Abstract
Based on frequency-domain transformation technique, this paper proposes an attack detection scheme for stochastic control systems under stochastic cyber-attacks and disturbances. The focus is on designing an anomaly detector for the stochastic control systems. First, we construct a model of stochastic control system with stochastic cyber-attacks which satisfy the Markovian stochastic process. And we also introduced the stochastic attack models that a control system is possibly exposed to. Next, based on the frequency-domain transformation technique and linear algebra theory, we propose an algebraic detection scheme for a possible stochastic cyber-attack. We transform the detector error dynamic equation into an algebraic equation. By analyzing the rank of the stochastic matrix \(E\left( Q(z_{0})\right) \) in the algebraic equation, residual information is obtained and anomalies in the stochastic system are detected. In addition, sufficient and necessary conditions guaranteeing the detectability of the stochastic cyber-attacks are obtained. The presented detection approach in this paper is simple, straightforward and more ease to implement. Finally, the results are applied to some physical systems that are respectively subject to a stochastic data denial-of-service (DoS) attack and a stochastic data deception attack on the actuator. The simulation results underline that the detection approach is efficient and feasible in practical application.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Wolf, M., Daly, P.W.: Security Engineering for Vehicular IT Systems. Vieweg-Teubner (2009)
Nimda worm, http://www.cert.org/advisories/CA-2001-26.html
Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S., Weaver, N.: Inside the Slammer worm. IEEE Security & Privacy 1(4) (2003)
New “cyber attacks” hit S Korea, http://news.bbc.co.uk/2/hi/asia-pacific/8142282.stm
Slay, J., Miller, M.: Lessons learned from the Maroochy water breach. Critical Infrastructure Protection 253, 73–82 (2007)
Amin, S., Galina, A., Schwartz, S., Sastry, S.: Security of Interdependent and Identical Networked Control Systems. Automatica 49(1), 186–192 (2013)
Andersson, G., Esfahani, P.M., et al.: Cyber-Security of SCADA Systems. Session: Cyber -Physical System Security in A Smart Grid Enviroment (2011)
Li, Y.M., Voos, H., Darouach, M.: Robust H ∞ fault estimation for control systems under stochastic cyber-attacks. In: 33rd China Control Conference, Nanjing, China (accepted, 2014)
Rosich, A., Voos, H., Li, Y.M., Darouach, M.: A Model Predictive Approach for Cyber-Attack Detection and Mitigation in Control Systems. In: 52nd IEEE Annual Conference on Decision and Control, Italy, pp. 6621–6626 (2013)
Teixeira, A., Pérez, D., Sandberg, H., Johansson, K.H.: Attack Models and Scenarios for Networked Control Systems. In: HiCoNS 2012, Beijing, China, pp. 55–64 (2012)
Mo, Y., Sinopoli, B.: False data injection attacks in control systems. In: First Workshop on Secure Control Systems, Stockholm, Sweden (2010)
Amin, S., Litrico, X., Sastry, S.S., Bayen, A.M.: Cyber Security of Water SCADA Systems: (I) Analysis and Experimentation of Stealthy Deception Attacks. IEEE Transactions on Control Systems Technology 21(5), 1963–1970 (2013)
Eliades, D.G., Polycarpou, M.M.: A fault diagnosis and security framework for water systems. IEEE Transactions on Control Systems Technology 18(6), 1254–1265 (2010)
Metke, A.R., Ekl, R.L.: Security technology for smart grid networks. IEEE Transactions on Smart Grid 1(1), 99–107 (2010)
Sridhar, S., Hahn, A., Govindarasu, M.: Cyber–physical system security for the electric power grid. Proceedings of the IEEE 99(1), 1–15 (2012)
Mohsenian-Rad, A.H., Garcia, A.L.: Distributed internet-based load altering attacks against smart power grids. IEEE Transactions on Smart Grid 2(4), 667–674 (2011)
Anjali, S., Ramesh, C.J.: Dual-Level Attack Detection and Characterization for Networks under DDoS. In: International Conference on Availability, Reliability and Security (2010)
Hashim, F., Kibria, M.R., Jamalipour, A.: Detection of DoS and DDoS Attacks in NGMN Using Frequency Domain Analysis. In: Proceedings of APCC 2008, copyright(c) 2008 IEICE 08 SB 0083 (2008)
Weimer, J., Kar, S., Johansson, K.H.: Distributed Detection and Isolation of Topology Attacks in Power Networks. In: HiCoNS 2012, Beijing, China, pp. 65–71 (2012)
Liu, Y., Reiter, M.K., Ning, P.: False data injection attacks against state estimation in electric power grids. In: ACM Conference on Computer and Communications Security, Chicago, USA, pp. 21–32 (2009)
Pasqualetti, F.: Secure Control Systems: A Control-Theoretic Approach to Cyber-Physical Security. A Dissertation for the degree of Doctor of Philosophy in Mechanical Engineering (2012)
Zhou, K., Doyle, J.C., Glover, K.: Robust and Optimal Control. Prentice-Hall, Inc., Upper Saddle River (1996)
Johansson, K.H.: The Quadruple-Tank Process: A Multivariable Laboratory Process with an Adjustable Zero. IEEE Transactions on Control Systems Technology 8(3), 456–465 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Li, Y., Voos, H., Rosich, A., Darouach, M. (2014). A Stochastic Cyber-Attack Detection Scheme for Stochastic Control Systems Based on Frequency-Domain Transformation Technique. In: Au, M.H., Carminati, B., Kuo, CC.J. (eds) Network and System Security. NSS 2015. Lecture Notes in Computer Science, vol 8792. Springer, Cham. https://doi.org/10.1007/978-3-319-11698-3_16
Download citation
DOI: https://doi.org/10.1007/978-3-319-11698-3_16
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11697-6
Online ISBN: 978-3-319-11698-3
eBook Packages: Computer ScienceComputer Science (R0)