Detecting and Isolating Attacks of Deception in Networked Control Systems

2016 IEEE International Conference on Autonomic Computing (ICAC)(2016)

引用 6|浏览12
暂无评分
摘要
This paper investigates a category of cyber-attacks on control systems, which regulate processes of a single plant while sharing a communication network. The design of these attacks aims to deceive conventional fault detectors that test locally generated residuals for inconsistent statistics. The authors propose a network-wide attack detector and isolator that collects information from other neighborhoods subject to availability of locality and network resources. Their method relies on estimating the output of a process, whose regulator may be under attack, from measurements gathered at other processes connected to the one under examination through links existing at the physical layer. Next, a notional consensus network coalesces all of these estimates into information that is independent of possibly deceptive sensory data at the suspect locality. The thesis of this paper is that residuals generated from far-flung estimates will reveal an anomaly (even if the statistics of local residuals are consistent). A necessary condition is the existence of an observable subsystem within the physical network of interconnected processes. The authors employ graph theory techniques to identify the subsystem and optimize its observability.
更多
查看译文
关键词
cyber-attacks,anomaly detection,observability,state estimation,consensus
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要