Cyber-attacks detection; Stochastic control system; Stochastic DoS
Abstract :
[en] Based on frequency-domain transformation technique, this paper proposes an attack detection scheme for stochastic control systems under stochastic cyber-attacks and disturbances. The focus is on designing an anomaly detector for the stochastic control systems. First, we construct a model of stochastic control system with stochastic cyber-attacks which satisfy the Markovian stochastic process. And we also introduced the stochastic attack models that a control system is
possibly exposed to. Next, based on the frequency-domain transformation technique and linear algebra theory, we propose an algebraic detection scheme for a possible stochastic cyber-attack. We transform the detector error dynamic equation into an algebraic equation. By analyzing the rank of the stochastic matrix E(Q (z0)) in the algebraic equation, residual information is obtained and anomalies in the stochastic system are detected. In addition, sufficient and necessary conditions guaranteeing the detectability of the stochastic cyber-attacks are obtained. The presented detection approach in this paper is simple, straightforward
and more ease to implement. Finally, the results are applied to some physical systems that are respectively subject to a stochastic data denial-of-service (DoS) attack and a stochastic data deception attack on the actuator. The simulation results underline that the detection approach is efficient and feasible in practical application.
Research center :
Interdisciplinary Centre for Security Reliability and Trust (SnT)
Disciplines :
Computer science
Author, co-author :
Li, Yumei ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
Voos, Holger ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Engineering Research Unit ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
Darouach, Mohamed
Language :
English
Title :
A Stochastic Cyber-Attack Detection Scheme for Stochastic Control Systems Based on Frequency-Domain Transformation Technique
Publication date :
15 October 2014
Event name :
8th International Conference on Network and System Security
Event place :
Xi'An, China
Event date :
October 15-17, 2014
By request :
Yes
Audience :
International
Main work title :
International Conference on Network and System Security, NSS 2014, Xi'An, China, 15-17 October 2014
New “cyber attacks” hit S Korea, http://news.bbc.co.uk/2/hi/asia-pacific/ 8142282.stm
Slay, J., Miller, M.: Lessons learned from the Maroochy water breach. Critical Infrastructure Protection 253, 73–82 (2007)
Amin, S., Galina, A., Schwartz, S., Sastry, S.: Security of Interdependent and Identical Networked Control Systems. Automatica 49(1), 186–192 (2013)
Andersson, G., Esfahani, P.M., et al.: Cyber-Security of SCADA Systems. Session: Cyber -Physical System Security in A Smart Grid Enviroment (2011)
Li, Y.M., Voos, H., Darouach, M.: Robust H∞ fault estimation for control systems under stochastic cyber-attacks. In: 33rd China Control Conference, Nanjing, China (accepted, 2014)
Rosich, A., Voos, H., Li, Y.M., Darouach, M.: A Model Predictive Approach for Cyber- Attack Detection and Mitigation in Control Systems. In: 52nd IEEE Annual Conference on Decision and Control, Italy, pp. 6621–6626 (2013)
Teixeira, A., Pérez, D., Sandberg, H., Johansson, K.H.: Attack Models and Scenarios for Networked Control Systems. In: HiCoNS 2012, Beijing, China, pp. 55–64 (2012)
Mo, Y., Sinopoli, B.: False data injection attacks in control systems. In: First Workshop on Secure Control Systems, Stockholm, Sweden (2010)
Amin, S., Litrico, X., Sastry, S.S., Bayen, A.M.: Cyber Security of Water SCADA Systems: (I) Analysis and Experimentation of Stealthy Deception Attacks. IEEE Transactions on Control Systems Technology 21(5), 1963–1970 (2013)
Eliades, D.G., Polycarpou, M.M.: A fault diagnosis and security framework for water systems. IEEE Transactions on Control Systems Technology 18(6), 1254–1265 (2010)
Metke, A.R., Ekl, R.L.: Security technology for smart grid networks. IEEE Transactions on Smart Grid 1(1), 99–107 (2010)
Sridhar, S., Hahn, A., Govindarasu, M.: Cyber–physical system security for the electric power grid. Proceedings of the IEEE 99(1), 1–15 (2012)
Mohsenian-Rad, A.H., Garcia, A.L.: Distributed internet-based load altering attacks against smart power grids. IEEE Transactions on Smart Grid 2(4), 667–674 (2011)
Anjali, S., Ramesh, C.J.: Dual-Level Attack Detection and Characterization for Networks under DDoS. In: International Conference on Availability, Reliability and Security (2010)
Hashim, F., Kibria, M.R., Jamalipour, A.: Detection of DoS and DDoS Attacks in NGMN Using Frequency Domain Analysis. In: Proceedings of APCC 2008, copyright(c) 2008 IEICE 08 SB 0083 (2008)
Weimer, J., Kar, S., Johansson, K.H.: Distributed Detection and Isolation of Topology Attacks in Power Networks. In: HiCoNS 2012, Beijing, China, pp. 65–71 (2012)
Liu, Y., Reiter,M.K., Ning, P.: False data injection attacks against state estimation in electric power grids. In: ACM Conference on Computer and Communications Security, Chicago, USA, pp. 21–32 (2009)
Pasqualetti, F.: Secure Control Systems: A Control-Theoretic Approach to Cyber-Physical Security. A Dissertation for the degree of Doctor of Philosophy in Mechanical Engineering (2012)
Zhou, K., Doyle, J.C., Glover, K.: Robust and Optimal Control. Prentice-Hall, Inc., Upper Saddle River (1996)
Johansson, K.H.: The Quadruple-Tank Process: A Multivariable Laboratory Process with an Adjustable Zero. IEEE Transactions on Control Systems Technology 8(3), 456–465 (2000)