Flow-based attack detection and accommodation for networked control systems

被引:3
|
作者
Niu, Haifeng [1 ]
Jagannathan, S. [1 ]
机构
[1] Missouri Univ Sci & Technol, Dept Elect & Comp Engn, Rolla, MO 65401 USA
基金
美国国家科学基金会;
关键词
Attack detection; flow control; H-infinity performance; LMI; Lyapunov stability; networked control system; CYBER-PHYSICAL SYSTEMS; SECURE ESTIMATION;
D O I
10.1080/00207179.2019.1621384
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper is concerned about detection and estimation of malicious attacks on the network and the linear physical system of a networked control system (NCS) by using linear matrix inequality (LMI)-based technique. Certain class of attacks on the communication network impacts the traffic flow causing network delays and packet losses to increase which in turn affects the stability of the NCS. Therefore in this paper, a novel observer-based scheme is proposed to capture the abnormal traffic flow at the bottleneck node of the communication network via the attack detection residual. An LMI-based design is proposed that ensures both system stability and H-infinity performance and also detects attacks on the network as well as on the physical system. Upon detection, the physical system is stabilised by adjusting the controller gains provided certain conditions are met. Both simulation and hardware implementation results are included to demonstrate the applicability of the proposed scheme.
引用
收藏
页码:834 / 847
页数:14
相关论文
共 50 条
  • [41] Distributed attack reconstruction for networked motion control systems
    Zhu J.-W.
    Liang C.-Y.
    He D.-F.
    Kongzhi yu Juece/Control and Decision, 2022, 37 (11): : 2934 - 2940
  • [42] DeepGFL: Deep Feature Learning via Graph for Attack Detection on Flow-based Network Traffic
    Yao, Yepeng
    Su, Liya
    Lu, Zhigang
    2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018), 2018, : 579 - 584
  • [43] Efficient DDoS flood attack detection using dynamic thresholding on flow-based network traffic
    David, Jisa
    Thomas, Ciza
    COMPUTERS & SECURITY, 2019, 82 : 284 - 295
  • [44] Information Flow-Based Security Levels Assessment for Access Control Systems
    Boulares, Sofiene
    Adi, Kamel
    Logrippo, Luigi
    E-TECHNOLOGIES, MCETECH 2015, 2015, 209 : 105 - 121
  • [45] Cyber-Attack Detection with Fault Accommodation Based on Intelligent Generalized Predictive Control
    Yaseen, Amer Atta
    Bayart, Mireille
    IFAC PAPERSONLINE, 2017, 50 (01): : 2601 - 2608
  • [46] Injection attack estimation of networked control systems subject to hidden DoS attack
    Shao, Jie
    Ye, Zehua
    Zhang, Dan
    Yan, Huaicheng
    Zhu, Junwei
    ISA TRANSACTIONS, 2022, 129 : 1 - 14
  • [47] Resilient control of networked switched systems subject to deception attack and DoS attack
    Zhao, Rui
    Zuo, Zhiqiang
    Tan, Ying
    Wang, Yijing
    Zhang, Wentao
    AUTOMATICA, 2024, 169
  • [48] Structural analyses of a parsimonious watermarking policy for data deception attack detection in networked control systems
    Naha, Arunava
    Teixeira, Andre
    Ahlen, Anders
    Dey, Subhrakanti
    2022 IEEE 61ST CONFERENCE ON DECISION AND CONTROL (CDC), 2022, : 7648 - 7655
  • [49] Flow-based intrusion detection algorithm for supervisory control and data acquisition systems: A real-time approach
    Teixeira, Marcio Andrey
    Zolanvari, Maede
    Khan, Khaled M.
    Jain, Raj
    Meskin, Nader
    IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2021, 6 (03) : 178 - 191
  • [50] H∞ Control for Networked Control Systems with Packet Loss and Deception attack
    Shi, Huiru
    Zhang, Yijun
    39TH YOUTH ACADEMIC ANNUAL CONFERENCE OF CHINESE ASSOCIATION OF AUTOMATION, YAC 2024, 2024, : 555 - 560