Simulation of Cyber-Physical Attacks on Water Distribution Systems with EPANET

Riccardo Taormina, Stefano Galelli, Nils Ole Tippenhauer, Elad Salomons, Avi Ostfeld

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

In this work, we discuss the use of EPANET to simulate the effects of malicious cyber-physical attacks on water distribution systems. EPANET-a standard numerical modeling environment developed by the US Environmental Protection Agency-models hydraulic and water-quality behavior of pressurized pipe networks. EPANET promises to be well suited to show the effects of direct attacks on hydraulic actuators, such as pumps, or the effects of attacks on sensors. Using the C-Town benchmark network, we show that EPANET has some limitations when modeling these attacks, and we report the workarounds needed to overcome these limitations. In particular, we describe attacks that change the control strategies of pumps, and attacks that alter the tank water level reported by sensors.

Original languageEnglish
Title of host publicationPROCEEDINGS OF THE SINGAPORE CYBER-SECURITY CONFERENCE (SG-CRC) 2016: CYBER-SECURITY BY DESIGN
Subtitle of host publicationCyber-Security by Design
EditorsAbhik Roychoudhury, Aditya Mathur
Pages123-130
Number of pages8
Volume14
ISBN (Electronic)9781614996163
DOIs
StatePublished - 2016
Event1st Singapore-Cybersecurity R and D Conference, SG-CRC 2016 - Singapore, Singapore
Duration: 14 Jan 201615 Jan 2016

Publication series

NameCryptology and Information Security Series

Conference

Conference1st Singapore-Cybersecurity R and D Conference, SG-CRC 2016
Country/TerritorySingapore
CitySingapore
Period14/01/1615/01/16

Keywords

  • Water Distribution Systems
  • Cyber-Physical System Security
  • EPANET

ASJC Scopus subject areas

  • Information Systems
  • Computer Science Applications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Simulation of Cyber-Physical Attacks on Water Distribution Systems with EPANET'. Together they form a unique fingerprint.

Cite this