An integrated data-driven scheme for the defense of typical cyber-physical attacks

被引:43
作者
Wu, Shimeng [1 ]
Jiang, Yuchen [1 ]
Luo, Hao [1 ]
Zhang, Jiusi [1 ]
Yin, Shen [2 ]
Kaynak, Okyay [3 ]
机构
[1] Harbin Inst Technol, Sch Astronaut, Dept Control Sci & Engn, Harbin, Peoples R China
[2] Norwegian Univ Sci & Technol, Fac Engn, Dept Mech & Ind Engn, N-7033 Trondheim, Norway
[3] Bogazici Univ, Dept Elect & Elect Engn, Istanbul, Turkey
基金
中国国家自然科学基金;
关键词
Cyber-physical attacks; Safety; Denoising auto-encoder; Secure transmission; Attack detection; DATA INJECTION ATTACKS; SECURITY; SYSTEMS; SAFETY;
D O I
10.1016/j.ress.2021.108257
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the frequent occurrence of safety incidents in cyber-physical systems (CPSs), great significance has been attached to the study of defense schemes against cyber-physical attacks. In this paper, an integrated data-driven defense scheme is proposed, which can sensitively detect data integrity attacks such as false data injection (FDI) attacks, denial-of-service (DoS) attacks, and replay attacks, and ensures secure transmission against eavesdropping attacks. Specifically, a novel deep learning model is designed so that both the online detection task and the encryption/decryption task can be completed under the same framework. The main idea is inspired by denoising auto-encoders whereas necessary changes are made to adapt to the challenges in the context of CPS attacks, and in light of this, the proposed approach is called modified denoising auto-encoder (MDAE). Unlike supervised classifier-based detectors, the proposed detector can retain sensitivity to unknown attacks because it is trained to learn the normal operation behavior. Moreover, to improve the detectability of the DoS and replay attacks on all data, the check code is designed. Encrypting the transmitted data through nonlinear mapping is achieved using the same MDAE, which prevents the attackers from recording useful information. Benefiting from the fact that the dimension of the variables is reduced after encryption, the transmission traffic can be saved. Simulation results on the measurement data instances generated by the IEEE 118-bus system validate the encryption effects and detection accuracy of the proposed scheme and show the superiority by comparison study.
引用
收藏
页数:9
相关论文
共 50 条
[21]   Cross-layered distributed data-driven framework for enhanced smart grid cyber-physical security [J].
Starke, Allen ;
Nagaraj, Keerthiraj ;
Ruben, Cody ;
Aljohani, Nader ;
Zou, Sheng ;
Bretas, Arturo ;
McNair, Janise ;
Zare, Alina .
IET SMART GRID, 2022, 5 (06) :398-416
[22]   Data-Driven Based Cruise Control of Connected and Automated Vehicles Under Cyber-Physical System Framework [J].
Zhang, Tao ;
Zou, Yuan ;
Zhang, Xudong ;
Guo, Ningyuan ;
Wang, Wenwei .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2021, 22 (10) :6307-6319
[23]   Detection Scheme Against Cyber-Physical Attacks on Load Frequency Control Based on Dynamic Characteristics Analysis [J].
Bi, Wenjun ;
Zhang, Kaifeng ;
Li, Yaping ;
Yuan, Kun ;
Wang, Ying .
IEEE SYSTEMS JOURNAL, 2019, 13 (03) :2859-2868
[24]   Modeling and Simulation of Attacks on Cyber-physical Systems [J].
Bernardeschi, Cinzia ;
Domenici, Andrea ;
Palmieri, Maurizio .
PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2019, :700-708
[25]   Formal Impact Metrics for Cyber-physical Attacks [J].
Lanotte, Ruggero ;
Merro, Massimo ;
Munteanu, Andrei ;
Tini, Simone .
2021 IEEE 34TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2021), 2021, :361-376
[26]   Data-driven attack policy design for cyber-physical systems under channel constraints [J].
Liu, He ;
Li, Xiao-Jian .
INFORMATION SCIENCES, 2024, 677
[27]   Data-Driven Monitoring and Safety Control of Industrial Cyber-Physical System: Basics and Beyond [J].
Jiang, Yuchen ;
Yin, Shen ;
Kaynak, Okyay .
IEEE ACCESS, 2018, 6 :47374-47384
[28]   Reachability Analysis of Cyber-Physical Systems Under Stealthy Attacks [J].
Zhang, Qirui ;
Liu, Kun ;
Pang, Zhonghua ;
Xia, Yuanqing ;
Liu, Tao .
IEEE TRANSACTIONS ON CYBERNETICS, 2022, 52 (06) :4926-4934
[29]   Permutation entropy based detection scheme of replay attacks in industrial cyber-physical systems [J].
Zhou, Mei ;
Zhang, Zhengdao ;
Xie, Linbo .
JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2021, 358 (07) :4058-4076
[30]   Robust protection scheme against cyber-physical attacks in power systems [J].
Di Giorgio, Alessandro ;
Pietrabissa, Antonio ;
Delli Priscoli, Francesco ;
Isidori, Alberto .
IET CONTROL THEORY AND APPLICATIONS, 2018, 12 (13) :1792-1801