Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2566468.2566472acmconferencesArticle/Chapter ViewAbstractPublication PagescpsweekConference Proceedingsconference-collections
research-article

Energy-based attack detection in networked control systems

Published: 15 April 2014 Publication History

Abstract

The increased prevalence of attacks on Cyber-Physical Systems(CPS) as well as the safety-critical nature of these systems, has resulted in increased concerns regarding the security of CPS. In an effort towards the security of CPS, we consider the detection of attacks based on the fundamental notion of a system's energy. We propose a discrete-time Energy-Based Attack Detection mechanism for networked cyber-physical systems that are dissipative or passive in nature. We present analytical results to show that the detection mechanism is effective in detecting a class of attack models in networked control systems (NCS). Finally, using simulations we illustrate the effectiveness of the proposed approach in detecting attacks.

References

[1]
M. Abrams and J. Weiss. Malicious control system cyber security attack case study: maroochy water services. 2008.
[2]
C. I. Byrnes and W. Lin. Losslessness, feedback equivalence, and the global stabilization of discrete-time nonlinear systems. IEEE Trans. on Aut. Control, 39(1):83--98, 1994.
[3]
A. A. Cárdenas, S. Amin, and S. Sastry. Research challenges for the security of control systems. In Proc. of the 3rd Conf. on Hot topics in security, pages 1--6, 2008.
[4]
W. Chen, S. Ding, A. Q. Khan, and M. Abid. Energy based fault detection for dissipative systems. In Conf. on Control and Fault-Tolerant Systems, pages 517--521, 2010.
[5]
E. Eyisi and X. Koutsoukos. Energy-Based Attack Detection in Networked Control Systems. Technical Report ISIS-13-107.
[6]
N. Falliere, L. Murchu, and C. E. W32.stuxnet dossier. 2011.
[7]
C. Fantuzzi and C. Secchi. Energetic approach to parametric fault detection and isolation. In American Control Conf., volume 6, pages 5034--5039, 2004.
[8]
G. C. Goodwin and K. S. Sin. Adaptive filtering prediction and control. Courier Dover Publications, 2013.
[9]
W. M. Haddad and V. Chellaboina. Nonlinear dynamical systems and control: a Lyapunov-based approach. Princeton University Press, 2011.
[10]
D. Hill and P. Moylan. The stability of nonlinear dissipative systems. IEEE Trans. on Aut. Control, 21(5):708--711, 1976.
[11]
Y.-L. Huang, A. A. Cárdenas, S. Amin, Z.-S. Lin, H.-Y. Tsai, and S. Sastry. Understanding the physical and economic consequences of attacks on control systems. Int. J. of Critical Infrastructure Protection, 2(3):73--83, 2009.
[12]
T. W. S. Journal. Electricity grid in u.s. penetrated by spies. A1, April 2009.
[13]
C. Li, A. Raghunathan, and N. Jha. Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system. In Int. Conf. In e-Health Networking Applications and Services, pages 150 --156, June 2011.
[14]
R. Patton and J. Chen. Observer-based fault detection and isolation: Robustness and applications. Control Engineering Practice, 5(5):671 -- 682, 1997.
[15]
A. Teixeira, D. Pérez, H. Sandberg, and K. H. Johansson. Attack models and scenarios for networked control systems. In Proc. of the 1st Int. Conf. on High Confidence Net. Sys., pages 55--64, 2012.
[16]
D. Theilliol, H. Noura, D. Sauter, and F. Hamelin. Sensor fault diagnosis based on energy balance evaluation: Application to a metal processing. ISA Trans., 45(4):603--610, 2006.
[17]
J. C. Willems. Dissipative dynamical systems part ii: Linear systems with quadratic supply rates. Arch. for Rat. Mechanics and Analysis, 45(5):352--393, 1972.
[18]
H. Yang, V. Cocquempot, and B. Jiang. Fault tolerance analysis for switched systems via global passivity. IEEE Trans. on Cir. and Sys. II: Express Briefs, 55(12):1279--1283, 2008.

Cited By

View all
  • (2024)Outlier detection in temporal and spatial sequences via correlation analysis based on graph neural networksDisplays10.1016/j.displa.2024.10277584(102775)Online publication date: Sep-2024
  • (2023)Passivity-Based Attack Detection and Mitigation with Switching Adaptive Controller and Quadratic Storage Function2023 62nd IEEE Conference on Decision and Control (CDC)10.1109/CDC49753.2023.10383523(2403-2408)Online publication date: 13-Dec-2023
  • (2022)An OpenPLC-based Active Real-time Anomaly Detection Framework for Industrial Control Systems2022 China Automation Congress (CAC)10.1109/CAC57257.2022.10055121(5899-5904)Online publication date: 25-Nov-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
HiCoNS '14: Proceedings of the 3rd international conference on High confidence networked systems
April 2014
162 pages
ISBN:9781450326520
DOI:10.1145/2566468
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 April 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. attacks
  2. energy-based detection
  3. networked control systems

Qualifiers

  • Research-article

Conference

HiCoNS '14
Sponsor:

Acceptance Rates

HiCoNS '14 Paper Acceptance Rate 12 of 18 submissions, 67%;
Overall Acceptance Rate 30 of 55 submissions, 55%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)10
  • Downloads (Last 6 weeks)2
Reflects downloads up to 12 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Outlier detection in temporal and spatial sequences via correlation analysis based on graph neural networksDisplays10.1016/j.displa.2024.10277584(102775)Online publication date: Sep-2024
  • (2023)Passivity-Based Attack Detection and Mitigation with Switching Adaptive Controller and Quadratic Storage Function2023 62nd IEEE Conference on Decision and Control (CDC)10.1109/CDC49753.2023.10383523(2403-2408)Online publication date: 13-Dec-2023
  • (2022)An OpenPLC-based Active Real-time Anomaly Detection Framework for Industrial Control Systems2022 China Automation Congress (CAC)10.1109/CAC57257.2022.10055121(5899-5904)Online publication date: 25-Nov-2022
  • (2021)Analytical Review of Cybersecurity for Embedded SystemsIEEE Access10.1109/ACCESS.2020.30459729(961-982)Online publication date: 2021
  • (2020)False Data Injection Attacks in Bilateral Teleoperation SystemsIEEE Transactions on Control Systems Technology10.1109/TCST.2019.290344628:3(1168-1176)Online publication date: May-2020
  • (2018)A Survey of Physics-Based Attack Detection in Cyber-Physical SystemsACM Computing Surveys10.1145/320324551:4(1-36)Online publication date: 25-Jul-2018
  • (2017)Unsupervised Sequential Outlier Detection With Deep ArchitecturesIEEE Transactions on Image Processing10.1109/TIP.2017.271304826:9(4321-4330)Online publication date: Sep-2017
  • (2016)Limiting the Impact of Stealthy Attacks on Industrial Control SystemsProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security10.1145/2976749.2978388(1092-1105)Online publication date: 24-Oct-2016
  • (2016)On applying fault detectors against false data injection attacks in cyber-physical control systemsIEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications10.1109/INFOCOM.2016.7524506(1-9)Online publication date: Apr-2016
  • (2016)Content modification attacks on consensus seeking multi-agent system with double-integrator dynamicsChaos: An Interdisciplinary Journal of Nonlinear Science10.1063/1.496503426:11Online publication date: 28-Oct-2016
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media