Building Automation Systems (BASs) were originally designed as isolated control systems, with the principles of high availability, reliability and trust. A major open protocol in BASs is BACnet/IP, allowing control of multiple building services, such as HVAC, lighting and access control over Internet Protocol connection. For ease of management and cloud-based analytics, BASs have been connected to corporate and remote networks, exposing them to potential cyber attack. Recent scans show over 15,000 directly accessible and identifiable BACnet devices over the Internet, with roughly 10% of said devices in Australia. The need for identifying network based attacks, which have Cyber-physical repercussions, is required. The research aims to address the lack of state-based Intrusion Detection, allowing for chains of normal commands with malicious purpose to be identified, and provide contextual decisions for network operators to act upon.
M. Peacock, M. N. Johnstone, and C. Valli, “Security issues with bacnet value handling,” in International Conference on Information Systems Security and Privacy, O. Camp, P. Mori, and S. Furnell, Eds., INSTICC. SCITEPRESS, February 2017, pp. 546–552.
B. Bettany, M N. Johnstone and M. Peacock An Investigation of Wireless Security Issues in the SCATS Traffic Light Control System The Proceedings of the 14th Australian Information Security Management Conference Held on 5th December – 6th December, 2016, Edith Cowan University, Joondalup Campus, Perth, Western Australia
M. N. Johnstone, M. Peacock, and J. den Hartog. (2015) Timing attack detection on BACnet via a machine learning approach. The Proceedings of the 13th Australian Information Security Management Conference, 57–64,Perth
Peacock, M. and Johnstone, M. N. (2014). An analysis of security issues in building automation systems. The Proceedings of the 12th Australian information security management conference, 100–104, Perth
Peacock, M., Johnstone, M., (2013), Towards detection and control of civilian unmanned aerial vehicles. The Proceedings of 14th Australian Information Warfare Conference, 9-15, Perth.
Please leave a comment about your rating so we can better understand how we might improve the page.