Detection of Deception Attacks in Supervisory Control Systems Using Bond Graph

被引:2
|
作者
Zerdazi, I. [1 ,2 ]
Fezari, M. [1 ]
Ouziala, M. [2 ,3 ]
机构
[1] Badji Mokhtar Annaba Univ, Dept Elect, Lab Automat & Signals Annaba LASA, Annaba 23000, Algeria
[2] Lille Univ, Polytech Lille, Ctr Rech Informat Signal & Automat Lille CRIStAL, UMR CNRS 9189, F-59655 Villeneuve Dascq, France
[3] MHamed Bougara Boumerdes Univ, Fac Engn Sci, Lab Mech & Solid Syst LMSS, Boumerdes 30000, Algeria
关键词
SCADA; cyber-attacks; bond graph; deception attack; analytical redundancy relation;
D O I
10.3103/S0146411620020091
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Supervisory Control and Data Acquisition (SCADA) systems can be subject to cyber-attacks due to their extensive connectivity to information and communication technologies. Those communications are used to connect sensors, actuators, and programmable logic controllers (PLCs) to monitor and control the process. The use of communication networks enlarges the vulnerability of SCADA to cyber-attacks that can drive the system to unsafe states. A variety of approaches in the field of attack detection have been proposed, however they are characterized very expensive, low detection rate or are system specific. One of the powerful cyber-attacks targeting SCADA systems is deception attack, where the attacker can change sensor reading parameters. In this work, we propose a new defense strategy that detects parameter changes generated by deception attacks in the sensor and control part in supervisory control systems. To do so, we use the bond graph (BG) modeling tool.
引用
收藏
页码:156 / 167
页数:12
相关论文
共 50 条
  • [41] Design and Implementation of Secure Networked Predictive Control Systems Under Deception Attacks
    Pang, Zhong-Hua
    Liu, Guo-Ping
    IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2012, 20 (05) : 1334 - 1342
  • [42] Adaptive neural network control for Markov jumping systems against deception attacks
    Wu, Junhui
    Qin, Gang
    Cheng, Jun
    Cao, Jinde
    Yan, Huaicheng
    Katib, Iyad
    NEURAL NETWORKS, 2023, 168 : 206 - 213
  • [43] Adaptive Neural Security Control for Networked Singular Systems Under Deception Attacks
    Ao, Wengang
    Zhang, Huiyan
    Zhao, Ning
    Minchala, Luis I.
    IEEE Access, 2022, 10 : 33230 - 33237
  • [44] Secure Consensus of Multiagent Systems via Impulsive Control Subject to Deception Attacks
    Liu, Zhi-Wei
    Shi, Yu-Lun
    Yan, Huaicheng
    Han, Bing-Xin
    Guan, Zhi-Hong
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2023, 70 (01) : 166 - 170
  • [45] Adaptive Neural Security Control for Networked Singular Systems Under Deception Attacks
    Ao, Wengang
    Zhang, Huiyan
    Zhao, Ning
    Minchala, Luis, I
    IEEE ACCESS, 2022, 10 : 33230 - 33237
  • [46] Adaptive control of cyber-physical systems under deception and injection attacks
    Yang, Yue
    Huang, Jiangshuai
    Su, Xiaojie
    Deng, Benmin
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2021, 358 (12): : 6174 - 6194
  • [47] Consensus Control for Nonlinear Multi-Agent Systems Subject to Deception Attacks
    Ma, Lifeng
    Wang, Zidong
    Yuan, Yuan
    2016 22ND INTERNATIONAL CONFERENCE ON AUTOMATION AND COMPUTING (ICAC), 2016, : 21 - 26
  • [48] Resilience Against Sensor Deception Attacks on Cyber-Physical Control Systems
    Lafortune, Stephane
    Dotoli, Mariagrazia
    Gregoire, Amphitheatre A.
    2019 6TH INTERNATIONAL CONFERENCE ON CONTROL, DECISION AND INFORMATION TECHNOLOGIES (CODIT 2019), 2019,
  • [49] Adaptive Control of Second-Order Nonlinear Systems With Injection and Deception Attacks
    Yang, Yue
    Huang, Jiangshuai
    Su, Xiaojie
    Wang, Kai
    Li, Guoqi
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 52 (01): : 574 - 581
  • [50] GRAPH-BASED DETECTION OF SHILLING ATTACKS IN RECOMMENDER SYSTEMS
    Zhang, Zhuo
    Kulkarni, Sanjeev R.
    2013 IEEE INTERNATIONAL WORKSHOP ON MACHINE LEARNING FOR SIGNAL PROCESSING (MLSP), 2013,