Controller Cyber-Attack Detection and Isolation

被引:3
|
作者
Sztyber-Betley, Anna [1 ]
Syfert, Michal [1 ]
Koscielny, Jan Maciej [1 ]
Gorecka, Zuzanna [1 ]
机构
[1] Warsaw Univ Technol, Fac Mechatron, PL-00661 Warsaw, Poland
关键词
cybersecurity; cyber-attack; fault detection; fault isolation; control loop performance; neural networks; linear models; DATA-INJECTION ATTACKS; IMPACT;
D O I
10.3390/s23052778
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
This article deals with the cyber security of industrial control systems. Methods for detecting and isolating process faults and cyber-attacks, consisting of elementary actions named "cybernetic faults " that penetrate the control system and destructively affect its operation, are analysed. FDI fault detection and isolation methods and the assessment of control loop performance methods developed in the automation community are used to diagnose these anomalies. An integration of both approaches is proposed, which consists of checking the correct functioning of the control algorithm based on its model and tracking changes in the values of selected control loop performance indicators to supervise the control circuit. A binary diagnostic matrix was used to isolate anomalies. The presented approach requires only standard operating data (process variable (PV), setpoint (SP), and control signal (CV). The proposed concept was tested using the example of a control system for superheaters in a steam line of a power unit boiler. Cyber-attacks targeting other parts of the process were also included in the study to test the proposed approach's applicability, effectiveness, and limitations and identify further research directions.
引用
收藏
页数:27
相关论文
共 50 条
  • [31] Logical Filter Approach for Early Stage Cyber-Attack Detection
    Jusas, Vacius
    Japertas, Saulius
    Baksys, Tautvydas
    Bhandari, Sandeepak
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2019, 16 (02) : 491 - 514
  • [32] Cyber-attack Detection in the Networked Control System with Faulty Plant
    Yaseen, Amer Atta
    Bayart, Mireille
    2017 25TH MEDITERRANEAN CONFERENCE ON CONTROL AND AUTOMATION (MED), 2017, : 980 - 985
  • [33] Robustness of the Markov-chain model for cyber-attack detection
    Ye, N
    Zhang, YB
    Borror, CM
    IEEE TRANSACTIONS ON RELIABILITY, 2004, 53 (01) : 116 - 123
  • [34] Simulating a cyber-attack on an autonomous sea surface vessel's rudder controller
    Astrov, Igor
    Bauk, Sanja
    2024 13TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING, MECO 2024, 2024, : 558 - 564
  • [35] Adaptive and Lightweight Cyber-Attack Detection in Modern Automotive Cyber-Physical Systems
    Baek, Youngmi
    Park, Seo-Hee
    2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
  • [36] Enhanced Anomaly Detection for Cyber-Attack Detection in Smart Water Distribution Systems
    Stojanovic, Branka
    Neuschmied, Helmut
    Winter, Martin
    Kleb, Ulrike
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
  • [37] Cyber-attack as inevitable kinetic war
    Lilienthal, Gary
    Ahmad, Nehaluddin
    COMPUTER LAW & SECURITY REVIEW, 2015, 31 (03) : 390 - 400
  • [38] Cyber-attack Detection Strategy Based on Distribution System State Estimation
    Huan Long
    Zhi Wu
    Chen Fang
    Wei Gu
    Xinchi Wei
    Huiyu Zhan
    JournalofModernPowerSystemsandCleanEnergy, 2020, 8 (04) : 669 - 678
  • [39] Cyber-attack and defense simulation framework
    Bergin, Dennis Lee
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2015, 12 (04): : 383 - 392
  • [40] Adaptive cyber-attack modeling system
    Gonsalves, Paul G.
    Dougherty, Edward T.
    SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C31)TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE V, 2006, 6201