Detection of Covert Cyber-Attacks in Interconnected Systems: A Distributed Model-Based Approach

被引:80
作者
Barboni, Angelo [1 ]
Rezaee, Hamed [1 ]
Boem, Francesca [2 ]
Parisini, Thomas [1 ,3 ,4 ]
机构
[1] Imperial Coll London, Dept Elect & Elect Engn, London SW7 2AZ, England
[2] UCL, Dept Elect & Elect Engn, London WC1E 7JE, England
[3] Univ Trieste, Dept Engn & Architecture, I-34127 Trieste, Italy
[4] Univ Cyprus, KIOS Res & Innovat Ctr Excellence, CY-1678 Nicosia, Cyprus
基金
英国工程与自然科学研究理事会; 欧盟地平线“2020”;
关键词
Observers; Symmetric matrices; Silicon; Interconnected systems; Monitoring; Large-scale systems; Benchmark testing; Attack detection; covert attack; cyber-physical systems; large-scale systems; NETWORKED CONTROL-SYSTEMS; FAULT-DETECTION; NONLINEAR-SYSTEMS; SECURE CONTROL; DESIGN;
D O I
10.1109/TAC.2020.2998765
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed detection of covert attacks for linear large-scale interconnected systems is addressed in this article. Existing results consider the problem in centralized settings. This article focuses on large-scale systems subject to bounded process and measurement disturbances, where a single subsystem is under a covert attack. A detection methodology is proposed, where each subsystem can detect the presence of covert attacks in neighboring subsystems in a distributed manner. The detection strategy is based on the design of two model-based observers for each subsystem using only local information. An extensive detectability analysis is provided and simulation results on a power network benchmark are given, showing the effectiveness of the proposed methodology for the detection of covert cyber-attacks.
引用
收藏
页码:3728 / 3741
页数:14
相关论文
共 42 条
[31]   Distributed fault detection for interconnected second-order systems [J].
Shames, Iman ;
Teixeira, Andre M. H. ;
Sandberg, Henrik ;
Johansson, Karl H. .
AUTOMATICA, 2011, 47 (12) :2757-2764
[32]   COVERT MISAPPROPRIATION OF NETWORKED CONTROL SYSTEMS PRESENTING A FEEDBACK STRUCTURE [J].
Smith, Roy S. .
IEEE CONTROL SYSTEMS MAGAZINE, 2015, 35 (01) :82-92
[33]   Consensus Based Overlapping Decentralized Fault Detection and Isolation [J].
Stankovic, Srdjan ;
Ilic, Nemanja ;
Djurovic, Zeljko ;
Stankovic, Milos ;
Johansson, Karl Henrik .
2010 CONFERENCE ON CONTROL AND FAULT-TOLERANT SYSTEMS (SYSTOL'10), 2010, :570-575
[34]   LOGARITHMIC NORMS [J].
STROM, T .
SIAM JOURNAL ON NUMERICAL ANALYSIS, 1975, 12 (05) :741-753
[35]   A secure control framework for resource-limited adversaries [J].
Teixeira, Andre ;
Shames, Iman ;
Sandberg, Henrik ;
Johansson, Karl Henrik .
AUTOMATICA, 2015, 51 :135-148
[36]  
Teixeira A, 2012, ANN ALLERTON CONF, P1806, DOI 10.1109/Allerton.2012.6483441
[37]  
Teixeira A, 2010, P AMER CONTR CONF, P3690
[38]  
Urbina DI, 2016, CCS 16, P1092, DOI 10.1145/2976749.2978388
[39]   L2-GAIN ANALYSIS OF NONLINEAR-SYSTEMS AND NONLINEAR STATE FEEDBACK-H-INFINITY CONTROL [J].
VANDERSCHAFT, AJ .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 1992, 37 (06) :770-784
[40]   A Graph-Theoretic Characterization of Perfect Attackability for Secure Design of Distributed Control Systems [J].
Weerakkody, Sean ;
Liu, Xiaofei ;
Son, Sang Hyuk ;
Sinopoli, Bruno .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (01) :60-70