False Data Injection Attack Detection for Industrial Control Systems Based on Both Time- and Frequency-Domain Analysis of Sensor Data

被引:23
作者
Huang, Dajian [1 ]
Shi, Xiufang [1 ]
Zhang, Wen-An [1 ]
机构
[1] Zhejiang Univ Technol, Coll Informat Engn, Hangzhou 310023, Peoples R China
基金
中国国家自然科学基金;
关键词
Integrated circuits; Intrusion detection; Feature extraction; Trajectory; Hidden Markov models; Internet of Things; False data injection (FDI) attacks; hidden Markov model (HMM); industrial control systems (ICSs); intrusion detection; signal analysis; DISTRIBUTED BAYESIAN DETECTION; INTRUSION DETECTION SYSTEM; ANOMALY DETECTION; SECURITY; CLASSIFICATION; FRAMEWORK; MODELS;
D O I
10.1109/JIOT.2020.3007155
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article studies the intrusion detection problem for industrial control systems (ICSs) with repetitive machining under false data injection (FDI) attacks. A data-driven intrusion detection method is proposed based on both time- and frequency-domain analysis. The proposed method only utilizes the sensor measurements required in closed-loop control, and does not consume additional system resources or rely on the system model. In addition, features in time and frequency domain are extracted at the same time, having higher reliability than the intrusion detection methods which only utilize the features in time domain. After feature extraction, hidden Markov models (HMMs) are established by using the feature vectors under normal operating conditions of the ICS, and then the trained HMMs are utilized in real-time intrusion detection. Finally, experiments are carried out on a networked multiaxis engraving machine with FDI attacks. The experimental results show the effectiveness and superiority of the proposed intrusion detection method.
引用
收藏
页码:585 / 595
页数:11
相关论文
共 37 条
  • [1] Distributed Attack Detection in a Water Treatment Plant: Method and Case Study
    Adepu, Sridhar
    Mathur, Aditya
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (01) : 86 - 99
  • [2] Ahmed S., IEEE T INF FORENSICS
  • [3] Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model
    Aljawarneh, Shadi
    Aldwairi, Monther
    Yassein, Muneer Bani
    [J]. JOURNAL OF COMPUTATIONAL SCIENCE, 2018, 25 : 152 - 160
  • [4] An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems
    Almalawi, Abdulmohsen
    Yu, Xinghuo
    Tari, Zahir
    Fahad, Adil
    Khalil, Ibrahim
    [J]. COMPUTERS & SECURITY, 2014, 46 : 94 - 110
  • [5] Attack Detection for Load Frequency Control Systems Using Stochastic Unknown Input Estimators
    Ameli, Amir
    Hooshyar, Ali
    Yazdavar, Ameen Hassan
    El-Saadany, Ehab F.
    Youssef, Amr
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (10) : 2575 - 2590
  • [6] Cyber Security of Water SCADA Systems-Part II: Attack Detection Using Enhanced Hydrodynamic Models
    Amin, Saurabh
    Litrico, Xavier
    Sastry, S. Shankar
    Bayen, Alexandre M.
    [J]. IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2013, 21 (05) : 1679 - 1693
  • [7] Cyber Security of Water SCADA Systems-Part I: Analysis and Experimentation of Stealthy Deception Attacks
    Amin, Saurabh
    Litrico, Xavier
    Sastry, Shankar
    Bayen, Alexandre M.
    [J]. IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2013, 21 (05) : 1963 - 1970
  • [8] [Anonymous], 2015, P 1 ACM WORKSH CYB P, DOI 10.1145/2732198.2732200
  • [9] A survey on security control and attack detection for industrial cyber-physical systems
    Ding, Derui
    Han, Qing-Long
    Xiang, Yang
    Ge, Xiaohua
    Zhang, Xian-Ming
    [J]. NEUROCOMPUTING, 2018, 275 : 1674 - 1683
  • [10] Control variable classification, modeling and anomaly detection in Modbus/TCP SCADA systems
    Erez, Noam
    Wool, Avishai
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2015, 10 : 59 - 70