Correlation-Based Deception Attack Detection for Cyber-Physical Control Systems With Multiple-Security Level Transmission Channels

被引:0
作者
Xue, Xixing [1 ]
Wang, Junhong [2 ]
Shi, Yang [3 ]
Yu, Xiang [2 ]
Zhao, Dong [1 ]
机构
[1] Beihang Univ, Sch Cyber Sci & Technol, Beijing 100191, Peoples R China
[2] Beihang Univ, Sch Automat Sci & Elect Engn, Beijing 100191, Peoples R China
[3] Univ Victoria, Dept Mech Engn, Victoria, BC V8W 2Y2, Canada
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
Correlation; Covariance matrices; Security; Technological innovation; Detectors; Kalman filters; Encoding; Control systems; Noise; Informatics; Attack detection; correlation analysis; cyber-physical systems; deception attack; multichannels; DATA INJECTION ATTACKS;
D O I
10.1109/TII.2024.3523547
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, the deception attack detection problem is studied in scenarios involving multisecurity level transmission channels. Powerful attackers can construct stealthy deception attacks by exploiting data from reliable and unreliable channels. From the perspective of data correlation, we develop three detection schemes with different resource consumption. First, a fully security channel is utilized to establish innovation-based time-varying data correlation, which triggers residual covariance variation under attacks. Second, a noise-encryption mechanism is introduced without requiring the fully security channel. For the initial two methods, we propose a targeted optimization method to improve the detection performance by exploiting the quantified residual covariance variation. Third, we propose a time-shift coding method from the perspective of dynamic system stability, which is rigorously proved to be sensitive to attack behavior. For these proposed methods, we quantify the residual covariance variation induced by attacks and achieve detection by the chi(2) test and generalized likelihood ratio test. Finally, the efficiency and reliability of these detection schemes are validated by examples.
引用
收藏
页数:10
相关论文
共 29 条
  • [1] A New False Data Injection Attack Detection Model for Cyberattack Resilient Energy Forecasting
    Ahmadi, Amirhossein
    Nabipour, Mojtaba
    Taheri, Saman
    Mohammadi-Ivatloo, Behnam
    Vahidinasab, Vahid
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (01) : 371 - 381
  • [2] A systems and control perspective of CPS security
    Dibaji, Seyed Mehran
    Pirani, Mohammad
    Flamholz, David Bezalel
    Annaswamy, Anuradha M.
    Johansson, Karl Henrik
    Chakrabortty, Aranya
    [J]. ANNUAL REVIEWS IN CONTROL, 2019, 47 : 394 - 411
  • [3] Ding S. X, 2021, Advanced Methods for Fault Diagnosis and Fault-Tolerant Control
  • [4] Detecting False Data Injection Attacks in AC State Estimation
    Gu Chaojun
    Jirutitijaroen, Panida
    Motani, Mehul
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2015, 6 (05) : 2476 - 2483
  • [5] A Pattern Mining-Based False Data Injection Attack Detector for Industrial Cyber-Physical Systems
    Guibene, Khalil
    Messai, Nadhir
    Ayaida, Marwane
    Khoukhi, Lyes
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (02) : 2969 - 2978
  • [6] Optimal Linear Cyber-Attack on Remote State Estimation
    Guo, Ziyang
    Shi, Dawei
    Johansson, Karl Henrik
    Shi, Ling
    [J]. IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (01): : 4 - 13
  • [7] Kwon C, 2013, P AMER CONTR CONF, P3344
  • [8] Lee EA, 2008, ISORC 2008: 11TH IEEE SYMPOSIUM ON OBJECT/COMPONENT/SERVICE-ORIENTED REAL-TIME DISTRIBUTED COMPUTING - PROCEEDINGS, P363, DOI 10.1109/ISORC.2008.25
  • [9] Optimal energy constrained deception attacks in cyber-physical systems with multiple channels: A fusion attack approach
    Li, Yi-Gang
    Yang, Guang-Hong
    Wang, Xiangdong
    [J]. ISA TRANSACTIONS, 2023, 137 : 1 - 12
  • [10] Optimal completely stealthy attacks against remote estimation in cyber-physical systems
    Li, Yi-Gang
    Yang, Guang-Hong
    [J]. INFORMATION SCIENCES, 2022, 590 : 15 - 28