Detection of Deception Attacks in Supervisory Control Systems Using Bond Graph

被引:1
|
作者
Zerdazi, I. [1 ,2 ]
Fezari, M. [1 ]
Ouziala, M. [2 ,3 ]
机构
[1] Badji Mokhtar Annaba Univ, Dept Elect, Lab Automat & Signals Annaba LASA, Annaba 23000, Algeria
[2] Lille Univ, Polytech Lille, Ctr Rech Informat Signal & Automat Lille CRIStAL, UMR CNRS 9189, F-59655 Villeneuve Dascq, France
[3] MHamed Bougara Boumerdes Univ, Fac Engn Sci, Lab Mech & Solid Syst LMSS, Boumerdes 30000, Algeria
关键词
SCADA; cyber-attacks; bond graph; deception attack; analytical redundancy relation;
D O I
10.3103/S0146411620020091
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Supervisory Control and Data Acquisition (SCADA) systems can be subject to cyber-attacks due to their extensive connectivity to information and communication technologies. Those communications are used to connect sensors, actuators, and programmable logic controllers (PLCs) to monitor and control the process. The use of communication networks enlarges the vulnerability of SCADA to cyber-attacks that can drive the system to unsafe states. A variety of approaches in the field of attack detection have been proposed, however they are characterized very expensive, low detection rate or are system specific. One of the powerful cyber-attacks targeting SCADA systems is deception attack, where the attacker can change sensor reading parameters. In this work, we propose a new defense strategy that detects parameter changes generated by deception attacks in the sensor and control part in supervisory control systems. To do so, we use the bond graph (BG) modeling tool.
引用
下载
收藏
页码:156 / 167
页数:12
相关论文
共 50 条
  • [1] Detection of Deception Attacks in Supervisory Control Systems Using Bond Graph
    I. Zerdazi
    M. Fezari
    M. Ouziala
    Automatic Control and Computer Sciences, 2020, 54 : 156 - 167
  • [2] Sensor deception attacks against security in supervisory control systems
    Yao, Jingshi
    Li, Shaoyuan
    Yin, Xiang
    AUTOMATICA, 2024, 159
  • [3] Detection and mitigation of classes of attacks in supervisory control systems
    Carvalho, Lilian Kawakami
    Wu, Yi-Chin
    Kwong, Raymond
    Lafortune, Stephane
    AUTOMATICA, 2018, 97 : 121 - 133
  • [4] Dealing with sensor and actuator deception attacks in supervisory control
    Meira-Goes, Romulo
    Marchand, Herve
    Lafortune, Stephane
    AUTOMATICA, 2023, 147
  • [5] Sensor Deception Attacks Against Initial-State Privacy in Supervisory Control Systems
    Yao, Jingshi
    Yin, Xiang
    Li, Shaoyuan
    2022 IEEE 61ST CONFERENCE ON DECISION AND CONTROL (CDC), 2022, : 4839 - 4845
  • [6] Detection and Prevention of Actuator Enablement Attacks in Supervisory Control Systems
    Carvalho, Lilian Kawakami
    Wu, Yi-Chin
    Kwong, Raymond
    Lafortune, Stephane
    2016 13TH INTERNATIONAL WORKSHOP ON DISCRETE EVENT SYSTEMS (WODES), 2016, : 298 - 305
  • [7] Detecting probability footprints of sensor deception attacks in supervisory control
    Fahim, Parastou
    Meira-Goes, Romulo
    IFAC PAPERSONLINE, 2024, 58 (01): : 192 - 197
  • [8] An Anomaly Detection Technique for Deception Attacks in Industrial Control Systems
    Qassim, Q. S.
    Ahmad, A. R.
    Ismail, R.
    Bakar, Abu A.
    Rahim, Abdul F.
    Mokhtar, M. Z.
    Ramli, R.
    Mohd, Yusof B.
    Mahdi, Mohammed Najah
    2019 IEEE 5TH INTL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / IEEE INTL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC) / IEEE INTL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2019, : 267 - 272
  • [9] Active Synchronous Detection of Deception Attacks in Microgrid Control Systems
    Li, Yan
    Zhang, Peng
    Zhang, Liang
    Wang, Bing
    IEEE TRANSACTIONS ON SMART GRID, 2017, 8 (01) : 373 - 375
  • [10] Detection of Deception Attacks on the Backward Channel of Networked Control Systems
    Pang Zhonghua
    Liu Guoping
    Zhou Donghua
    PROCEEDINGS OF THE 31ST CHINESE CONTROL CONFERENCE, 2012, : 5972 - 5977