Detection and mitigation of classes of attacks in supervisory control systems

被引:116
|
作者
Carvalho, Lilian Kawakami [1 ]
Wu, Yi-Chin [2 ,3 ]
Kwong, Raymond [4 ]
Lafortune, Stephane [2 ]
机构
[1] Univ Fed Rio de Janeiro, Dept Elect Engn, Rio De Janeiro, Brazil
[2] Univ Michigan, Dept EECS, Ann Arbor, MI 48109 USA
[3] Univ Calif Berkeley, Dept EECS, Berkeley, CA 94720 USA
[4] Univ Toronto, Dept ECE, Toronto, ON, Canada
基金
加拿大自然科学与工程研究理事会; 美国国家科学基金会;
关键词
Discrete event systems; Automata; Failure diagnosis; Cyber-attacks; POLYNOMIAL-TIME VERIFICATION; INTRUSION DETECTION; DIAGNOSABILITY;
D O I
10.1016/j.automatica.2018.07.017
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The deployment of control systems with network-connected components has made feedback control systems vulnerable to attacks over the network. This paper considers the problem of intrusion detection and mitigation in supervisory control systems, where the attacker has the ability to enable or disable vulnerable actuator commands and erase or insert vulnerable sensor readings. We present a mathematical model for the system under certain classes of actuator enablement attacks, sensor erasure attacks, or sensor insertion attacks. We then propose a defense strategy that aims to detect such attacks online and disables all controllable events after an attack is detected. We develop an algorithmic procedure for verifying whether the system can prevent damage from the attacks considered with the proposed defense strategy, where damage is modeled as the reachability of a pre-defined set of unsafe system states. The technical condition of interest that is necessary and sufficient in this context, termed "GF-safe controllability", is characterized. We show that the verification of GF-safe controllability can be performed using diagnoser or verifier automata. Finally, we illustrate the methodology with a traffic control system example. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:121 / 133
页数:13
相关论文
共 50 条
  • [1] Detection and Prevention of Actuator Enablement Attacks in Supervisory Control Systems
    Carvalho, Lilian Kawakami
    Wu, Yi-Chin
    Kwong, Raymond
    Lafortune, Stephane
    [J]. 2016 13TH INTERNATIONAL WORKSHOP ON DISCRETE EVENT SYSTEMS (WODES), 2016, : 298 - 305
  • [2] Detection of Actuator Enablement Attacks by Petri Nets in Supervisory Control Systems
    Yu, Zhenhua
    Duan, Xudong
    Cong, Xuya
    Li, Xiangning
    Zheng, Li
    [J]. MATHEMATICS, 2023, 11 (04)
  • [3] Detection of Deception Attacks in Supervisory Control Systems Using Bond Graph
    Zerdazi, I.
    Fezari, M.
    Ouziala, M.
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2020, 54 (02) : 156 - 167
  • [4] Detection of Deception Attacks in Supervisory Control Systems Using Bond Graph
    I. Zerdazi
    M. Fezari
    M. Ouziala
    [J]. Automatic Control and Computer Sciences, 2020, 54 : 156 - 167
  • [5] Supervisory control of software systems for fault mitigation
    Phoha, VV
    Nadgar, A
    Ray, A
    Fu, J
    Phoha, S
    [J]. PROCEEDINGS OF THE 2003 AMERICAN CONTROL CONFERENCE, VOLS 1-6, 2003, : 2229 - 2233
  • [6] Detection and Mitigation of False Data Injection Attacks in Networked Control Systems
    Sargolzaei, Arman
    Yazdani, Kasra
    Abbaspour, Alireza
    Crane, Carl D., III
    Dixon, Warren E.
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (06) : 4281 - 4292
  • [7] On Attack Mitigation in Supervisory Control Systems: A Tolerant Control Approach
    Yao, Jingshi
    Yin, Xiang
    Li, Shaoyuan
    [J]. 2020 59TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2020, : 4504 - 4510
  • [8] Security Against Network Attacks in Supervisory Control Systems
    Lima, Public M.
    Alves, Marcos V. S.
    Carvalho, Lilian K.
    Moreira, Marcos V.
    [J]. IFAC PAPERSONLINE, 2017, 50 (01): : 12333 - 12338
  • [9] Detection and Mitigation of Insider Attacks in Financial Systems
    Pradesh, G., V
    Sangeetha, D.
    Kishore, Ram, V
    Sharan, Sai L.
    [J]. 2024 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND APPLIED INFORMATICS, ACCAI 2024, 2024,
  • [10] Detection and mitigation of deception attacks on cloud-based industrial control systems
    Akbarian, Fatemeh
    Tarneberg, William
    Fitzgerald, Emma
    Kihl, Maria
    [J]. 25TH CONFERENCE ON INNOVATION IN CLOUDS, INTERNET AND NETWORKS (ICIN 2022), 2022, : 106 - 110