A Moving Target Defense for Securing Cyber-Physical Systems

被引:56
作者
Griffioen, Paul [1 ]
Weerakkody, Sean [1 ]
Sinopoli, Bruno [2 ]
机构
[1] Carnegie Mellon Univ, Dept Elect & Comp Engn, Pittsburgh, PA 15213 USA
[2] Washington Univ, Dept Elect & Syst Engn, St Louis, MO 63130 USA
基金
美国国家科学基金会;
关键词
Sensor systems; Time-varying systems; Cyber-physical systems; Actuators; Data models; Fault detection; linear parameter-varying systems; optimization; time-varying systems; FUSION;
D O I
10.1109/TAC.2020.3005686
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article considers the design and analysis of multiple moving target defenses for recognizing and isolating attacks on cyber-physical systems. We consider attackers who perform integrity attacks on some set of sensors and actuators in a control system. In such cases, it has been shown that a model aware adversary can carefully design attack vectors to bypass bad data detection and identification filters while causing damage to the control system. To counter such an attacker, we propose the moving target defense which introduces stochastic, time-varying parameters in the control system. The underlying random dynamics of the system limit an attacker's knowledge of the model and inhibit his or her ability to construct stealthy attack sequences. Moreover, the time-varying nature of the dynamics thwarts adaptive adversaries. We explore three main designs. First, we consider a hybrid system where parameters within the existing plant are switched among multiple modes. We demonstrate how such an approach can enable both the detection and identification of malicious nodes. Next, we investigate the addition of an extended system with dynamics that are coupled to the original plant but do not affect the system performance. Here, an attack on the original system will affect the authenticating subsystem and in turn be revealed by a set of sensors measuring the extended plant. Finally, we propose the use of sensor nonlinearities to enhance the effectiveness of the moving target defense. The nonlinear dynamics act to conceal normal operational behavior from an attacker who has tampered with the system state, further hindering an attacker's ability to glean information about the time-varying dynamics. In all cases mechanisms for analysis and design are proposed. Finally, we analyze attack detectability for each moving target defense by investigating expected lower bounds on the detection statistic. Our contributions are also tested via simulation.
引用
收藏
页码:2016 / 2031
页数:16
相关论文
共 32 条
[1]  
[Anonymous], 1974, Complex Stochastic Processes: An Introduction to Theory and Application
[2]   A tutorial on particle filters for online nonlinear/non-Gaussian Bayesian tracking [J].
Arulampalam, MS ;
Maskell, S ;
Gordon, N ;
Clapp, T .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2002, 50 (02) :174-188
[3]  
Cardenas Alvaro A., 2008, 2008 28th International Conference on Distributed Computing Systems Workshops (ICDCS Workshops), P495, DOI 10.1109/ICDCS.Workshops.2008.40
[4]   Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks [J].
Fawzi, Hamza ;
Tabuada, Paulo ;
Diggavi, Suhas .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (06) :1454-1467
[5]   Comparison of two measurement fusion methods for Kalman-filter-based multisensor data fusion [J].
Gan, Q ;
Harris, CJ .
IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS, 2001, 37 (01) :273-280
[6]  
Grebeck M., 1998, TFRT7576 LTH
[7]   An Optimal Design of a Moving Target Defense for Attack Detection in Control Systems [J].
Griffioen, Paul ;
Weerakkody, Sean ;
Sinopoli, Bruno .
2019 AMERICAN CONTROL CONFERENCE (ACC), 2019, :4527-4534
[8]   Smart grids, Smart Cities Need Better Networks [J].
Hassan, Jahan A. ;
Das, Sajal K. ;
Hassan, Mahbub ;
Bisdikian, Chatschik ;
Soldani, David .
IEEE NETWORK, 2010, 24 (02) :2-6
[9]   The quadruple-tank process: A multivariable laboratory process with an adjustable zero [J].
Johansson, KH .
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2000, 8 (03) :456-465
[10]  
Lee RM, 2016, Analysis of the Cyber Attack on the Ukrainian Power Grid