A Novel Cyber Attack Detection Method in Networked Control Systems
- 26 June 2018
- journal article
- research article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Cybernetics
- Vol. 48 (11), 3254-3264
- https://doi.org/10.1109/tcyb.2018.2843358
Abstract
This paper is concerned with cyber attack detection in a networked control system. A novel cyber attack detection method, which consists of two steps: 1) a prediction step and 2) a measurement update step, is developed. An estimation ellipsoid set is calculated through updating the prediction ellipsoid set with the current sensor measurement data. Based on the intersection between these two ellipsoid sets, two criteria are provided to detect cyber attacks injecting malicious signals into physical components (i.e., sensors and actuators) or into a communication network through which information among physical components is transmitted. There exists a cyber attack on sensors or a network exchanging data between sensors and controllers if there is no intersection between the prediction set and the estimation set updated at the current time instant. Actuators or network transmitting data between controllers and actuators are under a cyber attack if the prediction set has no intersection with the estimation set updated at the previous time instant. Recursive algorithms for the calculation of the two ellipsoid sets and for the attack detection on physical components and the communication network are proposed. Simulation results for two types of cyber attacks, namely a replay attack and a bias injection attack, are provided to demonstrate the effectiveness of the proposed method.Keywords
Funding Information
- Australian Research Council (DP160103567)
This publication has 47 references indexed in Scilit:
- Detecting Integrity Attacks on SCADA SystemsIEEE Transactions on Control Systems Technology, 2013
- A novel islanding fault detection for distributed generation systemsInternational Journal of Robust and Nonlinear Control, 2013
- Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion DetectionIEEE Transactions on Cybernetics, 2013
- Stuxnet and the Future of Cyber WarSurvival, 2011
- Set-membership filtering for systems with sensor saturationAutomatica, 2009
- Kalman filtering with state equality constraintsIEEE Transactions on Aerospace and Electronic Systems, 2002
- Robust filtering for discrete-time systems with bounded noise and parametric uncertaintyIEEE Transactions on Automatic Control, 2001
- Semidefinite ProgrammingSIAM Review, 1996
- Recursive state estimation for a set-membership description of uncertaintyIEEE Transactions on Automatic Control, 1971
- Recursive state estimation: Unknown but bounded errors and system inputsIEEE Transactions on Automatic Control, 1968