An algebraic detection approach for control systems under multiple stochastic cyber-attacks

In order to compromise a target control system successfully, hackers possibly attempt to launch multiple cyberattacks aiming at multiple communication channels of the control system. However, the problem of detecting multiple cyber-attacks has been hardly investigated so far. Therefore, this paper deals with the detection of multiple stochastic cyber-attacks aiming at multiple communication channels of a control system. Our goal is to design a detector for the control system under multiple cyberattacks. Based on frequency-domain transformation technique and auxiliary detection tools, an algebraic detection approach is proposed. By applying the presented approach, residual information caused by different attacks is obtained respectively and anomalies in the control system are detected. Sufficient and necessary conditions guaranteeing the detectability of the multiple stochastic cyber-attacks are obtained. The presented detection approach is simple and straightforward. Finally, two simulation examples are provided, and the simulation results show that the detection approach is effective and feasible.

[1]  Ramesh Chandra Joshi,et al.  Dual-Level Attack Detection and Characterization for Networks under DDoS , 2010, 2010 International Conference on Availability, Reliability and Security.

[2]  Larry Samuelson,et al.  Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .

[3]  Mohamed Darouach,et al.  A Stochastic Cyber-Attack Detection Scheme for Stochastic Control Systems Based on Frequency-Domain Transformation Technique , 2014, NSS.

[4]  S. Shankar Sastry,et al.  Security of interdependent and identical networked control systems , 2013, Autom..

[5]  Jill Slay,et al.  Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.

[6]  Siddharth Sridhar,et al.  Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.

[7]  Yilin Mo,et al.  False Data Injection Attacks in Control Systems , 2010 .

[8]  Hamed Mohsenian Rad,et al.  Distributed Internet-Based Load Altering Attacks Against Smart Power Grids , 2011, IEEE Transactions on Smart Grid.

[9]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[10]  Antonio Bicchi,et al.  Consensus Computation in Unreliable Networks: A System Theoretic Approach , 2010, IEEE Transactions on Automatic Control.

[11]  Xavier Litrico,et al.  Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks , 2013, IEEE Transactions on Control Systems Technology.

[12]  Mohamed Darouach,et al.  A model predictive approach for cyber-attack detection and mitigation in control systems , 2013, 52nd IEEE Conference on Decision and Control.

[13]  Randy L. Ekl,et al.  Security Technology for Smart Grid Networks , 2010, IEEE Transactions on Smart Grid.

[14]  Karl Henrik Johansson,et al.  Cyber-security of SCADA systems , 2012, 2012 IEEE PES Innovative Smart Grid Technologies (ISGT).

[15]  Soummya Kar,et al.  Distributed detection and isolation of topology attacks in power networks , 2012, HiCoNS '12.

[16]  Karl Henrik Johansson,et al.  The quadruple-tank process: a multivariable laboratory process with an adjustable zero , 2000, IEEE Trans. Control. Syst. Technol..

[17]  A. Jamalipour,et al.  Detection of DoS and DDoS attacks in NGMN using frequency domain analysis , 2008, 2008 14th Asia-Pacific Conference on Communications.

[18]  André Teixeira,et al.  Networked control systems under cyber attacks with applications to power networks , 2010, Proceedings of the 2010 American Control Conference.

[19]  Shreyas Sundaram,et al.  Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents , 2011, IEEE Transactions on Automatic Control.

[20]  Marios M. Polycarpou,et al.  A Fault Diagnosis and Security Framework for Water Systems , 2010, IEEE Transactions on Control Systems Technology.

[21]  Emanuele Garone,et al.  False Data Injection Attacks for State Estimation in Cyber-Physical Systems , 2010, CDC 2010.