
Pages727-736
Number of pages10
ISBN (Electronic)9780784480625
DOIs
StatePublished - 2017
Event17th World Environmental and Water Resources Congress 2017 - Sacramento, United States
Duration: 21 May 201725 May 2017

Publication series

NameWorld Environmental and Water Resources Congress 2017: Hydraulics and Waterways and Water Distribution Systems Analysis - Selected Papers from the World Environmental and Water Resources Congress 2017

Conference

Conference17th World Environmental and Water Resources Congress 2017
Country/TerritoryUnited States
CitySacramento
Period21/05/1725/05/17

Bibliographical note

Publisher Copyright:
© ASCE.

ASJC Scopus subject areas

  • General Environmental Science

Fingerprint

Dive into the research topics of 'Model Based Approach for Cyber-Physical Attacks Detection in Water Distribution Systems'. Together they form a unique fingerprint.

Cite this