4.8 Article

False Data Injection Attack Detection for Industrial Control Systems Based on Both Time- and Frequency-Domain Analysis of Sensor Data

Journal

IEEE INTERNET OF THINGS JOURNAL
Volume 8, Issue 1, Pages 585-595

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2020.3007155

Keywords

Integrated circuits; Intrusion detection; Feature extraction; Trajectory; Hidden Markov models; Internet of Things; False data injection (FDI) attacks; hidden Markov model (HMM); industrial control systems (ICSs); intrusion detection; signal analysis

Funding

  1. Key Research and Development Program Projects in Zhejiang Province [2019C03098]
  2. National Natural Science Foundation of China [61822311, 61801422]

Ask authors/readers for more resources

This article proposes a data-driven intrusion detection method for industrial control systems under false data injection attacks, utilizing time and frequency domain analysis to extract features and establish hidden Markov models. Experimental results demonstrate the effectiveness and superiority of the proposed method.
This article studies the intrusion detection problem for industrial control systems (ICSs) with repetitive machining under false data injection (FDI) attacks. A data-driven intrusion detection method is proposed based on both time- and frequency-domain analysis. The proposed method only utilizes the sensor measurements required in closed-loop control, and does not consume additional system resources or rely on the system model. In addition, features in time and frequency domain are extracted at the same time, having higher reliability than the intrusion detection methods which only utilize the features in time domain. After feature extraction, hidden Markov models (HMMs) are established by using the feature vectors under normal operating conditions of the ICS, and then the trained HMMs are utilized in real-time intrusion detection. Finally, experiments are carried out on a networked multiaxis engraving machine with FDI attacks. The experimental results show the effectiveness and superiority of the proposed intrusion detection method.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available