A Resilient Cyber-Physical Demand Forecasting System for Critical Infrastructures against Stealthy False Data Injection Attacks

The safe and efficient function of critical national infrastructure (CNI) relies on the accurate demand forecast. Cyber-physical system-based demand forecasting systems (CDFS), typically found in CNI (such as energy, water, and transport), are highly vulnerable to being compromised under false data injection attacks (FDIAs). The problem is that the majority of existing CDFS employ anomaly-based intrusion detection systems (AIDS) to combat FDIAs. Since the distribution of demand time series keeps changing naturally with time, AIDS treat a major change in the distribution as an attack, but this approach is not effective against colluding FDIAs. To overcome this problem, we propose a novel resilient CDFS called PRDFS (Proposed Resilient Demand Forecasting System). The primary novelty of PRDFS is that it uses signature-based intrusion detection systems (SIDS) that automatically generate attack signatures through the game-theoretic approach for the early detection of malicious nodes. We simulate the performance of PRDFS under colluding FDIA on High Performance Computing (HPC). The simulation results show that the demand forecasting resilience of PRDFS never goes below 80%, regardless of the percentage of malicious nodes. In contrast, the resilience of the benchmark system decreases sharply from about 99% to less than 30%, over the simulation period as the percentage of malicious nodes increases.

[1]  Walter Lucia,et al.  Undetectable Finite-Time Covert Attack on Constrained Cyber-Physical Systems , 2022, IEEE Transactions on Control of Network Systems.

[2]  Md. Erfanul Hoque,et al.  A Novel Dynamic Demand Forecasting Model for Resilient Supply Chains using Machine Learning , 2021, 2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC).

[3]  Yang Han,et al.  Trustworthiness in Industrial IoT Systems Based on Artificial Intelligence , 2021, IEEE Transactions on Industrial Informatics.

[4]  S. Tanwar,et al.  RAKSHAK: Resilient and Scalable Demand Response Management Scheme for Smart Grid Systems , 2021, 2021 11th International Conference on Cloud Computing, Data Science & Engineering (Confluence).

[5]  Xianpei Wang,et al.  Analysis of false data injection attacks in power systems: A dynamic Bayesian game-theoretic approach. , 2021, ISA transactions.

[6]  Eyasu Getahun Chekole,et al.  SCOPE: Secure Compiling of PLCs in Cyber-Physical Systems , 2020, Int. J. Crit. Infrastructure Prot..

[7]  Vidushi Agarwal,et al.  Identification of Defective Nodes in Cyber-Physical Systems , 2020, 2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS).

[8]  Prakash Ranganathan,et al.  Cybersecurity Attacks in Vehicular Sensors , 2020, IEEE Sensors Journal.

[9]  Muhammad Tariq,et al.  Secure and resilient demand side management engine using machine learning for IoT-enabled smart grid , 2020 .

[10]  Nikhil Muralidhar,et al.  Multivariate Long-Term State Forecasting in Cyber-Physical Systems: A Sequence to Sequence Approach , 2019, 2019 IEEE International Conference on Big Data (Big Data).

[11]  Peter Volgyesi,et al.  Evaluating Resilience of Grid Load Predictions under Stealthy Adversarial Attacks , 2019, 2019 Resilience Week (RWS).

[12]  Xenofon D. Koutsoukos,et al.  Design of Load Forecast Systems Resilient Against Cyber-Attacks , 2019, GameSec.

[13]  Chen-Fu Chien,et al.  UNISON data-driven intermittent demand forecast framework to empower supply chain resilience and an empirical study in electronics distribution , 2019, Comput. Ind. Eng..

[14]  Amir Masoud Rahmani,et al.  Trust-based recommendation systems in Internet of Things: a systematic literature review , 2019, Human-centric Computing and Information Sciences.

[15]  Limin Sun,et al.  Detecting stealthy attacks against industrial control systems based on residual skewness analysis , 2019, EURASIP J. Wirel. Commun. Netw..

[16]  Fábio Porto,et al.  Nonstationary time series transformation methods: An experimental review , 2019, Knowl. Based Syst..

[17]  Mauro Conti,et al.  Computational intelligence approaches for energy load forecasting in smart energy management grids: state of the art, future challenges, and research directionsand Research Directions , 2018 .

[18]  Ö. Özer,et al.  Trust and Trustworthiness , 2017, The Handbook of Behavioral Operations.

[19]  N. Karthik,et al.  A Hybrid Trust Management Scheme for Wireless Sensor Networks , 2017, Wirel. Pers. Commun..

[20]  Tareq Abed Mohammed,et al.  Understanding of a convolutional neural network , 2017, 2017 International Conference on Engineering and Technology (ICET).

[21]  Joos-Hendrik Böse,et al.  Probabilistic Demand Forecasting at Scale , 2017, Proc. VLDB Endow..

[22]  Qusay H. Mahmoud,et al.  Cyber physical systems security: Analysis, challenges and solutions , 2017, Comput. Secur..

[23]  Ehsan Ardjmand,et al.  Water demand forecasting: review of soft computing methods , 2017, Environmental Monitoring and Assessment.

[24]  Smruti R. Sarangi,et al.  Internet of Things: Architectures, Protocols, and Applications , 2017, J. Electr. Comput. Eng..

[25]  Jie Wu,et al.  Collusion Attack Detection in Networked Systems , 2016, 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech).

[26]  S. AnanthanarayanaV.,et al.  Data Trustworthiness in Wireless Sensor Networks , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.

[27]  Heeyoung Kim,et al.  A new metric of absolute percentage error for intermittent demand forecasts , 2016 .

[28]  Abdelhak Mourad Guéroui,et al.  On-Off Attacks Mitigation against Trust Systems in Wireless Sensor Networks , 2015, CIIA.

[29]  Elisa Bertino,et al.  Provenance-based trustworthiness assessment in sensor networks , 2010, DMSN '10.

[30]  Rodrigo Roman,et al.  Trust management systems for wireless sensor networks: Best practices , 2010, Comput. Commun..

[31]  Subhash Challa,et al.  Bayesian Fusion Algorithm for Inferring Trust in Wireless Sensor Networks , 2010, J. Networks.

[32]  B. Clifford Neuman,et al.  Trust based Approach for Improving Data Reliability in Industrial Sensor Networks , 2007, IFIPTM.

[33]  Anna Diva P. Lotufo,et al.  Electric power systems load forecasting: a survey , 1999, PowerTech Budapest 99. Abstract Records. (Cat. No.99EX376).

[34]  Donald F. Specht,et al.  A general regression neural network , 1991, IEEE Trans. Neural Networks.

[35]  Mrityunjay Kumar Mishra,et al.  Demand-side management and its impact on utility and consumers through a game theoretic approach , 2022, International Journal of Electrical Power & Energy Systems.

[36]  I. Viksnin,et al.  Empirical Study on Trust, Reputation, and Game Theory Approach to Secure Communication in a Group of Unmanned Vehicles , 2019, MICSECS.

[37]  Dr. Dengsheng Zhang Fundamentals of Image Data Mining , 2019, Texts in Computer Science.

[38]  Lei Liu,et al.  Particle swarm optimization algorithm: an overview , 2017, Soft Computing.

[39]  Ioannis P. Panapakidis,et al.  Day-ahead natural gas demand forecasting based on the combination of wavelet transform and ANFIS/genetic algorithm/neural network model , 2017 .

[40]  Rebecca Rogers,et al.  Resilience of the Internet of Things (IoT) from an Information Assurance (IA) perspective , 2016, 2016 10th International Conference on Software, Knowledge, Information Management & Applications (SKIMA).

[41]  Abbas Khosravi,et al.  Examining performance of aggregation algorithms for neural network-based electricity demand forecasting , 2015 .

[42]  Jay Lee,et al.  A Cyber-Physical Systems architecture for Industry 4.0-based manufacturing systems , 2015 .

[43]  Henry Tabe,et al.  Wavelet Transform , 2009, Encyclopedia of Biometrics.

[44]  Shichao Zhang,et al.  Detection Models of Collusion Attacks , 2008 .