4.7 Article

A Framework for Attack-Resilient Industrial Control Systems: Attack Detection and Controller Reconfiguration

期刊

PROCEEDINGS OF THE IEEE
卷 106, 期 1, 页码 113-128

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JPROC.2017.2725482

关键词

Artifical intelligence; building management systems; cyber-physical security; energy management; industrial control; knowledge-based systems; resilient control; SCADA systems; security analytics; stability; virtual sensor

资金

  1. European Union Seventh Framework Programme [608224]
  2. Swedish Research Council [2013-5523, 2016-0861]
  3. Swedish Civil Contingencies Agency

向作者/读者索取更多资源

Most existing industrial control systems (ICSs), such as building energy management systems (EMSs), were installed when potential security threats were only physical. With advances in connectivity, ICSs are now, typically, connected to communications networks and, as a result, can be accessed remotely. This extends the attack surface to include the potential for sophisticated cyber attacks, which can adversely impact ICS operation, resulting in service interruption, equipment damage, safety concerns, and associated financial implications. In this work, a novel cyber-physical security framework for ICSs is proposed, which incorporates an analytics tool for attack detection and executes a reliable estimation-based attack-resilient control policy, whenever an attack is detected. The proposed framework is adaptable to already implemented ICS and the stability and optimal performance of the controlled system under attack has been proved. The performance of the proposed framework is evaluated using a reduced order model of a real EMS site and simulated attacks.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Automation & Control Systems

A Model Randomization Approach to Statistical Parameter Privacy

Ehsan Nekouei, Henrik Sandberg, Mikael Skoglund, Karl Henrik Johansson

Summary: In this article, we propose a filter design framework for a sequence of sensor measurements, where the joint probability density function depends on a private parameter. The framework includes a randomizer and a nonlinear transformation to ensure parameter privacy and modify the joint p.d.f. of the filter's output. The design of the randomizer is formulated as an optimization problem, and it is shown that the Privacy Filter's output limits the performance of any estimator of the private parameter.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2023)

Article Computer Science, Theory & Methods

A Randomized Filtering Strategy Against Inference Attacks on Active Steering Control Systems

Ehsan Nekouei, Mohammad Pirani, Henrik Sandberg, Karl H. Johansson

Summary: This paper proposes a framework to defend against inference attacks targeting the controller gains of an active steering control system (ASCS). By using a randomized filtering framework, the controller gains are protected against inference attacks. The optimal design of the randomizer is studied under a privacy constraint, and the inference ability of an adversary is analyzed using information-theoretic inequalities. The proposed privacy filter outperforms the additive noise privacy mechanism in terms of performance.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2022)

Article Automation & Control Systems

Change time estimation uncertainty in nonlinear dynamical systems with applications to COVID-19

Rijad Alisic, Philip E. Pare, Henrik Sandberg

Summary: This article analyzes the impact of non-pharmaceutical interventions on the spread rate of COVID-19 and proposes a detectability method based on sudden changes in model parameters. The method is applied to the susceptible-infected-removed model and suggests that analyzing the number of recovered/deceased may be less accurate compared to the cumulative number of infected, due to the difficulty in estimating sudden changes.

INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL (2023)

Article Automation & Control Systems

Transfer-Entropy-Regularized Markov Decision Processes

Takashi Tanaka, Henrik Sandberg, Mikael Skoglund

Summary: This article introduces the framework of the transfer-entropy-regularized Markov decision process (TERMDP) and proposes an iterative computational procedure to find the optimal solution. The applications of TERMDPs in networked control systems theory and nonequilibrium thermodynamics are discussed, and the algorithm is applied to a maze navigation problem to study the impact of information prices on optimal decision policies.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2022)

Article Automation & Control Systems

Privacy-Preserving Dual Averaging With Arbitrary Initial Conditions for Distributed Optimization

Dongyu Han, Kun Liu, Henrik Sandberg, Senchun Chai, Yuanqing Xia

Summary: This article discusses a distributed optimization problem with privacy concerns in multi-agent networks where malicious agents try to infer the privacy information of normal agents. A novel dual averaging algorithm is proposed that utilizes a correlated perturbation mechanism to protect the privacy of normal agents. It is proven that the algorithm achieves deterministic convergence under any initial conditions while guaranteeing privacy preservation. Furthermore, a probability density function for the perturbation is provided to maximize privacy measured by the trace of the Fisher information matrix. Lastly, a numerical example is presented to illustrate the effectiveness of the algorithm.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2022)

Article Automation & Control Systems

How to Secure Distributed Filters Under Sensor Attacks

Xingkang He, Xiaoqiang Ren, Henrik Sandberg, Karl Henrik Johansson

Summary: In this article, the authors study how to secure distributed filters for linear time-invariant systems with bounded noise under false-data injection attacks. They propose a recursive distributed filter and an online local attack detector to protect the filters from attacks.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2022)

Article Automation & Control Systems

Disconnection-Aware Attack Detection and Isolation With Separation-Based Detector Reconfiguration

Hampei Sasahara, Takayuki Ishizaki, Jun-ichi Imura, Henrik Sandberg

Summary: This study focuses on incident handling for dynamical networked control systems during adverse events, with specific emphasis on attack detection unit reconfiguration to maintain detection and isolation capabilities under possible disconnections and separations. The proposed solution utilizes retrofit control techniques and is applied to low-voltage power distribution networks with distributed generation, demonstrating practical applications through numerical examples on a benchmark distribution network.

IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY (2022)

Article Automation & Control Systems

Distributed Design of Glocal Controllers via Hierarchical Model Decomposition

Hampei Sasahara, Takayuki Ishizaki, Jun-ichi Imura, Henrik Sandberg, Karl Henrik Johansson

Summary: This article proposes a distributed design method of controllers for large-scale network systems. The method uses a global/local information structure to enhance the scalability of the controllers. The global subcontroller coordinates the local subcontrollers to regulate interarea oscillations among subsystems. By representing the original network system as a hierarchical cascaded system, the design is achieved in a distributed manner. The primary findings of this study include a tractable solution to the design problem, an existence condition for the hierarchical model decomposition, and a clustering method appropriate for the proposed framework and a robust extension.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2023)

Article Automation & Control Systems

Model-Free Undetectable Attacks on Linear Systems Using LWE-Based Encryption

Rijad Alisic, Junsoo Kim, Henrik Sandberg

Summary: In this paper, we investigate the homomorphic property in the encryption method based on the Learning with Errors (LWE) problem and find that it can lead to failure in defending dynamical control systems from undetectable attacks. We demonstrate how model-free undetectable attacks on linear systems over integers can be computed from encrypted sampled inputs and outputs. By applying previous work to our scenario, we analyze the probability of detecting an attack explicitly depending on the encryption parameters. Finally, we simulate an attack on an encrypted linear system over integers and analyze the probability of detection.

IEEE CONTROL SYSTEMS LETTERS (2023)

Article Automation & Control Systems

Privacy-preserving set-based estimation using partially homomorphic encryption

Amr Alanwar, Victor Gassmann, Xingkang He, Hazem Said, Henrik Sandberg, Karl H. Johansson, Matthias Althoff

Summary: The set-based estimation is highly valued for its ability to ensure state enclosures in safety-critical systems. However, the need to outsource set-based operations to a central aggregator node for collecting measurements from distributed sensors raises privacy concerns. To address this, we propose set-based estimation protocols using partially homomorphic encryption to protect the privacy of measurements and estimations. We demonstrate the effectiveness of our protocols by localizing a real mobile quadcopter using ultra-wideband wireless devices.

EUROPEAN JOURNAL OF CONTROL (2023)

Article Automation & Control Systems

Finite Sample Guarantees for Quantile Estimation: An Application to Detector Threshold Tuning

David Umsonst, Justin Ruths, Henrik Sandberg

Summary: In threshold-based anomaly detection, tuning the threshold is a challenging task due to unknown detector output distributions. This study proposes the use of quantile estimators based on order statistics to estimate the detector threshold and provides three distribution-free finite sample guarantees. The guarantees are compared and validated using simulated and experimental data.

IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY (2023)

Article Automation & Control Systems

Multilayer SIS Model With an Infrastructure Network

Philip E. Pare, Axel Janson, Sebin Gracy, Ji Liu, Henrik Sandberg, Karl H. Johansson

Summary: In this article, a layered networked spread model (SIWS) is developed to study the spreading of a susceptible-infected-susceptible pathogen-borne disease over a human contact network and an infrastructure network. The existence, uniqueness, stability, and observability of various equilibria in the model are investigated, and a necessary and sufficient condition for the estimation of sickness levels of nodes is provided.

IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS (2023)

Article Automation & Control Systems

Secure State Estimation Under Actuator and Sensor Attacks Using Sliding Mode Observers

Twan Keijzer, Riccardo M. G. Ferrari, Henrik Sandberg

Summary: Interconnected modern systems are vulnerable to adversarial attackers who can corrupt communication channels and compromise subsystems. The field of secure state estimation (SSE) aims to provide accurate state estimation even when some measurement signals are corrupted. In this letter, a solution is proposed for a new generalized SSE problem where entire subsystems can be compromised, affecting both actuation and measurement signals. The sliding mode observer (SMO)-based solution allows for multiple attack channels on both actuation and measurement signals, which is a larger class of attacks than previously considered. The proposed method is demonstrated on 10 interconnected mass-spring-damper subsystems.

IEEE CONTROL SYSTEMS LETTERS (2023)

Article Engineering, Electrical & Electronic

Vector-Norm Based Truncation of Harmonic Transfer Functions in Black-Box Electronic Power Systems

Yicheng Liao, Henrik Sandberg, Xiongfei Wang

Summary: This paper studies the truncation of harmonic transfer functions (HTFs) in power systems equipped with power electronic converters for dynamic analysis. The gain function of an HTF is defined as the norm of its central-column vector, and the error bound of the gain function in relation to the truncation order is explicitly derived as an indicator for HTF truncation. Compared with existing solutions, the proposed method is practical in truncating black-box systems with unknown internal parameters, as the truncation error bound can be estimated through frequency scan. The truncation approach is verified on a three-phase electronic power system by electromagnetic transient simulations.

IEEE OPEN JOURNAL OF THE INDUSTRIAL ELECTRONICS SOCIETY (2022)

Article Automation & Control Systems

Epistemic Signaling Games for Cyber Deception With Asymmetric Recognition

Hampei Sasahara, Henrik Sandberg

Summary: This paper proposes a model of cyber deception with asymmetric recognition represented by private beliefs. By explicitly quantifying players' asymmetric recognition, the paper introduces epistemic signaling games based on the Mertens-Zamir model to achieve a precise evaluation of the risks arising from cognitive gaps.

IEEE CONTROL SYSTEMS LETTERS (2022)

暂无数据