A Novel Cyber Attack Detection Method in Networked Control Systems

被引:141
作者
Mousavinejad, Eman [1 ]
Yang, Fuwen [1 ]
Han, Qing-Long [2 ]
Vlacic, Ljubo [1 ]
机构
[1] Griffith Univ, Sch Engn, Gold Coast, Qld 4222, Australia
[2] Swinburne Univ Technol, Sch Software & Elect Engn, Melbourne, Vic 3122, Australia
基金
澳大利亚研究理事会;
关键词
Bias injection attacks; cyber attack detection; networked control systems (NCSs); replay attacks; set-membership filtering; RECURSIVE STATE ESTIMATION; DATA INJECTION ATTACKS; INTRUSION DETECTION; MULTIAGENT SYSTEMS; COOPERATIVE CONTROL; CONSTRAINTS; UNCERTAINTY; SECURITY; INPUTS;
D O I
10.1109/TCYB.2018.2843358
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper is concerned with cyber attack detection in a networked control system. A novel cyber attack detection method, which consists of two steps: 1) a prediction step and 2) a measurement update step, is developed. An estimation ellipsoid set is calculated through updating the prediction ellipsoid set with the current sensor measurement data. Based on the intersection between these two ellipsoid sets, two criteria are provided to detect cyber attacks injecting malicious signals into physical components (i.e., sensors and actuators) or into a communication network through which information among physical components is transmitted. There exists a cyber attack on sensors or a network exchanging data between sensors and controllers if there is no intersection between the prediction set and the estimation set updated at the current time instant. Actuators or network transmitting data between controllers and actuators are under a cyber attack if the prediction set has no intersection with the estimation set updated at the previous time instant. Recursive algorithms for the calculation of the two ellipsoid sets and for the attack detection on physical components and the communication network are proposed. Simulation results for two types of cyber attacks, namely a replay attack and a bias injection attack, are provided to demonstrate the effectiveness of the proposed method.
引用
收藏
页码:3254 / 3264
页数:11
相关论文
共 50 条
[1]   Data Randomization and Cluster-Based Partitioning for Botnet Intrusion Detection [J].
Al-Jarrah, Omar Y. ;
Alhussein, Omar ;
Yoo, Paul D. ;
Muhaidat, Sami ;
Taha, Kamal ;
Kim, Kwangjo .
IEEE TRANSACTIONS ON CYBERNETICS, 2016, 46 (08) :1796-1806
[2]   RECURSIVE STATE ESTIMATION FOR A SET-MEMBERSHIP DESCRIPTION OF UNCERTAINTY [J].
BERTSEKAS, DP ;
RHODES, IB .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 1971, AC16 (02) :117-+
[3]  
Cardenas A., 2008, HOTSEC, P1
[4]   A survey on security control and attack detection for industrial cyber-physical systems [J].
Ding, Derui ;
Han, Qing-Long ;
Xiang, Yang ;
Ge, Xiaohua ;
Zhang, Xian-Ming .
NEUROCOMPUTING, 2018, 275 :1674-1683
[5]   Security Control for Discrete-Time Stochastic Nonlinear Systems Subject to Deception Attacks [J].
Ding, Derui ;
Wang, Zidong ;
Han, Qing-Long ;
Wei, Guoliang .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2018, 48 (05) :779-789
[6]   An Overview of Recent Advances in Event-Triggered Consensus of Multiagent Systems [J].
Ding, Lei ;
Han, Qing-Long ;
Ge, Xiaohua ;
Zhang, Xian-Ming .
IEEE TRANSACTIONS ON CYBERNETICS, 2018, 48 (04) :1110-1123
[7]   Robust filtering for discrete-time systems with bounded noise and parametric uncertainty [J].
El Ghaoui, L ;
Calafiore, G .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2001, 46 (07) :1084-1089
[8]   Stuxnet and the Future of Cyber War [J].
Farwell, James P. ;
Rohozinski, Rafal .
SURVIVAL, 2011, 53 (01) :23-40
[9]   Distributed Secure Coordinated Control for Multiagent Systems Under Strategic Attacks [J].
Feng, Zhi ;
Wen, Guanghui ;
Hu, Guoqiang .
IEEE TRANSACTIONS ON CYBERNETICS, 2017, 47 (05) :1273-1284
[10]   A Dynamic Event-Triggered Transmission Scheme for Distributed Set-Membership Estimation Over Wireless Sensor Networks [J].
Ge, Xiaohua ;
Han, Qing-Long ;
Wang, Zidong .
IEEE TRANSACTIONS ON CYBERNETICS, 2019, 49 (01) :171-183