{"id":907,"date":"2017-08-21T09:37:33","date_gmt":"2017-08-21T07:37:33","guid":{"rendered":"https:\/\/samovar2022.int-evry.fr\/index.php\/2017\/08\/21\/detection-des-attaques-contre-les-systemes-cyber-physiques-industriels\/"},"modified":"2020-09-04T18:46:08","modified_gmt":"2020-09-04T16:46:08","slug":"detection-des-attaques-contre-les-systemes-cyber-physiques-industriels","status":"publish","type":"post","link":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/2017\/08\/21\/detection-des-attaques-contre-les-systemes-cyber-physiques-industriels\/","title":{"rendered":"\u00ab D\u00e9tection des attaques contre les syst\u00e8mes cyber-physiques industriels \u00bb"},"content":{"rendered":"<p>L&rsquo;Ecole doctorale EDITE &#8211; Ecole doctorale informatique, t\u00e9l\u00e9communications et \u00e9lectronique et T\u00e9l\u00e9com SudParis avec le Laboratoire de recherche SAMOVAR<br \/>\npr\u00e9sentent<\/p>\n<p>L\u2019AVIS DE SOUTENANCE de <strong>Monsieur Jos\u00e9 Manuel RUBIO HERNAN<\/strong><br \/>\nAutoris\u00e9 \u00e0 pr\u00e9senter ses travaux en vue de l\u2019obtention du Doctorat de T\u00e9l\u00e9com SudParis avec l&rsquo;Universit\u00e9 Paris 6 en :<br \/>\nInformatique et R\u00e9seaux<br \/>\n\u00ab D\u00e9tection des attaques contre les syst\u00e8mes cyber-physiques industriels \u00bb<\/p>\n<p><strong>le 18 juillet 2017 \u00e0 10H00 &#8211; Salle A003<\/p>\n<p>T\u00e9l\u00e9com SudParis &#8211; 9 rue Charles Fourier &#8211; 91000 EVRY<\/strong><\/p>\n<p><em>Membres du jury :<\/em><\/p>\n<table>\n<tbody>\n<tr class='row_even'>\n<td>Directeur de th\u00e8se <\/td>\n<td> Joaquin GARCIA-ALFARO &#8211; Professeur &#8211; T\u00e9l\u00e9com SudParis<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><em>Rapporteurs :<\/em><\/p>\n<table>\n<tbody>\n<tr class='row_even'>\n<td>Yves ROUDIER <\/td>\n<td> Professeur &#8211; Universit\u00e9 de Nice<\/td>\n<\/tr>\n<tr class='row_odd'>\n<td>Pascal LAFOURCADE <\/td>\n<td> Professeur &#8211; Universit\u00e9 d&rsquo;Auvergne<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><em>Examinateurs :<\/em><\/p>\n<table>\n<tbody>\n<tr class='row_even'>\n<td>Pierre SENS <\/td>\n<td>Professeur &#8211; LIP6<\/td>\n<\/tr>\n<tr class='row_odd'>\n<td>Urko ZURUTUZA <\/td>\n<td> Ma\u00eetre de Conf\u00e9rences- Universit\u00e9 Mondragon<\/td>\n<\/tr>\n<tr class='row_even'>\n<td>Fr\u00e9d\u00e9ric CUPPENS <\/td>\n<td>Professeur- T\u00e9l\u00e9com Bretagne<\/td>\n<\/tr>\n<tr class='row_odd'>\n<td>Jean LENEUTRE <\/td>\n<td> Ma\u00eetre de Conf\u00e9rences &#8211; T\u00e9l\u00e9com ParisTech<\/td>\n<\/tr>\n<tr class='row_even'>\n<td>Ana CAVALLI <\/td>\n<td> Professeure Em\u00e9rite &#8211; T\u00e9l\u00e9com SudParis<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><em>Co-Encadrant :<\/em> <\/p>\n<table>\n<tbody>\n<tr class='row_even'>\n<td>Luca DE CICCO <\/td>\n<td> Ma\u00eetre de Conf\u00e9rences &#8211; Politecnico di Bari<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>R\u00e9sum\u00e9 :<\/strong><\/p>\n<p>Nous abordons des probl\u00e8mes de s\u00e9curit\u00e9 dans des syst\u00e8mes cyber-physiques industriels. Les attaques contre ces syst\u00e8mes doivent \u00eatre trait\u00e9es \u00e0 la fois en mati\u00e8re de s\u00fbret\u00e9 et de s\u00e9curit\u00e9. Les technologies de contr\u00f4le impos\u00e9s par les normes industrielles, couvrent d\u00e9j\u00e0 la s\u00fbret\u00e9. Cependant, du point de vue de la s\u00e9curit\u00e9, la litt\u00e9rature a prouv\u00e9 que l\u2019utilisation de techniques cyber pour traiter la s\u00e9curit\u00e9 de ces syst\u00e8mes n\u2019est pas suffisante, car les actions physiques malveillantes seront ignor\u00e9es. Pour cette raison, on a besoin de m\u00e9canismes pour prot\u00e9ger les deux couches \u00e0 la fois. Certains auteurs ont trait\u00e9 des attaques de rejeu et d\u2019int\u00e9grit\u00e9 en utilisant une attestation physique, p. ex., le tatouage des param\u00e8tres physiques du syst\u00e8me. N\u00e9anmoins, ces d\u00e9tecteurs fonctionnent correctement uniquement si les adversaires n\u2019ont pas assez de connaissances pour tromper les deux couches.<br \/>\nCette th\u00e8se porte sur les limites mentionn\u00e9es ci-dessus. Nous commen\u00e7ons en testant l\u2019efficacit\u00e9 d\u2019un d\u00e9tecteur qui utilise une signature stationnaire afin de d\u00e9tecter des actions malveillantes. Nous montrons que ce d\u00e9tecteur est incapable d\u2019identifier les adversaires cyber-physiques qui tentent de conna\u00eetre la dynamique du syst\u00e8me. Nous analysons son ratio de d\u00e9tection sous la pr\u00e9sence de nouveaux adversaires capables de d\u00e9duire la dynamique du syst\u00e8me. Nous revisitons le design original, en utilisant une signature non stationnaire, afin de g\u00e9rer les adversaires visant \u00e0 \u00e9chapper \u00e0 la d\u00e9tection. Nous proposons \u00e9galement une nouvelle approche qui combine des strat\u00e9gies de contr\u00f4le et de communication. Toutes les solutions son valid\u00e9es \u00e0 l\u2019aide de simulations et maquettes d\u2019entra\u00eenement.<\/p>\n<p><strong>Abstract :<\/strong><\/p>\n<p>We address security issues in cyber-physical industrial systems. Attacks against these systems shall be handled both in terms of safety and security. Control technologies imposed by industrial standards already cover the safety dimension. From a security standpoint, the literature has shown that using only cyber information to handle the security of cyber-physical systems is not enough, since physical malicious actions are ignored. For this reason, cyber-physical systems have to be protected from threats to their cyber and physical layers. Some authors handle the attacks by using physical attestations of the underlying processes, f.i., physical watermarking to ensure the truthfulness of the process. However, these detectors work properly only if the adversaries do not have enough knowledge to mislead crosslayer data.<br \/>\nThis thesis focuses on the aforementioned limitations. It starts by testing the effectiveness of a stationary watermark-based fault detector, to detect, as well, malicious actions produced by adversaries. We show that the stationary watermark-based detector is unable to identify cyber-physical adversaries. We show that the approach only detects adversaries that do not attempt to get any knowledge about the system dynamics. We analyze the detection performance of the original design under the presence of adversaries that infer the system dynamics to evade detection. We revisit the original design, using a non-stationary watermark-based design, to handle those adversaries. We also propose a novel approach that combines control and communication strategies. We validate our solutions using numeric simulations and training cyber-physical testbeds.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>L&rsquo;Ecole doctorale EDITE &#8211; Ecole doctorale informatique, t\u00e9l\u00e9communications et \u00e9lectronique et T\u00e9l\u00e9com SudParis avec le Laboratoire de recherche SAMOVAR pr\u00e9sentent L\u2019AVIS DE SOUTENANCE de Monsieur Jos\u00e9 Manuel RUBIO HERNAN Autoris\u00e9 \u00e0 pr\u00e9senter ses travaux en vue de l\u2019obtention du Doctorat de T\u00e9l\u00e9com SudParis avec l&rsquo;Universit\u00e9 Paris 6 en : Informatique et R\u00e9seaux \u00ab D\u00e9tection des [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":906,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[344],"tags":[],"class_list":["post-907","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-theses-2017-fr","entry","has-media"],"_links":{"self":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/posts\/907","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/comments?post=907"}],"version-history":[{"count":1,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/posts\/907\/revisions"}],"predecessor-version":[{"id":1589,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/posts\/907\/revisions\/1589"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/media\/906"}],"wp:attachment":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/media?parent=907"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/categories?post=907"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/tags?post=907"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}