Digital Twin-Based Cyber-Attack Detection Framework for Cyber-Physical Manufacturing Systems

被引:37
作者
Balta, Efe C. [2 ]
Pease, Michael [1 ]
Moyne, James [2 ]
Barton, Kira [2 ]
Tilbury, Dawn M. [2 ]
机构
[1] Natl Inst Stand & Technol, Gaithersburg, MD USA
[2] Univ Michigan, Dept Mech Engn, Ann Arbor, MI 48109 USA
基金
美国国家科学基金会;
关键词
Cyberattack; Process control; Manufacturing; Monitoring; Scalability; Industrial Internet of Things; Digital twins; Anomaly detection; control systems; cyberattack; cyber-physical systems; data analysis; digital twins; fault detection; intelligent automation; manufacturing automation; model checking; security; FAULT-DETECTION; SENSOR ATTACKS; SUPPORT; MODEL; SELECTION; SERVICE; DRIVEN; FUTURE;
D O I
10.1109/TASE.2023.3243147
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart manufacturing (SM) systems utilize run-time data to improve productivity via intelligent decision-making and analysis mechanisms on both machine and system levels. The increased adoption of cyber-physical systems in SM leads to the comprehensive framework of cyber-physical manufacturing systems (CPMS) where data-enabled decision-making mechanisms are coupled with cyber-physical resources on the plant floor. Due to their cyber-physical nature, CPMS are susceptible to cyber-attacks that may cause harm to the manufacturing system, products, or even the human workers involved in this context. Therefore, detecting cyber-attacks efficiently and timely is a crucial step toward implementing and securing high-performance CPMS in practice. This paper addresses two key challenges to CPMS cyber-attack detection. The first challenge is distinguishing expected anomalies in the system from cyber-attacks. The second challenge is the identification of cyber-attacks during the transient response of CPMS due to closed-loop controllers. Digital twin (DT) technology emerges as a promising solution for providing additional insights into the physical process (twin) by leveraging run-time data, models, and analytics. In this work, we propose a DT framework for detecting cyber-attacks in CPMS during controlled transient behavior as well as expected anomalies of the physical process. We present a DT framework and provide details on structuring the architecture to support cyber-attack detection. Additionally, we present an experimental case study on off-the-shelf 3D printers to detect cyber-attacks utilizing the proposed DT framework to illustrate the effectiveness of our proposed approach. Note to Practitioners-This work is motivated by developing a general-purpose and extensible digital twin-enabled cyber-attack detection framework for manufacturing systems. Existing works in the field consider specialized attack scenarios and models that may not be extensible in practical manufacturing scenarios. We utilize digital twin (DT) technology as a key enabler to develop a systematic and extensible framework where we identify the abnormality of a resource and detect if the abnormality is due to an attack or an expected anomaly. We provide several remarks on how our proposed framework can extend existing industrial control systems (ICS) and can accommodate further extensions. The presented DTs utilize data-driven machine learning models, physics-based models, and subject matter expert knowledge to perform detection and differentiation tasks in the context of expected anomalies and model-based controllers that control the manufacturing process between multiple setpoints. We utilize a model predictive controller on an off-the-shelf 3D printer to run the process, and stage anomalies and cyber-attacks that are successfully detected by the proposed framework.
引用
收藏
页码:1695 / 1712
页数:18
相关论文
共 55 条
[1]  
[Anonymous], WORKSH ADV IM TECHN
[2]  
[Anonymous], 2007, Statistical Process Control, DOI 10.4324/9780080551739
[3]  
Balta EC, 2019, IEEE INT CON AUTO SC, P823, DOI [10.1109/coase.2019.8843166, 10.1109/COASE.2019.8843166]
[4]  
Balta EC, 2018, IEEE INT CON AUTO SC, P1071, DOI 10.1109/COASE.2018.8560434
[5]   Production as a Service: A Digital Manufacturing Framework for Optimizing Utilization [J].
Balta, Efe C. ;
Lin, Yikai ;
Barton, Kira ;
Tilbury, Dawn M. ;
Mao, Z. Morley .
IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2018, 15 (04) :1483-1493
[6]  
Belikovetsky S., 2017, Proceedings of the 11th USENIX Conference on Offensive Technologies, USENIX Association, Vancouver, BC, Canada, P1
[7]   Digital Audio Signature for 3D Printing Integrity [J].
Belikovetsky, Sofia ;
Solewicz, Yosef A. ;
Yampolskiy, Mark ;
Toh, Jinghui ;
Elovici, Yuval .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (05) :1127-1141
[8]   Least squares one-class support vector machine [J].
Choi, Young-Sik .
PATTERN RECOGNITION LETTERS, 2009, 30 (13) :1236-1240
[9]   Mitigating Sensor Attacks Against Industrial Control Systems [J].
Combita, Luis F. ;
Cardenas, Alvaro A. ;
Quijano, Nicanor .
IEEE ACCESS, 2019, 7 :92444-92455
[10]   Smart manufacturing, manufacturing intelligence and demand-dynamic performance [J].
Davis, Jim ;
Edgar, Thomas ;
Porter, James ;
Bernaden, John ;
Sarli, Michael .
COMPUTERS & CHEMICAL ENGINEERING, 2012, 47 :145-156