Detecting Control Injection Attacks Using Energy Data Anomalies in Computer Numerical Control Machining

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The widespread adoption of networked devices, sophisticated automation and data-driven processes in industry – also known as Industry 4.0 – has boosted the quantity and quality of manufacturing products. However, the benefits come with substantial increases in the attack surfaces of manufacturing processes and systems. In addition to affecting the quality and readiness of critical products, attacks against manufacturing processes and systems can have severe physical consequences, including human injury and death. This chapter presents the results of remote network-based control injection attacks on a computer numerical control mill. The focus is on the impacts of attacks during computer numerical control mill operation. A machine-agnostic, affordable and scalable solution for attack monitoring is developed by considering the physical effects of the attacks on wax workpieces. A simple threshold-based method for detecting attacks is demonstrated and its effectiveness is evaluated.

Original languageEnglish
Title of host publicationCritical Infrastructure Protection XVIII - 18th IFIP WG 11.10 International Conference, ICCIP 2024, Proceedings
EditorsJason Staggs, Sujeet Shenoi
PublisherSpringer Science and Business Media Deutschland GmbH
Pages43-63
Number of pages21
ISBN (Print)9783031818875
DOIs
StatePublished - 2025
Event18th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2024 - Arlington, United States
Duration: Mar 18 2024Mar 19 2024

Publication series

NameIFIP Advances in Information and Communication Technology
Volume725 IFIPAICT
ISSN (Print)1868-4238
ISSN (Electronic)1868-422X

Conference

Conference18th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2024
Country/TerritoryUnited States
CityArlington
Period03/18/2403/19/24

Funding

This material is based on work supported by the U.S. Department of Energy Office of Energy Efficiency and Renewable Energy (EERE) under the Advanced Materials and Manufacturing Technologies Office (AMMTO) Award no. DE-EE0009046.

Keywords

  • Attack Detection
  • Attack Quantification
  • Manufacturing Cyber Security
  • Power Analysis

Fingerprint

Dive into the research topics of 'Detecting Control Injection Attacks Using Energy Data Anomalies in Computer Numerical Control Machining'. Together they form a unique fingerprint.

Cite this