Modeling and detection of cyber attacks on discrete event systems

被引:41
作者
Fritz, Raphael [1 ]
Zhang, Ping [1 ]
机构
[1] Univ Kaiserslautern, Inst Automat Control, Kaiserslautern, Germany
关键词
Cyber-physical systems; security; cyber attack detection; discrete event systems;
D O I
10.1016/j.ifacol.2018.06.314
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid growth of cyber-physical systems (CPS), the requirements on the security of such systems increases, since the communication networks between the controllers, actuators and sensors are vulnerable to attacks. In this paper, a detection method for cyber attacks on CPSs modeled by discrete event systems is proposed. Deception attacks hide their influence and are particular challenging to detect. Two such attacks are replay attack and covert attack. The modeling and detection of these two attack types is presented. We introduce permutation matrices which alter the transmitted signals to disrupt the attack and allow the detection. The proposed approach is illustrated by a laboratory manufacturing system. (C) 2018, IFAC (International Federation of Automatic Control) Hosting by Elsevier Ltd. All rights reserved.
引用
收藏
页码:285 / 290
页数:6
相关论文
共 11 条
[1]  
Carvalho LK, 2016, INT WORKS DISCRETE, P298, DOI 10.1109/WODES.2016.7497863
[2]  
Frey G., 2002, Design and formal analysis of Petri net based logic control algorithms
[3]  
GIUA A, 1992, 1992 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1 AND 2, P974, DOI 10.1109/ICSMC.1992.271666
[4]  
Hoehn A, 2016, P AMER CONTR CONF, P302, DOI 10.1109/ACC.2016.7524932
[5]   Security Against Network Attacks in Supervisory Control Systems [J].
Lima, Public M. ;
Alves, Marcos V. S. ;
Carvalho, Lilian K. ;
Moreira, Marcos V. .
IFAC PAPERSONLINE, 2017, 50 (01) :12333-12338
[6]   PETRI NETS - PROPERTIES, ANALYSIS AND APPLICATIONS [J].
MURATA, T .
PROCEEDINGS OF THE IEEE, 1989, 77 (04) :541-580
[7]   The concept of residuals for fault localization in discrete event systems [J].
Roth, Matthias ;
Lesage, Jean-Jacques ;
Litz, Lothar .
CONTROL ENGINEERING PRACTICE, 2011, 19 (09) :978-988
[8]  
Su R, 2017, P AMER CONTR CONF, P3200, DOI 10.23919/ACC.2017.7963440
[9]   A secure control framework for resource-limited adversaries [J].
Teixeira, Andre ;
Shames, Iman ;
Sandberg, Henrik ;
Johansson, Karl Henrik .
AUTOMATICA, 2015, 51 :135-148
[10]  
Thorsley D, 2006, IEEE DECIS CONTR P, P6049