Proactive attack detection scheme based on watermarking and moving target defense

被引:4
|
作者
Liu, Hao [1 ]
Zhang, Yewei [2 ]
Li, Yuzhe [3 ]
Niu, Ben [4 ]
机构
[1] Hubei Univ Sci & Technol, Sch Automat, Xianning 437100, Peoples R China
[2] Shenyang Aerosp Univ, Coll Aerosp Engn, Shenyang 110136, Peoples R China
[3] Northeastern Univ, State Key Lab Synthet Automation Proc Ind, Shenyang 110004, Peoples R China
[4] Shandong Normal Univ, Sch Informat Sci & Engn, Jinan 250014, Peoples R China
关键词
Cyber-physical system; Cyber attacks; Unknown-but-bounded noises; Moving target defense; Watermarking; GUARANTEED STATE ESTIMATION; ZONOTOPES; FRAMEWORK;
D O I
10.1016/j.automatica.2023.111163
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, the attack detection problem is investigated for cyber-physical systems (CPSs) with unknown-but-bounded (UBB) noises. A new hybrid proactive detection scheme is proposed to detect stealthy attacks by combining watermarking and moving target (MT). The designed abnormal detector is based on the residual of the zonotopic observer which can be utilized to estimate states of the system with UBB noises. We prove that the approach proposed in this work does not introduce any performance loss in the absence of attacks. The proposed active detection framework can be employed to detect various types of attacks, such as denial-of-service (DoS), replay and covert attacks. Finally, numerical examples are provided to demonstrate the effectiveness of the proposed methods. & COPY; 2023 Elsevier Ltd. All rights reserved.
引用
收藏
页数:13
相关论文
共 50 条
  • [31] Toward Proactive and Efficient DDoS Mitigation in IIoT Systems: A Moving Target Defense Approach
    Zhou, Yuyang
    Cheng, Guang
    Zhao, Yuyu
    Chen, Zihan
    Jiang, Shanqing
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (04) : 2734 - 2744
  • [32] An ICA-based watermarking scheme resistant to copy attack
    Hu, HB
    Huang, Y
    Liu, J
    Sun, J
    PROCEEDINGS OF 2005 IEEE INTERNATIONAL WORKSHOP ON VLSI DESIGN AND VIDEO TECHNOLOGY, 2005, : 154 - 157
  • [33] A Moving-target Defense Strategy for Cloud-based Services with Heterogeneous and Dynamic Attack Surfaces
    Peng, Wei
    Li, Feng
    Huang, Chin-Tser
    Zou, Xukai
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 804 - 809
  • [34] Attack on quantized projection watermarking scheme
    Liao, XW
    Lu, ZM
    Sun, Z
    ISTM/2005: 6TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-9, CONFERENCE PROCEEDINGS, 2005, : 6366 - 6369
  • [35] Backdoor Attack Defense Method for Federated Learning Based on Model Watermarking
    Guo J.-J.
    Liu J.-Z.
    Ma Y.
    Liu Z.-Q.
    Xiong Y.-P.
    Miao K.
    Li J.-X.
    Ma J.-F.
    Jisuanji Xuebao/Chinese Journal of Computers, 2024, 47 (03): : 662 - 676
  • [36] A watermarking scheme robust to IBM Attack
    Kim, JH
    Lee, WD
    Park, JH
    MULTIMEDIA INFORMATION SYSTEMS IN PRACTICE, 1999, : 215 - 218
  • [37] Optimal Timing Selection Approach to Moving Target Defense: A FlipIt Attack-Defense Game Model
    Tan, Jing-lei
    Zhang, Heng-wei
    Zhang, Hong-qi
    Lei, Cheng
    Jin, Hui
    Li, Bo-wen
    Hu, Hao
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [38] A Synchronization Scheme Based on Moving Average for Robust Audio Watermarking
    Zhang, Jinquan
    Han, Bin
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2019, 15 (02): : 271 - 287
  • [39] Moving Target Network Defense Effectiveness Evaluation Based on Change-Point Detection
    Lei, Cheng
    Ma, Duo-he
    Zhang, Hong-qi
    Wang, Li-ming
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2016, 2016
  • [40] TDDAD: Time-Based Detection and Defense Scheme Against DDoS Attack on SDN Controller
    Cui, Jie
    He, Jiantao
    Xu, Yan
    Zhong, Hong
    INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 649 - 665