Flow-based attack detection and accommodation for networked control systems

被引:3
|
作者
Niu, Haifeng [1 ]
Jagannathan, S. [1 ]
机构
[1] Missouri Univ Sci & Technol, Dept Elect & Comp Engn, Rolla, MO 65401 USA
基金
美国国家科学基金会;
关键词
Attack detection; flow control; H-infinity performance; LMI; Lyapunov stability; networked control system; CYBER-PHYSICAL SYSTEMS; SECURE ESTIMATION;
D O I
10.1080/00207179.2019.1621384
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper is concerned about detection and estimation of malicious attacks on the network and the linear physical system of a networked control system (NCS) by using linear matrix inequality (LMI)-based technique. Certain class of attacks on the communication network impacts the traffic flow causing network delays and packet losses to increase which in turn affects the stability of the NCS. Therefore in this paper, a novel observer-based scheme is proposed to capture the abnormal traffic flow at the bottleneck node of the communication network via the attack detection residual. An LMI-based design is proposed that ensures both system stability and H-infinity performance and also detects attacks on the network as well as on the physical system. Upon detection, the physical system is stabilised by adjusting the controller gains provided certain conditions are met. Both simulation and hardware implementation results are included to demonstrate the applicability of the proposed scheme.
引用
收藏
页码:834 / 847
页数:14
相关论文
共 50 条
  • [31] Accommodation of delays for networked control systems using classification of service
    Diouri, Ldriss
    Georges, Jean-Philippe
    Rondeau, Eric
    2007 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING, AND CONTROL, VOLS 1 AND 2, 2007, : 410 - 415
  • [32] Fault estimation and accommodation for networked control systems with transfer delay
    College of Automation Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China
    Zidonghua Xuebao, 2007, 7 (738-743):
  • [33] FlowTransformer: A transformer framework for flow-based network intrusion detection systems
    Manocchio, Liam Daly
    Layeghy, Siamak
    Lo, Wai Weng
    Kulatilleke, Gayan K.
    Sarhan, Mohanad
    Portmann, Marius
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 241
  • [34] Automated Flow-based Rule Generation for Network Intrusion Detection Systems
    Fallahi, Naser
    Sami, Ashkan
    Tajbakhsh, Morteza
    2016 24TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2016, : 1948 - 1953
  • [35] Prospects of pulsed amperometric detection in flow-based analytical systems - A review
    Islam, Muhammed Ariful
    Mahbub, Parvez
    Nesterenko, Pavel N.
    Paull, Brett
    Macka, Mirek
    ANALYTICA CHIMICA ACTA, 2019, 1052 (10-26) : 10 - 26
  • [36] Analysis on Attack Schedules in Wireless Networked Control Systems based on Channel Hopping
    Gan, Ruimeng
    Shao, Jinhang
    Zhang, Heng
    Xiao, Yue
    2019 12TH ASIAN CONTROL CONFERENCE (ASCC), 2019, : 591 - 596
  • [37] An overview of flow-based anomaly detection
    Sharma, Rohini
    Guleria, Ajay
    Singla, R. K.
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2018, 21 (02) : 220 - 240
  • [38] Fault detection for networked control systems based on asynchronous dynamical systems
    Institute of Automation, Nanjing University of Science and Technology, Nanjing 210094, China
    Kongzhi yu Juece Control Decis, 2008, 3 (325-328+332): : 325 - 328
  • [39] Flow-based biochip for insecticides detection
    Nagatani, Naoki
    Nakashima, Arika
    Shiohara, Suguru
    Ushijima, Hiromi
    Takamura, Yuzuru
    Miyahara, Toshiro
    JOURNAL OF BIOSCIENCE AND BIOENGINEERING, 2009, 108 : S153 - S153
  • [40] Flow-Based Detection of DNS Tunnels
    Ellens, Wendy
    Zuraniewski, Piotr
    Sperotto, Anna
    Schotanus, Harm
    Mandjes, Michel
    Meeuwissen, Erik
    EMERGING MANAGEMENT MECHANISMS FOR THE FUTURE INTERNET (AIMS 2013), 2013, 7943 : 124 - 135