Yissum - Research Development Company of the Hebrew University

Takeover Detection for Cyber Defense at the Industrial Control Systems

Posted by Yissum - Research Development Company of the Hebrew UniversityResponsive · Innovative Products and Technologies · Israel

Summary of the technology

detection of a cyber takeover of the monitored Industrial Control Systems and critical infrastructures, even in the presence of successful sensor hijacking
Project ID : 46-2019-10804

Description of the technology

Category

Computer science and Engineering

Keywords

Cyber Security, Legacy Systems

Current stage

TRL2 Technology Concept Formulated; Looking for industrial design partners.

Application

Cyber-attacks on industrial control systems and critical infrastructure may cause mass poisoning, nuclear reactor meltdowns, floods and power grid failures. Sensor hijacking is particularly harmful threat scenario. It was demonstrated during famous Stuxnet attack that sabotaged the Iranian nuclear program in a frightening demonstration of the firepower of cyber-attacks against ICS.

Not only cyber attackers attempt to gain control over the industrial system, they can also feed false information into the system’s sensors, creating a false impression of nominal system behavior at the control room, and keeping the ongoing attack covert while doing harm.

Our Innovation

The researchers are developing an ICS Takeover Detection System (ICS-TDS), aimed to detect a cyber takeover of the monitored ICS, even in the presence of successful sensor hijacking.

The research is built on two separate recent theoretical advances by researcher, which enable novel
estimation of the intrinsic state of a dynamical system, in a manner that is robust to noise and invariant to changes in the ICS sensor array.

The detection systems we proposed would be stand-alone systems that continuously monitor the ICS without interrupting its function. Historic recordings of the intrinsic trajectory of the system enable detection of subtle anomalies using unsupervised methods, and sophisticated detection of sensor hijacking using supervised methods.

Opportunity

It is widely recognized that military conflicts in the near future will necessarily include a significant component of cyber warfare. Of the possible venues of cyber warfare, the most menacing is hostile
cyber-takeovers of Industrial Control Systems (ICS) and critical infrastructure.
This application describes a significant effort in cyber security of ICS, bringing together theory,
algorithms and engineering

Project manager

Anna Pellivert
VP, BUSINESS DEVELOPMENT

Project researchers

Matan Gavish
HUJI, School of Computer Science and Engineering
Computer Science

Related keywords

  • Information Processing, Information System, Workflow Management
  • IT and Telematics Applications
  • Multimedia
  • Computers
  • Computer Graphics Related
  • Specialised Turnkey Systems
  • Scanning Related
  • Peripherals
  • Computer Services
  • Computer Software Market
  • Other Computer Related
  • Computer Science & Engineering
  • Cyber

About Yissum - Research Development Company of the Hebrew University

Technology Transfer Office from Israel

Yissum Research Development Company of the Hebrew University of Jerusalem Ltd. Founded in 1964 to protect and commercialize the Hebrew University’s intellectual property. Ranked among the top technology transfer companies, Yissum has registered over 8,900 patents covering 2,500 inventions; has licensed out 800 technologies and has spun-off 90 companies. Products that are based on Hebrew University technologies and were commercialized by Yissum generate today over $2 Billion in annual sales.

Send your request

By clicking "Send your request" you are signing up and accepting our Terms of Service and Privacy policy

Technology Offers on Innoget are directly posted and managed by its members as well as evaluation of requests for information. Innoget is the trusted open innovation and science network aimed at directly connect industry needs with professionals online.