Replay Attack Detection for Cyber-Physical Control Systems: A Dynamical Delay Estimation Method

被引:7
作者
Zhao, Dong [1 ]
Yang, Bo [2 ]
Li, Yueyang [3 ]
Zhang, Hui [4 ]
机构
[1] Beihang Univ, Sch Cyber Sci & Technol, Beijing 100191, Peoples R China
[2] Sichuan Univ, Dept Management Sci & Data Sci, Chengdu 610065, Peoples R China
[3] Univ Jinan, Sch Elect Engn, Jinan 250022, Peoples R China
[4] Beihang Univ, Sch Transportat Sci & Engn, Beijing 102206, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
Control systems; Correlation; Anomaly detection; Watermarking; Detectors; Delay estimation; Time series analysis; Cyber-physical systems; delay estimation; replay attack detection; DETECTION SCHEME;
D O I
10.1109/TIE.2024.3406859
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber attack detection plays a crucial role in ensuring cyber security of control systems. However, the reported methods for cyber attack detection often rely on large-scale upgrades of field modules or modification of specific monitoring signals. The resulting issues, such as impacts on system control performance or economic losses, make these methods challenging to be widely accepted in practice. To address this challenge, this article proposes a new replay attack detection scheme, combining dynamical system characteristics and data-driven implementation, while the scheme only needs to be implemented in the control and monitoring side. Specifically, considering the effect of replay attacks and the response of the control system, a dynamical delay estimation method is proposed for detecting replay attacks. Thus, the detection logic is established by characterizing and comparing the fluctuation ranges of dynamical delay. A sliding window is adopted for quantifying the dynamical delay between the input and output data of the cyber-physical control system. Moreover, the randomized algorithm method is introduced to determine the initial value of the delay estimation method, while the online updating of dynamical delay estimation is given for real-time replay attack detection. To highlight the replay attack effect, a novel window adaptive strategy is developed to achieve adaptive detection and tracking of replay attacks. Finally, the performance and effectiveness of the proposed detection method are verified through experiments on chlorosilane distillation.
引用
收藏
页码:867 / 875
页数:9
相关论文
共 36 条
[1]   Data Poisoning Attacks in Internet-of-Vehicle Networks: Taxonomy, State-of-The-Art, and Future Directions [J].
Chen, Yanjiao ;
Zhu, Xiaotian ;
Gong, Xueluan ;
Yi, Xinjing ;
Li, Shuyang .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (01) :20-28
[2]   Multichannel Domain Adaptation Graph Convolutional Networks-Based Fault Diagnosis Method and With Its Application [J].
Chen, Zhiwen ;
Ke, Haobin ;
Xu, Jiamin ;
Peng, Tao ;
Yang, Chunhua .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (06) :7790-7800
[3]   A Data-Driven Health Monitoring Method Using Multiobjective Optimization and Stacked Autoencoder Based Health Indicator [J].
Chen, Zhiwen ;
Guo, Rongjie ;
Lin, Zhi ;
Peng, Tao ;
Peng, Xia .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (09) :6379-6389
[4]   Contrastive graph neural network-based camouflaged fraud detector [J].
Deng, Zexuan ;
Xin, Guodong ;
Liu, Yang ;
Wang, Wei ;
Wang, Bailing .
INFORMATION SCIENCES, 2022, 618 :39-52
[5]   A systems and control perspective of CPS security [J].
Dibaji, Seyed Mehran ;
Pirani, Mohammad ;
Flamholz, David Bezalel ;
Annaswamy, Anuradha M. ;
Johansson, Karl Henrik ;
Chakrabortty, Aranya .
ANNUAL REVIEWS IN CONTROL, 2019, 47 :394-411
[6]   Application of the unified control and detection framework to detecting stealthy integrity cyber-attacks on feedback control systems [J].
Ding, Steven X. ;
Li, Linlin ;
Zhao, Dong ;
Louen, Chris ;
Liu, Tianyu .
AUTOMATICA, 2022, 142
[7]   Application of randomized algorithms to assessment and design of observer-based fault detection systems [J].
Ding, Steven X. ;
Li, Linlin ;
Krueger, Minjia .
AUTOMATICA, 2019, 107 :175-182
[8]   Attack Detection for Networked Control Systems Using Event-Triggered Dynamic Watermarking [J].
Du, Dajun ;
Zhang, Changda ;
Li, Xue ;
Fei, Minrui ;
Zhou, Huiyu .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (01) :351-361
[9]   Optimal periodic watermarking schedule for replay attack detection in cyber-physical systems [J].
Fang, Chongrong ;
Qi, Yifei ;
Cheng, Peng ;
Zheng, Wei Xing .
AUTOMATICA, 2020, 112
[10]   A Switching Multiplicative Watermarking Scheme for Detection of Stealthy Cyber-Attacks [J].
Ferrari, Riccardo M. G. ;
Teixeira, Andre M. H. .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (06) :2558-2573