Secure control of cyber physical systems subject to stochastic distributed DoS and deception attacks

被引:41
作者
Mahmoud, Magdi S. [1 ]
Hamdan, Mutaz M. [1 ]
Baroudi, Uthman A. [2 ]
机构
[1] King Fahd Univ Petr & Minerals, Dept Syst Engn, POB 5067, Dhahran 31261, Saudi Arabia
[2] King Fahd Univ Petr & Minerals, Dept Comp Engn, Dhahran, Saudi Arabia
关键词
Cyber physical systems; distributed denial of service (DDoS) attack; deception attack; secure control system; RESILIENT CONTROL;
D O I
10.1080/00207721.2020.1772402
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber Physical Systems (CPS) such as power plants, water desalination utilities are just a few examples of systems that may come under stealth attacks. These attacks can threaten the proper operations of such systems without any indication. This problem necessitates the design of a control system that is able to work under such attacks. In this paper, an improved observer-based stabilising controller is proposed for CPS including random measurements and actuation delays and it is coming under distributed denial of service (DDoS) and deception attacks. The occurrences of DDoS and deception attacks are modelled as Bernoulli distributed white sequences with variable conditional probabilities. The criterion is presented in terms of linear matrix inequalities. Detailed simulation experiments on representative systems are shown to prove the applicability of the proposed methodology.
引用
收藏
页码:1653 / 1668
页数:16
相关论文
共 36 条
[1]   Secure design for cloud control system against distributed denial of service attack [J].
Ali Y. ;
Xia Y. ;
Ma L. ;
Hammad A. .
Control Theory and Technology, 2018, 16 (01) :14-24
[2]   Cyber Security of Water SCADA Systems-Part I: Analysis and Experimentation of Stealthy Deception Attacks [J].
Amin, Saurabh ;
Litrico, Xavier ;
Sastry, Shankar ;
Bayen, Alexandre M. .
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2013, 21 (05) :1963-1970
[3]   Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs [J].
Bai, Cheng-Zong ;
Pasqualetti, Fabio ;
Gupta, Vijay .
AUTOMATICA, 2017, 82 :251-260
[4]   A dependable architecture to mitigate distributed denial of service attacks on network-based control systems [J].
Beitollahi, Hakem ;
Deconinck, Geert .
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2011, 4 (3-4) :107-123
[5]  
De Persis C, 2014, IEEE DECIS CONTR P, P5254, DOI 10.1109/CDC.2014.7040210
[6]   A survey on security control and attack detection for industrial cyber-physical systems [J].
Ding, Derui ;
Han, Qing-Long ;
Xiang, Yang ;
Ge, Xiaohua ;
Zhang, Xian-Ming .
NEUROCOMPUTING, 2018, 275 :1674-1683
[7]   On scheduling of deception attacks for discrete-time networked systems equipped with attack detectors [J].
Ding, Derui ;
Wei, Guoliang ;
Zhang, Sunjie ;
Liu, Yurong ;
Alsaadi, Fuad E. .
NEUROCOMPUTING, 2017, 219 :99-106
[8]   Event-based security control for discrete-time stochastic systems [J].
Ding, Derui ;
Wang, Zidong ;
Wei, Guoliang ;
Alsaadi, Fuad E. .
IET CONTROL THEORY AND APPLICATIONS, 2016, 10 (15) :1808-1815
[9]   Event-Triggered Control Systems Under Denial-of-Service Attacks [J].
Dolk, V. S. ;
Tesi, P. ;
De Persis, C. ;
Heemels, W. P. M. H. .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (01) :93-105
[10]  
Dolk VS, 2015, IEEE DECIS CONTR P, P4824, DOI 10.1109/CDC.2015.7402972