Attack Detection and Approximation in Nonlinear Networked Control Systems Using Neural Networks

被引:36
作者
Niu, Haifeng [1 ,2 ]
Bhowmick, Chandreyee [3 ]
Jagannathan, Sarangapani [3 ]
机构
[1] Missouri Univ Sci & Technol, Rolla, MO 65409 USA
[2] Amazon, Seattle, WA USA
[3] Missouri Univ Sci & Technol, Dept Elect Engn, Rolla, MO 65401 USA
基金
美国国家科学基金会;
关键词
Artificial neural networks; Communication networks; Delays; Sensors; Observers; Actor-critic network; attack detection; attack estimation; event-triggered control; flow control; networked control system (NCS); neural network (NN); optimal control; CYBER-PHYSICAL SYSTEMS; DESIGN; DEFENSE;
D O I
10.1109/TNNLS.2019.2900430
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In networked control systems (NCS), a certain class of attacks on the communication network is known to raise traffic flows causing delays and packet losses to increase. This paper presents a novel neural network (NN)-based attack detection and estimation scheme that captures the abnormal traffic flow due to a class of attacks on the communication links within the feedback loop of an NCS. By modeling the unknown network flow as a nonlinear function at the bottleneck node and using a NN observer, the network attack detection residual is defined and utilized to determine the onset of an attack in the communication network when the residual exceeds a predefined threshold. Upon detection, another NN is used to estimate the flow injected by the attack. For the physical system, we develop an attack detection scheme by using an adaptive dynamic programming-based optimal event-triggered NN controller in the presence of network delays and packet losses. Attacks on the network as well as on the sensors of the physical system can be detected and estimated with the proposed scheme. The simulation results confirm theoretical conclusions.
引用
收藏
页码:235 / 245
页数:11
相关论文
共 26 条
[1]  
Altman E, 1995, PROCEEDINGS OF THE 34TH IEEE CONFERENCE ON DECISION AND CONTROL, VOLS 1-4, P1389, DOI 10.1109/CDC.1995.480294
[2]  
Altman E., 1993, Data Communication Networks and their Performance, P121
[3]  
ardenas C, 2011, ASIACCS, P355, DOI DOI 10.1145/1966913.1966959
[4]  
Baumann H., 2012, Proceedings of the 2012 20th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP 2012), P298, DOI 10.1109/PDP.2012.29
[5]   Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks [J].
Fawzi, Hamza ;
Tabuada, Paulo ;
Diggavi, Suhas .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (06) :1454-1467
[6]   On generalized max-min rate allocation and distributed convergence algorithm for packet networks [J].
Hou, YT ;
Panwar, SS ;
Tzeng, HHY .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2004, 15 (05) :401-416
[7]   Predictive congestion control of ATM networks: multiple sources/single buffer scenario [J].
Jagannathan, S ;
Talluri, J .
AUTOMATICA, 2002, 38 (05) :815-820
[8]  
Keshav Srinivasan., 1991, In proceeding of SIGCOMM 1991,ACM SIGCOMM, P188
[9]  
Lee P., 2013, Control of Cyber-Physical Systems, P161
[10]   Detecting False Data Injection Attacks on Power Grid by Sparse Optimization [J].
Liu, Lanchao ;
Esmalifalak, Mohammad ;
Ding, Qifeng ;
Emesih, Valentine A. ;
Han, Zhu .
IEEE TRANSACTIONS ON SMART GRID, 2014, 5 (02) :612-621