Modeling and detection of cyber attacks on discrete event systems

被引:40
作者
Fritz, Raphael [1 ]
Zhang, Ping [1 ]
机构
[1] Univ Kaiserslautern, Inst Automat Control, Kaiserslautern, Germany
来源
IFAC PAPERSONLINE | 2018年 / 51卷 / 07期
关键词
Cyber-physical systems; security; cyber attack detection; discrete event systems;
D O I
10.1016/j.ifacol.2018.06.314
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid growth of cyber-physical systems (CPS), the requirements on the security of such systems increases, since the communication networks between the controllers, actuators and sensors are vulnerable to attacks. In this paper, a detection method for cyber attacks on CPSs modeled by discrete event systems is proposed. Deception attacks hide their influence and are particular challenging to detect. Two such attacks are replay attack and covert attack. The modeling and detection of these two attack types is presented. We introduce permutation matrices which alter the transmitted signals to disrupt the attack and allow the detection. The proposed approach is illustrated by a laboratory manufacturing system. (C) 2018, IFAC (International Federation of Automatic Control) Hosting by Elsevier Ltd. All rights reserved.
引用
收藏
页码:285 / 290
页数:6
相关论文
共 11 条
  • [1] Carvalho LK, 2016, INT WORKS DISCRETE, P298, DOI 10.1109/WODES.2016.7497863
  • [2] Frey G., 2002, Design and formal analysis of Petri net based logic control algorithms
  • [3] GIUA A, 1992, 1992 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1 AND 2, P974, DOI 10.1109/ICSMC.1992.271666
  • [4] Hoehn A, 2016, P AMER CONTR CONF, P302, DOI 10.1109/ACC.2016.7524932
  • [5] Security Against Network Attacks in Supervisory Control Systems
    Lima, Public M.
    Alves, Marcos V. S.
    Carvalho, Lilian K.
    Moreira, Marcos V.
    [J]. IFAC PAPERSONLINE, 2017, 50 (01): : 12333 - 12338
  • [6] PETRI NETS - PROPERTIES, ANALYSIS AND APPLICATIONS
    MURATA, T
    [J]. PROCEEDINGS OF THE IEEE, 1989, 77 (04) : 541 - 580
  • [7] The concept of residuals for fault localization in discrete event systems
    Roth, Matthias
    Lesage, Jean-Jacques
    Litz, Lothar
    [J]. CONTROL ENGINEERING PRACTICE, 2011, 19 (09) : 978 - 988
  • [8] Su R, 2017, P AMER CONTR CONF, P3200, DOI 10.23919/ACC.2017.7963440
  • [9] A secure control framework for resource-limited adversaries
    Teixeira, Andre
    Shames, Iman
    Sandberg, Henrik
    Johansson, Karl Henrik
    [J]. AUTOMATICA, 2015, 51 : 135 - 148
  • [10] Thorsley D, 2006, IEEE DECIS CONTR P, P6049