Detection and mitigation of classes of attacks in supervisory control systems

被引:132
作者
Carvalho, Lilian Kawakami [1 ]
Wu, Yi-Chin [2 ,3 ]
Kwong, Raymond [4 ]
Lafortune, Stephane [2 ]
机构
[1] Univ Fed Rio de Janeiro, Dept Elect Engn, Rio De Janeiro, Brazil
[2] Univ Michigan, Dept EECS, Ann Arbor, MI 48109 USA
[3] Univ Calif Berkeley, Dept EECS, Berkeley, CA 94720 USA
[4] Univ Toronto, Dept ECE, Toronto, ON, Canada
基金
美国国家科学基金会; 加拿大自然科学与工程研究理事会;
关键词
Discrete event systems; Automata; Failure diagnosis; Cyber-attacks; POLYNOMIAL-TIME VERIFICATION; INTRUSION DETECTION; DIAGNOSABILITY;
D O I
10.1016/j.automatica.2018.07.017
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The deployment of control systems with network-connected components has made feedback control systems vulnerable to attacks over the network. This paper considers the problem of intrusion detection and mitigation in supervisory control systems, where the attacker has the ability to enable or disable vulnerable actuator commands and erase or insert vulnerable sensor readings. We present a mathematical model for the system under certain classes of actuator enablement attacks, sensor erasure attacks, or sensor insertion attacks. We then propose a defense strategy that aims to detect such attacks online and disables all controllable events after an attack is detected. We develop an algorithmic procedure for verifying whether the system can prevent damage from the attacks considered with the proposed defense strategy, where damage is modeled as the reachability of a pre-defined set of unsafe system states. The technical condition of interest that is necessary and sufficient in this context, termed "GF-safe controllability", is characterized. We show that the verification of GF-safe controllability can be performed using diagnoser or verifier automata. Finally, we illustrate the methodology with a traffic control system example. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:121 / 133
页数:13
相关论文
共 25 条
[1]  
Alves M.V. S., 2014, Proceedings of the 12th IFAC International Workshop on Discrete Event Systems, P294
[2]  
Cardenas Alvaro A., 2008, 2008 28th International Conference on Distributed Computing Systems Workshops (ICDCS Workshops), P495, DOI 10.1109/ICDCS.Workshops.2008.40
[3]  
Carvalho L K, 2018, ARXIV E PRINTS
[4]   Robust diagnosis of discrete event systems against intermittent loss of observations [J].
Carvalho, Lilian K. ;
Basilio, Joao C. ;
Moreira, Marcos V. .
AUTOMATICA, 2012, 48 (09) :2068-2078
[5]  
Carvalho LK, 2016, INT WORKS DISCRETE, P298, DOI 10.1109/WODES.2016.7497863
[6]  
Cassandras C. G., 2008, INTRO DISCRETE EVENT
[7]   Formal Approach to Multimodal Control Design: Application to Mode Switching [J].
Faraut, Gregory ;
Pietrac, Laurent ;
Niel, Eric .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2009, 5 (04) :443-453
[8]   A Survey of Attack and Defense Techniques for Reputation Systems [J].
Hoffman, Kevin ;
Zage, David ;
Nita-Rotaru, Cristina .
ACM COMPUTING SURVEYS, 2009, 42 (01)
[9]   A polynomial algorithm for testing diagnosability of discrete-event systems [J].
Jiang, SB ;
Huang, ZD ;
Chandra, V ;
Kumar, R .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2001, 46 (08) :1318-1321
[10]  
Lazarevic A, 2005, MASSIVE COMP, V5, P19, DOI 10.1007/0-387-24230-9_2