Attack Detection Method based on Bayesian Hypothesis Testing Principle in CPS

Abstract Cyber physical system (CPS) introduces the concepts and methods of communication networks into traditional industrial processes, and realizes the control of physical processes by information flow, which is a key issue in national defense, military and industrial production. Many application problems provide solutions. However, this also makes the original pure industrial system environment face more security risks. Considering the security of the CPS control layer, based on the principle of Bayesian hypothesis testing, a detection method for the tampering of the measurement data of the control layer is proposed. This method uses the prior knowledge of the parameters to make the model still usable under the condition of a small sample amount of data. At the same time, the judgment conclusions made can accurately give the probability value of the attack behavior, which can more intuitively explain the possibility of the current statement. Compared with the previous traditional hypothesis testing method, this method is in line with the background of the CPS attack, so it has practical advantages.

[1]  Pinyi Ren,et al.  Security Enhancement for IoT Communications Exposed to Eavesdroppers With Uncertain Locations , 2016, IEEE Access.

[2]  Houbing Song,et al.  Industrial Security Solution for Virtual Reality , 2021, IEEE Internet of Things Journal.

[3]  Qian Xu,et al.  Security-Aware Waveforms for Enhancing Wireless Communications Privacy in Cyber-Physical Systems via Multipath Receptions , 2017, IEEE Internet of Things Journal.

[4]  Wei Wei,et al.  Research and Simulation of Queue Management Algorithms in Ad Hoc Networks Under DDoS Attack , 2017, IEEE Access.

[5]  Syed Hassan Ahmed,et al.  NBC-MAIDS: Naïve Bayesian classification technique in multi-agent system-enriched IDS for securing IoT against DDoS attacks , 2018, The Journal of Supercomputing.

[6]  Tie Qiu,et al.  A Local-Optimization Emergency Scheduling Scheme With Self-Recovery for a Smart Grid , 2017, IEEE Transactions on Industrial Informatics.

[7]  Wenjia Li,et al.  ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.

[8]  Nathan van de Wouw,et al.  Reachable Sets of Hidden CPS Sensor Attacks: Analysis and Synthesis Tools , 2017 .

[9]  Giorgio Battistelli,et al.  A Bayesian approach to joint attack detection and resilient state estimation , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[10]  Zhiwen Zeng,et al.  An Adaptive Collection Scheme-Based Matrix Completion for Data Gathering in Energy-Harvesting Wireless Sensor Networks , 2019, IEEE Access.

[11]  Jianying Zhou,et al.  Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS , 2018, ACSAC.

[12]  Shusen Yang,et al.  A Cost-Efficient Communication Framework for Battery-Switch-Based Electric Vehicle Charging , 2017, IEEE Communications Magazine.

[13]  Jianxiong Zhou,et al.  A Real-Time Monitoring System of Industry Carbon Monoxide Based on Wireless Sensor Networks , 2015, Sensors.

[14]  Lui Sha,et al.  Data-Centered Runtime Verification of Wireless Medical Cyber-Physical System , 2017, IEEE Transactions on Industrial Informatics.

[15]  Houbing Song,et al.  Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures , 2019, IEEE Communications Surveys & Tutorials.

[16]  Omprakash Kaiwartya,et al.  Mobile Edge Computing for Big-Data-Enabled Electric Vehicle Charging , 2018, IEEE Communications Magazine.

[17]  Hong Wen,et al.  Adaboost-based security level classification of mobile intelligent terminals , 2019, The Journal of Supercomputing.

[18]  Houbing Song,et al.  Deep-Learning-Enabled Security Issues in the Internet of Things , 2021, IEEE Internet of Things Journal.

[19]  Yonghui Song,et al.  A New Deep-Q-Learning-Based Transmission Scheduling Mechanism for the Cognitive Internet of Things , 2018, IEEE Internet of Things Journal.

[20]  Masoud Abbaszadeh,et al.  Attack Detection for Securing Cyber Physical Systems , 2019, IEEE Internet of Things Journal.

[21]  Maode Ma,et al.  Multi-access edge computing enabled internet of things: advances and novel applications , 2020, Neural Computing and Applications.

[22]  Soummya Kar,et al.  Dynamic Attack Detection in Cyber-Physical Systems With Side Initial State Information , 2015, IEEE Transactions on Automatic Control.

[23]  Houbing Song,et al.  Cloudlet-Based Mobile Cloud Computing for Healthcare Applications , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[24]  Paulo F. Pires,et al.  System modelling and performance evaluation of a three-tier Cloud of Things , 2017, Future Gener. Comput. Syst..

[25]  Ruidong Li,et al.  SEDMDroid: An Enhanced Stacking Ensemble Framework for Android Malware Detection , 2021, IEEE Transactions on Network Science and Engineering.

[26]  Houbing Song,et al.  Imperfect Information Dynamic Stackelberg Game Based Resource Allocation Using Hidden Markov for Cloud Computing , 2018, IEEE Transactions on Services Computing.