Nothing Special   »   [go: up one dir, main page]

Skip to main content

A Stochastic Cyber-Attack Detection Scheme for Stochastic Control Systems Based on Frequency-Domain Transformation Technique

  • Conference paper
Network and System Security (NSS 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8792))

Included in the following conference series:

Abstract

Based on frequency-domain transformation technique, this paper proposes an attack detection scheme for stochastic control systems under stochastic cyber-attacks and disturbances. The focus is on designing an anomaly detector for the stochastic control systems. First, we construct a model of stochastic control system with stochastic cyber-attacks which satisfy the Markovian stochastic process. And we also introduced the stochastic attack models that a control system is possibly exposed to. Next, based on the frequency-domain transformation technique and linear algebra theory, we propose an algebraic detection scheme for a possible stochastic cyber-attack. We transform the detector error dynamic equation into an algebraic equation. By analyzing the rank of the stochastic matrix \(E\left( Q(z_{0})\right) \) in the algebraic equation, residual information is obtained and anomalies in the stochastic system are detected. In addition, sufficient and necessary conditions guaranteeing the detectability of the stochastic cyber-attacks are obtained. The presented detection approach in this paper is simple, straightforward and more ease to implement. Finally, the results are applied to some physical systems that are respectively subject to a stochastic data denial-of-service (DoS) attack and a stochastic data deception attack on the actuator. The simulation results underline that the detection approach is efficient and feasible in practical application.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Wolf, M., Daly, P.W.: Security Engineering for Vehicular IT Systems. Vieweg-Teubner (2009)

    Google Scholar 

  2. Nimda worm, http://www.cert.org/advisories/CA-2001-26.html

  3. Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S., Weaver, N.: Inside the Slammer worm. IEEE Security & Privacy 1(4) (2003)

    Google Scholar 

  4. New “cyber attacks” hit S Korea, http://news.bbc.co.uk/2/hi/asia-pacific/8142282.stm

  5. Slay, J., Miller, M.: Lessons learned from the Maroochy water breach. Critical Infrastructure Protection 253, 73–82 (2007)

    Article  Google Scholar 

  6. Amin, S., Galina, A., Schwartz, S., Sastry, S.: Security of Interdependent and Identical Networked Control Systems. Automatica 49(1), 186–192 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  7. Andersson, G., Esfahani, P.M., et al.: Cyber-Security of SCADA Systems. Session: Cyber -Physical System Security in A Smart Grid Enviroment (2011)

    Google Scholar 

  8. Li, Y.M., Voos, H., Darouach, M.: Robust H  ∞  fault estimation for control systems under stochastic cyber-attacks. In: 33rd China Control Conference, Nanjing, China (accepted, 2014)

    Google Scholar 

  9. Rosich, A., Voos, H., Li, Y.M., Darouach, M.: A Model Predictive Approach for Cyber-Attack Detection and Mitigation in Control Systems. In: 52nd IEEE Annual Conference on Decision and Control, Italy, pp. 6621–6626 (2013)

    Google Scholar 

  10. Teixeira, A., Pérez, D., Sandberg, H., Johansson, K.H.: Attack Models and Scenarios for Networked Control Systems. In: HiCoNS 2012, Beijing, China, pp. 55–64 (2012)

    Google Scholar 

  11. Mo, Y., Sinopoli, B.: False data injection attacks in control systems. In: First Workshop on Secure Control Systems, Stockholm, Sweden (2010)

    Google Scholar 

  12. Amin, S., Litrico, X., Sastry, S.S., Bayen, A.M.: Cyber Security of Water SCADA Systems: (I) Analysis and Experimentation of Stealthy Deception Attacks. IEEE Transactions on Control Systems Technology 21(5), 1963–1970 (2013)

    Article  Google Scholar 

  13. Eliades, D.G., Polycarpou, M.M.: A fault diagnosis and security framework for water systems. IEEE Transactions on Control Systems Technology 18(6), 1254–1265 (2010)

    Google Scholar 

  14. Metke, A.R., Ekl, R.L.: Security technology for smart grid networks. IEEE Transactions on Smart Grid 1(1), 99–107 (2010)

    Article  Google Scholar 

  15. Sridhar, S., Hahn, A., Govindarasu, M.: Cyber–physical system security for the electric power grid. Proceedings of the IEEE 99(1), 1–15 (2012)

    Google Scholar 

  16. Mohsenian-Rad, A.H., Garcia, A.L.: Distributed internet-based load altering attacks against smart power grids. IEEE Transactions on Smart Grid 2(4), 667–674 (2011)

    Article  Google Scholar 

  17. Anjali, S., Ramesh, C.J.: Dual-Level Attack Detection and Characterization for Networks under DDoS. In: International Conference on Availability, Reliability and Security (2010)

    Google Scholar 

  18. Hashim, F., Kibria, M.R., Jamalipour, A.: Detection of DoS and DDoS Attacks in NGMN Using Frequency Domain Analysis. In: Proceedings of APCC 2008, copyright(c) 2008 IEICE 08 SB 0083 (2008)

    Google Scholar 

  19. Weimer, J., Kar, S., Johansson, K.H.: Distributed Detection and Isolation of Topology Attacks in Power Networks. In: HiCoNS 2012, Beijing, China, pp. 65–71 (2012)

    Google Scholar 

  20. Liu, Y., Reiter, M.K., Ning, P.: False data injection attacks against state estimation in electric power grids. In: ACM Conference on Computer and Communications Security, Chicago, USA, pp. 21–32 (2009)

    Google Scholar 

  21. Pasqualetti, F.: Secure Control Systems: A Control-Theoretic Approach to Cyber-Physical Security. A Dissertation for the degree of Doctor of Philosophy in Mechanical Engineering (2012)

    Google Scholar 

  22. Zhou, K., Doyle, J.C., Glover, K.: Robust and Optimal Control. Prentice-Hall, Inc., Upper Saddle River (1996)

    MATH  Google Scholar 

  23. Johansson, K.H.: The Quadruple-Tank Process: A Multivariable Laboratory Process with an Adjustable Zero. IEEE Transactions on Control Systems Technology 8(3), 456–465 (2000)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Li, Y., Voos, H., Rosich, A., Darouach, M. (2014). A Stochastic Cyber-Attack Detection Scheme for Stochastic Control Systems Based on Frequency-Domain Transformation Technique. In: Au, M.H., Carminati, B., Kuo, CC.J. (eds) Network and System Security. NSS 2015. Lecture Notes in Computer Science, vol 8792. Springer, Cham. https://doi.org/10.1007/978-3-319-11698-3_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11698-3_16

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11697-6

  • Online ISBN: 978-3-319-11698-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics