Detection of stealthy false data injection attacks against networked control systems via active data modification

Abstract This paper investigates the design and detection problems of stealthy false data injection (FDI) attacks against networked control systems from the different perspectives of an attacker and a defender, respectively. First, a Kalman filter-based output tracking control system is presented, where stealthy FDI attacks are designed for its feedback and forward channels so as to destroy the system performance while bypassing a traditional residual-based detector. Second, to successfully detect such two-channel stealthy attacks, an active data modification scheme is proposed, by which the measurement and control data are amended before transmitting them through communication networks. Theoretical analysis is then carried out for both ideal and practical cases to evaluate the effectiveness of the detection scheme. An interesting finding is that the attacks designed based on a false model obtained from those modified data can remain stealthy. Finally, simulation results are provided to validate the proposed attack design and detection schemes.

[1]  Guo-Ping Liu,et al.  Design and Implementation of Secure Networked Predictive Control Systems Under Deception Attacks , 2012, IEEE Transactions on Control Systems Technology.

[2]  Bruno Sinopoli,et al.  Detecting Integrity Attacks on SCADA Systems , 2014, IEEE Transactions on Control Systems Technology.

[3]  Emilia Fridman,et al.  Survey on time-delay approach to networked control , 2019, Annu. Rev. Control..

[4]  Qing-Long Han,et al.  Resilient Control Design Based on a Sampled-Data Model for a Class of Networked Control Systems Under Denial-of-Service Attacks , 2019, IEEE Transactions on Cybernetics.

[5]  Dan Ye,et al.  Summation Detector for False Data-Injection Attack in Cyber-Physical Systems , 2020, IEEE Transactions on Cybernetics.

[6]  Karl Henrik Johansson,et al.  A secure control framework for resource-limited adversaries , 2012, Autom..

[7]  Qing-Long Han,et al.  Security Control for Discrete-Time Stochastic Nonlinear Systems Subject to Deception Attacks , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[8]  Bruno Sinopoli,et al.  Physical Authentication of Control Systems: Designing Watermarked Control Inputs to Detect Counterfeit Sensor Outputs , 2015, IEEE Control Systems.

[9]  Donghua Zhou,et al.  Data-Based Predictive Control for Networked Nonlinear Systems With Network-Induced Delay and Packet Dropout , 2016, IEEE Transactions on Industrial Electronics.

[10]  Alie El-Din Mady,et al.  A Framework for Attack-Resilient Industrial Control Systems: Attack Detection and Controller Reconfiguration , 2018, Proceedings of the IEEE.

[11]  Quanyan Zhu,et al.  Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks , 2016, IEEE Transactions on Control of Network Systems.

[12]  Qing-Long Han,et al.  Distributed Krein space-based attack detection over sensor networks under deception attacks , 2019, Autom..

[13]  Qing-Long Han,et al.  A Survey on Model-Based Distributed Control and Filtering for Industrial Cyber-Physical Systems , 2019, IEEE Transactions on Industrial Informatics.

[14]  Guang-Hong Yang,et al.  Optimal stealthy false data injection attacks in cyber-physical systems , 2019, Inf. Sci..

[15]  Qing-Long Han,et al.  State estimation under false data injection attacks: Security analysis and system protection , 2018, Autom..

[16]  Qing-Long Han,et al.  Networked control systems: a survey of trends and techniques , 2020, IEEE/CAA Journal of Automatica Sinica.

[17]  Athanasios V. Vasilakos,et al.  False Data Injection on State Estimation in Power Systems—Attacks, Impacts, and Defense: A Survey , 2017, IEEE Transactions on Industrial Informatics.

[18]  Wei Xing Zheng,et al.  Denial-of-Service Power Dispatch Against Linear Quadratic Control via a Fading Channel , 2018, IEEE Transactions on Automatic Control.

[19]  Qing-Long Han,et al.  Network-Based Modeling and Proportional–Integral Control for Direct-Drive-Wheel Systems in Wireless Network Environments , 2020, IEEE Transactions on Cybernetics.

[20]  Qing-Long Han,et al.  Observer-Based Incremental Predictive Control of Networked Multi-Agent Systems With Random Delays and Packet Dropouts , 2020, IEEE Transactions on Circuits and Systems II: Express Briefs.

[21]  Bruno Sinopoli,et al.  On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks , 2016, IEEE Transactions on Automatic Control.

[22]  Guoqiang Hu,et al.  Secure Cooperative Event-Triggered Control of Linear Multiagent Systems Under DoS Attacks , 2020, IEEE Transactions on Control Systems Technology.

[23]  Hongtao Sun,et al.  A Survey on Security Communication and Control for Smart Grids Under Malicious Cyber Attacks , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[24]  Qing-Long Han,et al.  Distributed Event-Triggered Estimation Over Sensor Networks: A Survey , 2020, IEEE Transactions on Cybernetics.

[25]  Ling Shi,et al.  Causality Countermeasures for Anomaly Detection in Cyber-Physical Systems , 2018, IEEE Transactions on Automatic Control.

[26]  Riccardo Muradore,et al.  Energy-Efficient Intrusion Detection and Mitigation for Networked Control Systems Security , 2015, IEEE Transactions on Industrial Informatics.

[27]  Ling Shi,et al.  The Performance and Limitations of $\epsilon$- Stealthy Attacks on Higher Order Systems , 2017, IEEE Transactions on Automatic Control.

[28]  Ling Shi,et al.  Worst-case stealthy innovation-based linear attack on remote state estimation , 2018, Autom..

[29]  Yongqiang Wang,et al.  Secure and Privacy-Preserving Consensus , 2017, IEEE Transactions on Automatic Control.

[30]  Qing-Long Han,et al.  Secure Distributed Finite-Time Filtering for Positive Systems Over Sensor Networks Under Deception Attacks , 2020, IEEE Transactions on Cybernetics.

[31]  Warren E. Dixon,et al.  Detection and Mitigation of False Data Injection Attacks in Networked Control Systems , 2020, IEEE Transactions on Industrial Informatics.

[32]  Panos J. Antsaklis,et al.  Risk-Sensitive Control Under Markov Modulated Denial-of-Service (DoS) Attack Strategies , 2015, IEEE Transactions on Automatic Control.

[33]  Xiaohua Ge,et al.  Distributed Attack Detection and Secure Estimation of Networked Cyber-Physical Systems Against False Data Injection Attacks and Jamming Attacks , 2018, IEEE Transactions on Signal and Information Processing over Networks.

[34]  Ribhu Chopra,et al.  Statistical Tests for Detecting Granger Causality , 2018, IEEE Transactions on Signal Processing.

[35]  Donghua Zhou,et al.  Two-Channel False Data Injection Attacks Against Output Tracking Control of Networked Systems , 2016, IEEE Transactions on Industrial Electronics.

[36]  Daniel Liberzon,et al.  Switching in Systems and Control , 2003, Systems & Control: Foundations & Applications.

[37]  An-Yang Lu,et al.  False data injection attacks against state estimation in the presence of sensor failures , 2020, Inf. Sci..