Enhanced Anomaly Detector for Nonlinear Cyber-Physical Systems against Stealthy Integrity Attacks

被引:6
作者
Zhang, Kangkang [1 ,2 ]
Polycarpou, Marios M. [1 ,2 ]
Parisini, Thomas [1 ,2 ,3 ]
机构
[1] Univ Cyprus, KIOS Res & Innovat Ctr Excellence, CY-1678 Nicosia, Cyprus
[2] Univ Cyprus, Dept Elect & Comp Engn, CY-1678 Nicosia, Cyprus
[3] Imperial Coll London, Dept Elect & Elect Engn, London, England
来源
IFAC PAPERSONLINE | 2020年 / 53卷 / 02期
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Stealthy integrity attacks; nonlinear cyber-physical systems; backward-in-time detection methodology; SECURE CONTROL;
D O I
10.1016/j.ifacol.2020.12.870
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The detection of stealthy integrity attacks for nonlinear cyber-physical systems is a great challenge for the research community. This paper proposes a backward-in-time detection methodology to enhance the anomaly detector against stealthy integrity attacks for a class of nonlinear cyber-physical systems. It uses the virtual value of the state at a time instant prior to the occurrence time of the attacks for detecting stealthy attacks. The definition of stealthy integrity attacks is formulated in the context of nonlinear plants such that they are undetectable with respect to traditional anomaly detectors. A H-infinity fixed-point smoother is developed for estimating the analytical virtual values of the states at a prior time to the attack occurrence time, and then, the backward-in-time detection schemes are proposed based on the smoother. Based on the prior estimates, attack residual generation and threshold generation schemes are designed. Finally, a simulation is presented to illustrate the effectiveness of the enhanced anomaly detector. Copyright (C) 2020 The Authors.
引用
收藏
页码:13682 / 13687
页数:6
相关论文
共 15 条
  • [1] [Anonymous], 2012, The international series on Asian studies in computer and information science
  • [2] Basile G., 1992, Controlled and Conditioned Invariants in Linear System Theory
  • [3] Blanke M., 2006, Diagnosis and fault -tolerant control, V2
  • [4] Cardenas Alvaro A., 2008, 2008 28th International Conference on Distributed Computing Systems Workshops (ICDCS Workshops), P495, DOI 10.1109/ICDCS.Workshops.2008.40
  • [5] Ding SX, 2013, ADV IND CONTROL, P3, DOI 10.1007/978-1-4471-4799-2_1
  • [6] Detection and Isolation of Replay Attacks through Sensor Watermarking
    Ferrari, Riccardo M. G.
    Teixeira, Andre M. H.
    [J]. IFAC PAPERSONLINE, 2017, 50 (01): : 7363 - 7368
  • [7] Khalil Hassan K., 2002, Nonlinear systems, V3
  • [8] Detecting Integrity Attacks on SCADA Systems
    Mo, Yilin
    Chabukswar, Rohan
    Sinopoli, Bruno
    [J]. IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2014, 22 (04) : 1396 - 1407
  • [9] Secure Control Against Replay Attacks
    Mo, Yilin
    Sinopoli, Bruno
    [J]. 2009 47TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1 AND 2, 2009, : 911 - 918
  • [10] Mo Yilin, 2010, 1 WORKSH SEC CONTR S, P1