Proactive attack detection scheme based on watermarking and moving target defense

被引:4
|
作者
Liu, Hao [1 ]
Zhang, Yewei [2 ]
Li, Yuzhe [3 ]
Niu, Ben [4 ]
机构
[1] Hubei Univ Sci & Technol, Sch Automat, Xianning 437100, Peoples R China
[2] Shenyang Aerosp Univ, Coll Aerosp Engn, Shenyang 110136, Peoples R China
[3] Northeastern Univ, State Key Lab Synthet Automation Proc Ind, Shenyang 110004, Peoples R China
[4] Shandong Normal Univ, Sch Informat Sci & Engn, Jinan 250014, Peoples R China
关键词
Cyber-physical system; Cyber attacks; Unknown-but-bounded noises; Moving target defense; Watermarking; GUARANTEED STATE ESTIMATION; ZONOTOPES; FRAMEWORK;
D O I
10.1016/j.automatica.2023.111163
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, the attack detection problem is investigated for cyber-physical systems (CPSs) with unknown-but-bounded (UBB) noises. A new hybrid proactive detection scheme is proposed to detect stealthy attacks by combining watermarking and moving target (MT). The designed abnormal detector is based on the residual of the zonotopic observer which can be utilized to estimate states of the system with UBB noises. We prove that the approach proposed in this work does not introduce any performance loss in the absence of attacks. The proposed active detection framework can be employed to detect various types of attacks, such as denial-of-service (DoS), replay and covert attacks. Finally, numerical examples are provided to demonstrate the effectiveness of the proposed methods. & COPY; 2023 Elsevier Ltd. All rights reserved.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] Proactive defense mechanism: Enhancing IoT security through diversity-based moving target defense and cyber deception
    Rehman, Zubaida
    Gondal, Iqbal
    Ge, Mengmeng
    Dong, Hai
    Gregory, Mark
    Tari, Zahir
    COMPUTERS & SECURITY, 2024, 139
  • [22] A novel image watermarking scheme based on amplitude attack
    Hsieh, Chaur-Heh
    Liao, Chi-Jen
    PATTERN RECOGNITION, 2007, 40 (04) : 1342 - 1354
  • [23] A Novel Moving Target Defense Scheme With Physical Unclonable Functions-Based Authentication
    Liu, Chuan-Gang
    IEEE ACCESS, 2022, 10 : 23051 - 23062
  • [24] Moving Target Defense Technique Based on Network Attack Surface Self-Adaptive Mutation
    Lei C.
    Ma D.-H.
    Zhang H.-Q.
    Yang Y.-J.
    Wang L.-M.
    Ma, Duo-He (maduohe@iie.ac.cn), 2018, Science Press (41): : 1109 - 1131
  • [25] Moving target defense controller of mobile system based on Openflow sensor security scheme
    Niu, Xin
    Lu, Jiazhong
    COMPUTER COMMUNICATIONS, 2020, 161 (161) : 142 - 149
  • [26] ShuffleCAN: Enabling Moving Target Defense for Attack Mitigation on Automotive CAN
    Qian, Huiping
    Han, Hao
    Zhu, Xiaojun
    Xu, Fengyuan
    2023 19TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING, MSN 2023, 2023, : 351 - 358
  • [27] A successful attack and revision of a chaotic system based fragile watermarking scheme for image tamper detection
    Botta, Marco
    Cavagnino, Davide
    Pomponiu, Victor
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2015, 69 (01) : 242 - 245
  • [28] Research on moving target defense based on SDN
    Chen, Mingyong
    Wu, Weimin
    GREEN ENERGY AND SUSTAINABLE DEVELOPMENT I, 2017, 1864
  • [29] A Blockchain-Based Copyright Protection Scheme With Proactive Defense
    Chen, Xiaohu
    Yang, Anjia
    Weng, Jian
    Tong, Yao
    Huang, Cheng
    Li, Tao
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (04) : 2316 - 2329
  • [30] A proactive defense scheme based on the cooperation of intrusion deception and traceback
    Tian, Junfeng
    Li, Ning
    Wang, Zhiqiang
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 502 - +