An integrated data-driven scheme for the defense of typical cyber-physical attacks

被引:43
作者
Wu, Shimeng [1 ]
Jiang, Yuchen [1 ]
Luo, Hao [1 ]
Zhang, Jiusi [1 ]
Yin, Shen [2 ]
Kaynak, Okyay [3 ]
机构
[1] Harbin Inst Technol, Sch Astronaut, Dept Control Sci & Engn, Harbin, Peoples R China
[2] Norwegian Univ Sci & Technol, Fac Engn, Dept Mech & Ind Engn, N-7033 Trondheim, Norway
[3] Bogazici Univ, Dept Elect & Elect Engn, Istanbul, Turkey
基金
中国国家自然科学基金;
关键词
Cyber-physical attacks; Safety; Denoising auto-encoder; Secure transmission; Attack detection; DATA INJECTION ATTACKS; SECURITY; SYSTEMS; SAFETY;
D O I
10.1016/j.ress.2021.108257
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the frequent occurrence of safety incidents in cyber-physical systems (CPSs), great significance has been attached to the study of defense schemes against cyber-physical attacks. In this paper, an integrated data-driven defense scheme is proposed, which can sensitively detect data integrity attacks such as false data injection (FDI) attacks, denial-of-service (DoS) attacks, and replay attacks, and ensures secure transmission against eavesdropping attacks. Specifically, a novel deep learning model is designed so that both the online detection task and the encryption/decryption task can be completed under the same framework. The main idea is inspired by denoising auto-encoders whereas necessary changes are made to adapt to the challenges in the context of CPS attacks, and in light of this, the proposed approach is called modified denoising auto-encoder (MDAE). Unlike supervised classifier-based detectors, the proposed detector can retain sensitivity to unknown attacks because it is trained to learn the normal operation behavior. Moreover, to improve the detectability of the DoS and replay attacks on all data, the check code is designed. Encrypting the transmitted data through nonlinear mapping is achieved using the same MDAE, which prevents the attackers from recording useful information. Benefiting from the fact that the dimension of the variables is reduced after encryption, the transmission traffic can be saved. Simulation results on the measurement data instances generated by the IEEE 118-bus system validate the encryption effects and detection accuracy of the proposed scheme and show the superiority by comparison study.
引用
收藏
页数:9
相关论文
共 50 条
[31]   Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models [J].
Rao, Nageswara S. V. ;
Poole, Stephen W. ;
Ma, Chris Y. T. ;
He, Fei ;
Zhuang, Jun ;
Yau, David K. Y. .
RISK ANALYSIS, 2016, 36 (04) :694-710
[32]   A Double-Benefit Moving Target Defense Against Cyber-Physical Attacks in Smart Grid [J].
Zhang, Zhenyong ;
Tian, Youliang ;
Deng, Ruilong ;
Ma, Jianfeng .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (18) :17912-17925
[33]   Smart I/O Modules for Mitigating Cyber-Physical Attacks on Industrial Control Systems [J].
Pearce, Hammond ;
Pinisetty, Srinivas ;
Roop, Partha S. ;
Kuo, Matthew M. Y. ;
Ukil, Abhisek .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (07) :4659-4669
[34]   POSTER: Defense against False Data Injection Attack in a Cyber-Physical System [J].
Padhan, Sushree ;
Turuk, Ashok Kumar .
PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, :1943-1945
[35]   A Formal Approach to Cyber-Physical Attacks [J].
Lanotte, Ruggero ;
Merro, Massimo ;
Muradore, Riccardo ;
Vigano, Luca .
2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, :436-450
[36]   Reflective Attenuation of Cyber-Physical Attacks [J].
Segovia, Mariana ;
Cavalli, Ana Rosa ;
Cuppens, Nora ;
Rubio-Hernan, Jose ;
Garcia-Alfaro, Joaquin .
COMPUTER SECURITY, ESORICS 2019, 2020, 11980 :19-34
[37]   Integrity Attacks on Cyber-Physical Systems [J].
Mo, Yilin ;
Sinopoli, Bruno .
HICONS 12: PROCEEDINGS OF THE 1ST ACM INTERNATIONAL CONFERENCE ON HIGH CONFIDENCE NETWORKED SYSTEMS, 2012, :47-54
[38]   Detection of Stealthy False Data Injection Attacks Against Cyber-Physical Systems: A Stochastic Coding Scheme [J].
Guo, Haibin ;
Pang, Zhonghua ;
Sun, Jian ;
Li, Jun .
JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2022, 35 (05) :1668-1684
[39]   Detection of Stealthy False Data Injection Attacks Against Cyber-Physical Systems: A Stochastic Coding Scheme [J].
Haibin Guo ;
Zhonghua Pang ;
Jian Sun ;
Jun Li .
Journal of Systems Science and Complexity, 2022, 35 :1668-1684
[40]   Detection and Performance Compensation for Linear ?-Stealthy Attacks in Cyber-Physical Systems [J].
Li, Pengyu ;
Ye, Dan .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2023, 10 (03) :1338-1349