Detection and prevention of actuator enablement attacks in supervisory control systems

The deployment of control systems with network-connected components nowadays has made feedback control systems vulnerable to attacks over the network. This paper considers the problem of intrusion detection and prevention in supervisory control systems, where the attacker has the ability to enable vulnerable actuator events that are disabled by the supervisor. We present a mathematical model for the system under such actuator enablement attacks and propose a defense strategy that detects attacks online and disables all controllable events after an attack is detected. We develop an algorithm for verifying whether the system can prevent damage from attacks with the proposed defense strategy, where damage is modeled as the reachability of a pre-defined set of “unsafe” states. The technical condition of interest that is necessary and sufficient in this context is characterized; it is termed “AE-safe controllability”. Finally, we illustrate the methodology with a traffic system example.

[1]  Stéphane Lafortune,et al.  Active fault tolerant control of discrete event systems using online diagnostics , 2011, Autom..

[2]  D. Thorsley,et al.  Intrusion Detection in Controlled Discrete Event Systems , 2006, Proceedings of the 45th IEEE Conference on Decision and Control.

[3]  K.R. Rohloff Sensor Failure Tolerant Supervisory Control , 2005, Proceedings of the 44th IEEE Conference on Decision and Control.

[4]  João Carlos Basilio,et al.  Robust diagnosis of discrete event systems against intermittent loss of observations , 2012, Autom..

[5]  Ayan Banerjee,et al.  Ensuring Safety, Security, and Sustainability of Mission-Critical Cyber–Physical Systems , 2012, Proceedings of the IEEE.

[6]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[7]  Jing Huang,et al.  Framework for Optimal Fault-Tolerant Control Synthesis: Maximize Prefault While Minimize Post-Fault Behaviors , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[8]  W. Murray Wonham,et al.  Supervisory Control of Discrete-Event Systems , 2018 .

[9]  Christopher Leckie,et al.  A survey of coordinated attacks and collaborative intrusion detection , 2010, Comput. Secur..

[10]  Antonio Eduardo Carrilho da Cunha,et al.  Robust Supervisory Control against Intermittent Loss of Observations , 2014, WODES.

[11]  Jan Lunze,et al.  Online control reconfiguration for a faulty manufacturing process , 2011, 2011 3rd International Workshop on Dependable Control of Discrete Systems.

[12]  Raja Sengupta,et al.  Diagnosability of discrete-event systems , 1995, IEEE Trans. Autom. Control..

[13]  W. M. Wonham,et al.  The control of discrete event systems , 1989 .

[14]  Jaideep Srivastava,et al.  Intrusion Detection: A Survey , 2005 .

[15]  Klaus Werner Schmidt,et al.  Computation of Supervisors for Fault-Recovery and Repair for Discrete Event Systems , 2014, WODES.

[16]  Thomas Moor Fault-Tolerant Supervisory Control , 2015 .

[17]  Muttukrishnan Rajarajan,et al.  A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..