A controller design for mitigation of passive system identification attacks in networked control systems

The literature regarding attacks in Networked Control Systems (NCS) indicates that covert and accurate attacks must be designed based on an accurate knowledge about the model of the attacked system. In this context, the literature on NCS presents the Passive System Identification attack as a metaheuristic-based tool to provide the attacker with the required system models. However, the scientific literature does not report countermeasures to mitigate the identification process performed by such passive metaheuristic-based attack. In this sense, this work proposes the use of a randomly switching controller as a countermeasure for the Passive System Identification attack, in case of failure of other conventional security mechanisms – such as encryption, network segmentation and firewall policies. This novel countermeasure aims to hinder the identification of the controller, so that the model obtained by the attacker is imprecise or ambiguous, in such a way that the attacker hesitates to launch covert or model-dependent attacks against the NCS. The simulation results indicate that this countermeasure is capable to mitigate the mentioned attack at the same time that it performs a satisfactory plant control.

[1]  A. Morse Supervisory control of families of linear set-point controllers Part I. Exact matching , 1996, IEEE Trans. Autom. Control..

[2]  Sameer Qazi,et al.  Cyber Security Backdrop: A SCADA testbed , 2014, 2014 IEEE Computers, Communications and IT Applications Conference.

[3]  Jiadong Wang,et al.  Identification of Switched Linear Systems , 2013 .

[4]  Ralph Langner,et al.  Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.

[5]  Guo-Ping Liu,et al.  Design and Implementation of Secure Networked Predictive Control Systems Under Deception Attacks , 2012, IEEE Transactions on Control Systems Technology.

[6]  Raphael Machado,et al.  Covert Attacks in Cyber-Physical Control Systems , 2016, IEEE Transactions on Industrial Informatics.

[7]  Tang Ming . Wei Lian. Si Tuo Lin Si,et al.  Cryptography and Network Security - Principles and Practice , 2015 .

[8]  A. Morse,et al.  Stability of switched systems with average dwell-time , 1999, Proceedings of the 38th IEEE Conference on Decision and Control (Cat. No.99CH36304).

[9]  Roy S. Smith,et al.  A Decoupled Feedback Structure for Covertly Appropriating Networked Control Systems , 2011 .

[10]  Y. Tipsuwan,et al.  An implementation of a networked PI controller over IP network , 2003, IECON'03. 29th Annual Conference of the IEEE Industrial Electronics Society (IEEE Cat. No.03CH37468).

[11]  John Y. Hung,et al.  Denial of service attacks on network-based control systems: impact and mitigation , 2005, IEEE Transactions on Industrial Informatics.

[12]  A. Michel,et al.  Qualitative analysis of discrete-time switched systems , 2002, Proceedings of the 2002 American Control Conference (IEEE Cat. No.CH37301).

[13]  Craig Partridge,et al.  Single-packet IP traceback , 2002, TNET.

[14]  Hai Lin,et al.  Stability and Stabilizability of Switched Linear Systems: A Survey of Recent Results , 2009, IEEE Transactions on Automatic Control.

[15]  A. Morse,et al.  Basic problems in stability and design of switched systems , 1999 .

[16]  Gongpu Wang,et al.  Intercept Behavior Analysis of Industrial Wireless Sensor Networks in the Presence of Eavesdropping Attack , 2015, IEEE Transactions on Industrial Informatics.

[17]  Xavier Litrico,et al.  Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks , 2013, IEEE Transactions on Control Systems Technology.

[18]  Antonella Ferrara,et al.  Model-based event-triggered control for freeway traffic systems , 2015, 2015 International Conference on Event-based Control, Communication, and Signal Processing (EBCCSP).

[19]  Karl Henrik Johansson,et al.  A secure control framework for resource-limited adversaries , 2012, Autom..

[20]  Quang Phuc Ha,et al.  Robust Non-Overshoot Time Responses Using Cascade Sliding Mode-PID Control , 2007, J. Adv. Comput. Intell. Intell. Informatics.

[21]  Y. Tipsuwan,et al.  Network-based control systems: a tutorial , 2001, IECON'01. 27th Annual Conference of the IEEE Industrial Electronics Society (Cat. No.37243).

[22]  Antonella Ferrara,et al.  A switched ramp-metering controller for freeway traffic systems , 2015, ADHS.

[23]  Gideon Paul Caplovitz,et al.  Form features provide a cue to the angular velocity of rotating objects. , 2014, Journal of experimental psychology. Human perception and performance.

[24]  Karen A. Scarfone,et al.  Guide to Industrial Control Systems (ICS) Security , 2015 .

[25]  Pinar Çivicioglu,et al.  Backtracking Search Optimization Algorithm for numerical optimization problems , 2013, Appl. Math. Comput..

[26]  Rajesh Singh,et al.  Wireless Controlled Intelligent Heating System Using HPSO , 2015 .

[27]  Zhiliang Wang,et al.  Security Solutions for Networked Control Systems Based on DES Algorithm and Improved Grey Prediction Model , 2013 .

[28]  Mo-Yuen Chow,et al.  Networked Control System: Overview and Research Trends , 2010, IEEE Transactions on Industrial Electronics.

[29]  Manoj Kumar,et al.  Networked Control of a Large Pressurized Heavy Water Reactor (PHWR) With Discrete Proportional-Integral-Derivative (PID) Controllers , 2013, IEEE Transactions on Nuclear Science.

[30]  M. El-Sharkawi,et al.  Variable Structure Tracking of DC Motor for High Performance Applications , 1989, IEEE Power Engineering Review.

[31]  Shin'ya Nishida,et al.  Advancement of motion psychophysics: review 2001-2010. , 2011, Journal of vision.

[32]  Roy S. Smith,et al.  Covert Misappropriation of Networked Control Systems: Presenting a Feedback Structure , 2015, IEEE Control Systems.

[33]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[34]  Joe H. Chow,et al.  Stability of an adaptive switched controller for power system oscillation damping using remote synchrophasor signals , 2014, 53rd IEEE Conference on Decision and Control.

[35]  Punit Sharma,et al.  A Taxonomy of Physical Layer Attacks in MANET , 2015 .

[36]  Yuanqing Xia,et al.  Recent progress in networked control systems — A survey , 2015, International Journal of Automation and Computing.

[37]  Alan Oliveira de Sá,et al.  Bio-inspired Active Attack for Identification of Networked Control Systems , 2017 .

[38]  Robin J. Evans,et al.  Stability results for switched controller systems , 1999, Autom..