Flow-based attack detection and accommodation for networked control systems

被引:3
|
作者
Niu, Haifeng [1 ]
Jagannathan, S. [1 ]
机构
[1] Missouri Univ Sci & Technol, Dept Elect & Comp Engn, Rolla, MO 65401 USA
基金
美国国家科学基金会;
关键词
Attack detection; flow control; H-infinity performance; LMI; Lyapunov stability; networked control system; CYBER-PHYSICAL SYSTEMS; SECURE ESTIMATION;
D O I
10.1080/00207179.2019.1621384
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper is concerned about detection and estimation of malicious attacks on the network and the linear physical system of a networked control system (NCS) by using linear matrix inequality (LMI)-based technique. Certain class of attacks on the communication network impacts the traffic flow causing network delays and packet losses to increase which in turn affects the stability of the NCS. Therefore in this paper, a novel observer-based scheme is proposed to capture the abnormal traffic flow at the bottleneck node of the communication network via the attack detection residual. An LMI-based design is proposed that ensures both system stability and H-infinity performance and also detects attacks on the network as well as on the physical system. Upon detection, the physical system is stabilised by adjusting the controller gains provided certain conditions are met. Both simulation and hardware implementation results are included to demonstrate the applicability of the proposed scheme.
引用
收藏
页码:834 / 847
页数:14
相关论文
共 50 条
  • [21] Detection of interruption attack in the wireless networked closed loop industrial control systems
    R. B. Benisha
    S. Raja Ratna
    Telecommunication Systems, 2020, 73 : 359 - 370
  • [22] Monitoring of stealthy attack in networked control systems
    Keller, J. Y.
    Sauter, D.
    2013 2ND INTERNATIONAL CONFERENCE ON CONTROL AND FAULT-TOLERANT SYSTEMS (SYSTOL), 2013, : 462 - 467
  • [23] Control flow-based opcode behavior analysis for Malware detection
    Ding, Yuxin
    Dai, Wei
    Yan, Shengli
    Zhang, Yumei
    COMPUTERS & SECURITY, 2014, 44 : 65 - 74
  • [24] Attack Models and Scenarios for Networked Control Systems
    Teixeira, Andre
    Perez, Daniel
    Sandberg, Henrik
    Johansson, Karl H.
    HICONS 12: PROCEEDINGS OF THE 1ST ACM INTERNATIONAL CONFERENCE ON HIGH CONFIDENCE NETWORKED SYSTEMS, 2012, : 55 - 64
  • [25] Co-Design Secure Control Based on Image Attack Detection and Data Compensation for Networked Visual Control Systems
    Du, Dajun
    Wu, Lang
    Zhang, Changda
    Fei, Zixiang
    Yang, Lisi
    Fei, Minrui
    Zhou, Huiyu
    IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2022, 71
  • [26] DDoS Attack Detection using Fast Entropy Approach on Flow-Based Network Traffic
    David, Jisa
    Thomas, Ciza
    BIG DATA, CLOUD AND COMPUTING CHALLENGES, 2015, 50 : 30 - 36
  • [27] MULTI AGENT SYSTEM FOR NETWORK ATTACK CLASSIFICATION USING FLOW-BASED INTRUSION DETECTION
    Hancock, David L.
    Lamont, Gary B.
    2011 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2011, : 1535 - 1542
  • [28] DELAY TIME DETECTION AND ACCOMMODATION FOR A NETWORKED DC MOTOR CONTROL
    Apolinario, Gisele C.
    Garcia, Jose Paulo F.
    Garcia, Lizete Maria C. F.
    Rodrigues, Fernando B.
    Garcia, Saulo C.
    XI BRAZILIAN POWER ELECTRONICS CONFERENCE (COBEP 2011), 2011, : 207 - 212
  • [29] Hidden Markov Model-Based Attack Detection for Networked Control Systems Subject to Random Packet Dropouts
    Lu, Genghong
    Feng, Dongqin
    Huang, Biao
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2021, 68 (01) : 642 - 653
  • [30] Attack Detection for Networked Control Systems Using Event-Triggered Dynamic Watermarking
    Du, Dajun
    Zhang, Changda
    Li, Xue
    Fei, Minrui
    Zhou, Huiyu
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (01) : 351 - 361