Controller Cyber-Attack Detection and Isolation

被引:3
|
作者
Sztyber-Betley, Anna [1 ]
Syfert, Michal [1 ]
Koscielny, Jan Maciej [1 ]
Gorecka, Zuzanna [1 ]
机构
[1] Warsaw Univ Technol, Fac Mechatron, PL-00661 Warsaw, Poland
关键词
cybersecurity; cyber-attack; fault detection; fault isolation; control loop performance; neural networks; linear models; DATA-INJECTION ATTACKS; IMPACT;
D O I
10.3390/s23052778
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
This article deals with the cyber security of industrial control systems. Methods for detecting and isolating process faults and cyber-attacks, consisting of elementary actions named "cybernetic faults " that penetrate the control system and destructively affect its operation, are analysed. FDI fault detection and isolation methods and the assessment of control loop performance methods developed in the automation community are used to diagnose these anomalies. An integration of both approaches is proposed, which consists of checking the correct functioning of the control algorithm based on its model and tracking changes in the values of selected control loop performance indicators to supervise the control circuit. A binary diagnostic matrix was used to isolate anomalies. The presented approach requires only standard operating data (process variable (PV), setpoint (SP), and control signal (CV). The proposed concept was tested using the example of a control system for superheaters in a steam line of a power unit boiler. Cyber-attacks targeting other parts of the process were also included in the study to test the proposed approach's applicability, effectiveness, and limitations and identify further research directions.
引用
收藏
页数:27
相关论文
共 50 条
  • [1] Cyber-attack and Fault Detection using a Digital Twin of the Controller Software
    Kallesoe, Carsten Skovmose
    Wisniewski, Rafal
    IFAC PAPERSONLINE, 2024, 58 (04): : 97 - 102
  • [2] The Future Roadmap for Cyber-attack Detection
    Soleymanzadeh, Raha
    Kashef, Rasha
    2022 6TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, CSP 2022, 2022, : 66 - 70
  • [3] CANon: Lightweight and Practical Cyber-Attack Detection for Automotive Controller Area Networks
    Baek, Youngmi
    Shin, Seongjoo
    SENSORS, 2022, 22 (07)
  • [4] A Low Power Cyber-Attack Detection and Isolation Mechanism for Wireless Sensor Network
    Dhunna, Gurpreet Singh
    Al-Anbagi, Irfan
    2017 IEEE 86TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-FALL), 2017,
  • [5] Data Mining Based Cyber-Attack Detection
    TIANFIELD Huaglory
    系统仿真技术, 2017, 13 (02) : 90 - 104
  • [6] Cyber-Attack Detection for Automotive Cyber-Physical Systems
    Lee, Suyun
    Jung, Sunjae
    Baek, Youngmi
    BUILDSYS'21: PROCEEDINGS OF THE 2021 ACM INTERNATIONAL CONFERENCE ON SYSTEMS FOR ENERGY-EFFICIENT BUILT ENVIRONMENTS, 2021, : 214 - 215
  • [7] Fault Detection and Isolation of Cyber-Physical System under Cyber-Attack Using Bayesian Network
    Tanwar, Monika
    Raghavan, Nagarajan
    Dammala, Pradeep K.
    2024 IEEE INTERNATIONAL CONFERENCE ON PROGNOSTICS AND HEALTH MANAGEMENT, ICPHM 2024, 2024, : 84 - 92
  • [8] Cyber-Attack Attributes
    Kadivar, Mehdi
    TECHNOLOGY INNOVATION MANAGEMENT REVIEW, 2014, : 22 - 27
  • [9] The Law of Cyber-Attack
    Hathaway, Oona A.
    Crootof, Rebecca
    Levitz, Philip
    Nix, Haley
    Nowlan, Aileen
    Perdue, William
    Spiegel, Julia
    CALIFORNIA LAW REVIEW, 2012, 100 (04) : 817 - 885
  • [10] Cyber-attack group analysis method based on association of cyber-attack information
    Son, Kyung-ho
    Kim, Byung-ik
    Lee, Tae-jin
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (01): : 260 - 280