%0 Conference Proceedings %T A Plant-Wide Industrial Process Control Security Problem %+ Royal Holloway [University of London] (RHUL) %+ HP Information Security UK Limited %+ Gjøvik University College %A Mcevoy, Thomas %A Wolthusen, Stephen %Z Part 2: CONTROL SYSTEMS SECURITY %< avec comité de lecture %( IFIP Advances in Information and Communication Technology %B 5th International Conference Critical Infrastructure Protection (ICCIP) %C Hanover, NH, United States %Y Jonathan Butts %Y Sujeet Shenoi %I Springer %3 Critical Infrastructure Protection V %V AICT-367 %P 47-56 %8 2011-03-23 %D 2011 %R 10.1007/978-3-642-24864-1_4 %K Industrial control systems %K subversion detection %Z Computer Science [cs]Conference papers %X Industrial control systems are a vital part of the critical infrastructure. The potentially large impact of a failure makes them attractive targets for adversaries. Unfortunately, simplistic approaches to intrusion detection using protocol analysis or naïve statistical estimation techniques are inadequate in the face of skilled adversaries who can hide their presence with the appearance of legitimate actions.This paper describes an approach for identifying malicious activity that involves the use of a path authentication mechanism in combination with state estimation for anomaly detection. The approach provides the ability to reason conjointly over computational structures, and operations and physical states. The well-known Tennessee Eastman reference problem is used to illustrate the efficacy of the approach. %G English %Z TC 11 %Z WG 11.10 %2 https://inria.hal.science/hal-01571781/document %2 https://inria.hal.science/hal-01571781/file/978-3-642-24864-1_4_Chapter.pdf %L hal-01571781 %U https://inria.hal.science/hal-01571781 %~ IFIP %~ IFIP-AICT %~ IFIP-TC %~ IFIP-TC11 %~ IFIP-ICCIP %~ IFIP-WG11-10 %~ IFIP-AICT-367