An Optimal Design of a Moving Target Defense for Attack Detection in Control Systems

被引:22
作者
Griffioen, Paul [1 ]
Weerakkody, Sean [1 ]
Sinopoli, Bruno [1 ,2 ]
机构
[1] Carnegie Mellon Univ, Dept Elect & Comp Engn, Pittsburgh, PA 15213 USA
[2] Washington Univ, Dept Elect & Syst Engn, St Louis, MO 63110 USA
来源
2019 AMERICAN CONTROL CONFERENCE (ACC) | 2019年
基金
美国国家科学基金会;
关键词
D O I
10.23919/acc.2019.8814689
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we consider the problem of designing system parameters to improve detection of attacks in control systems. Specifically, we study control systems which are vulnerable to integrity attacks on sensors and actuators. We aim to defend against strong model aware adversaries that can read and modify all sensors and actuators. Previous work has proposed a moving target defense for detecting integrity attacks on control systems. Here, an authenticating subsystem with time-varying dynamics coupled to the original plant is introduced. Due to this coupling, an attack on the original system will affect the authenticating subsystem and in turn be revealed by a set of sensors measuring the extended plant. Moreover, the time-varying dynamics of the extended plant act as a moving target, preventing an adversary from developing an effective adaptive attack strategy. Previous work has failed to consider the design of the time-varying system matrices and as such provides little in terms of guidelines for implementation in real systems. This paper proposes two optimization problems for designing these matrices. The first designs the auxiliary actuators to maximize detection performance while the second designs the coupling matrices to maximize system estimation performance. Numerical examples are presented that validate our approach.
引用
收藏
页码:4527 / 4534
页数:8
相关论文
共 21 条
[1]  
[Anonymous], 1974, Complex Stochastic Processes: An Introduction to Theory and Application
[2]  
Cardenas Alvaro A., 2008, 2008 28th International Conference on Distributed Computing Systems Workshops (ICDCS Workshops), P495, DOI 10.1109/ICDCS.Workshops.2008.40
[3]   Stuxnet, the Real Start of Cyber Warfare? [J].
Chen, Thomas M. .
IEEE NETWORK, 2010, 24 (06) :2-3
[4]  
Grebeck M., 1998, TFRT7576 LTH DEP AUT, VTFRT-7576
[5]   The quadruple-tank process: A multivariable laboratory process with an adjustable zero [J].
Johansson, KH .
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2000, 8 (03) :456-465
[6]  
Lee RM, 2016, Analysis of the Cyber Attack on the Ukrainian Power Grid
[7]  
Miao F, 2014, IEEE DECIS CONTR P, P5776, DOI 10.1109/CDC.2014.7040293
[8]   PHYSICAL AUTHENTICATION OF CONTROL SYSTEMS DESIGNING WATERMARKED CONTROL INPUTS TO DETECT COUNTERFEIT SENSOR OUTPUTS [J].
Mo, Yilin ;
Weerakkody, Sean ;
Sinopoli, Bruno .
IEEE CONTROL SYSTEMS MAGAZINE, 2015, 35 (01) :93-109
[9]   False Data Injection Attacks against State Estimation in Wireless Sensor Networks [J].
Mo, Yilin ;
Garone, Emanuele ;
Casavola, Alessandro ;
Sinopoli, Bruno .
49TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2010, :5967-5972
[10]   Secure Control Against Replay Attacks [J].
Mo, Yilin ;
Sinopoli, Bruno .
2009 47TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1 AND 2, 2009, :911-918