Detection and Compensation of Covert Service-Degrading Intrusions in Cyber Physical Systems through Intelligent Adaptive Control

被引:13
作者
Farivar, Faezeh [1 ]
Haghighi, Mohammad Sayad [2 ]
Barchinezhad, Soheila [2 ]
Jolfaei, Alireza [3 ]
机构
[1] Islamic Azad Univ, Dept Mechatron Engn, Sci & Res Branch, Tehran, Iran
[2] Univ Tehran, Sch Elect & Comp Engn, Tehran, Iran
[3] Federat Univ Australia, Sch Sci Engn & Informat Technol, Mt Helen, Australia
来源
2019 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT) | 2019年
关键词
Control; cyber physical system; cyber security; covert; identification; intrusion detection; service degradation; SECURITY; ATTACKS;
D O I
10.1109/ICIT.2019.8755007
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cyber-Physical Systems (CPS) are playing important roles in the critical infrastructure now. A prominent family of CPSs are networked control systems in which the control and feedback signals are carried over computer networks like the Internet. Communication over insecure networks make system vulnerable to cyber attacks. In this article, we design an intrusion detection and compensation framework based on system/plant identification to fight covert attacks. We collect error statistics of the output estimation during the learning phase of system operation and after that, monitor the system behavior to see if it significantly deviates from the expected outputs. A compensating controller is further designed to intervene and replace the classic controller once the attack is detected. The proposed model is tested on a DC motor as the plant and is put against a deception signal amplification attack over the forward link. Simulation results show that the detection algorithm well detects the intrusion and the compensator is also successful in alleviating the attack effects.
引用
收藏
页码:1143 / 1148
页数:6
相关论文
共 29 条
[1]  
Abedi Sajjad., 2015, Plug, P129
[2]   Cyber Security of Water SCADA Systems-Part I: Analysis and Experimentation of Stealthy Deception Attacks [J].
Amin, Saurabh ;
Litrico, Xavier ;
Sastry, Shankar ;
Bayen, Alexandre M. .
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2013, 21 (05) :1963-1970
[3]  
[Anonymous], 2009, P WORKSHOP FUTURE DI
[4]  
[Anonymous], 2013, FBI PROBES GEORGIA W
[5]  
[Anonymous], 2011, CISC VIS NETW IND GL
[6]  
Cardenas A., 2008, 28 DISTR COMP SYST W
[7]   How does control timing affect performance?: Analysis and simulation of timing using Jitterbug and TrueTime [J].
Cervin, A ;
Henriksson, D ;
Lincoln, B ;
Eker, J ;
Årzén, KE .
IEEE CONTROL SYSTEMS MAGAZINE, 2003, 23 (03) :16-30
[8]   Security of energy supply: Comparing scenarios from a European perspective [J].
Costantini, Valeria ;
Gracceva, Francesco ;
Markandya, Anil ;
Vicini, Giorgio .
ENERGY POLICY, 2007, 35 (01) :210-226
[9]   Covert Attacks in Cyber-Physical Control Systems [J].
de Sa, Alan Oliveira ;
Rust da Costa Carmo, Luiz F. ;
Machado, Raphael C. S. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (04) :1641-1651
[10]   Cyber Security and Power System Communication-Essential Parts of a Smart Grid Infrastructure [J].
Ericsson, Goran N. .
IEEE TRANSACTIONS ON POWER DELIVERY, 2010, 25 (03) :1501-1507