A model predictive approach for cyber-attack detection and mitigation in control systems

The paper presents a new approach for control security. Specifically, cyber-attacks on the controller are investigated by means of optimization techniques in order to determine the worst-case scenario. Then, a novel attack detector based on limit checking is introduced. The particularity of this detector is that no specific controller knowledge is necessary. Hence, the vulnerability of the detector can be reduced since no reconfiguration is required (limited accessibility). Finally, the paper shows that the effect of the attacks on the system can be significantly mitigated by applying proper optimal control laws.

[1]  Karl Henrik Johansson,et al.  Distributed fault detection for interconnected second-order systems , 2011, Autom..

[2]  Jan M. Maciejowski,et al.  Predictive control : with constraints , 2002 .

[3]  Jill Slay,et al.  Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.

[4]  Alberto Bemporad,et al.  The explicit solution of model predictive control via multiparametric quadratic programming , 2000, Proceedings of the 2000 American Control Conference. ACC (IEEE Cat. No.00CH36334).

[5]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[6]  S. Shankar Sastry,et al.  Research Challenges for the Security of Control Systems , 2008, HotSec.

[7]  Karl Henrik Johansson,et al.  Attack models and scenarios for networked control systems , 2012, HiCoNS '12.

[8]  Guo-Ping Liu,et al.  Design and Implementation of Secure Networked Predictive Control Systems Under Deception Attacks , 2012, IEEE Transactions on Control Systems Technology.

[9]  E. Byres,et al.  The Myths and Facts behind Cyber Security Risks for Industrial Control Systems , 2004 .

[10]  Janos Gertler,et al.  Fault detection and diagnosis in engineering systems , 1998 .

[11]  Michel Kinnaert,et al.  Diagnosis and Fault-Tolerant Control , 2004, IEEE Transactions on Automatic Control.

[12]  Emanuele Garone,et al.  False Data Injection Attacks for State Estimation in Cyber-Physical Systems , 2010, CDC 2010.

[13]  Steven X. Ding,et al.  Model-based Fault Diagnosis Techniques: Design Schemes, Algorithms, and Tools , 2008 .

[14]  S. Shankar Sastry,et al.  Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.

[15]  Yilin Mo,et al.  False Data Injection Attacks in Control Systems , 2010 .