4.7 Article

Detection-Performance Tradeoff for Watermarking in Industrial Control Systems

Related references

Note: Only part of the references are listed.
Article Engineering, Electrical & Electronic

PDDL: Proactive Distributed Detection and Localization Against Stealthy Deception Attacks in DC Microgrids

Mengxiang Liu et al.

Summary: In this paper, a proactive distributed detection and localization (PDDL) framework is proposed to defend against stealthy deception attacks in DC microgrids. Attack detection is achieved by observing voltage balancing deviation and current sharing deviation in DC microgrids. Once an anomaly is detected, a proactive perturbation is applied to the primary control gains to invalidate the inferred gains of the attacker, and the constructed stealthy deception attacks can be located using unknown input observer (UIO) based locators. An optimization problem is formulated to determine the magnitude of the perturbation to maximize attack locatability while limiting transient fluctuations on system states. The effectiveness of the PDDL framework is verified through hardware-in-the-loop (HIL) simulations and full-hardware experimental studies.

IEEE TRANSACTIONS ON SMART GRID (2023)

Article Engineering, Electrical & Electronic

Blending Data and Physics Against False Data Injection Attack: An Event-Triggered Moving Target Defence Approach

Wangkun Xu et al.

Summary: This paper proposes a blended approach of data-driven and physics-based methods to enhance the detection performance of cyberattacks. By combining a physics-informed data-driven algorithm with an MTD protocol, the proposed approach achieves high detection rate while reducing false positive rate and extra cost of MTD.

IEEE TRANSACTIONS ON SMART GRID (2023)

Article Computer Science, Information Systems

Detecting PLC Intrusions Using Control Invariants

Zeyu Yang et al.

Summary: PLC-Sleuth is an intrusion detection/localization system for PLCs based on control invariants and control graphs, which has shown high accuracy and effectiveness in detecting and localizing intrusions during testing.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

A New Explainable Deep Learning Framework for Cyber Threat Discovery in Industrial IoT Networks

Izhar Ahmed Khan et al.

Summary: The Industrial Internet of Things (IIoT) and Industry 4.0 enable interrelation among manufacturing processes, industrial machines, and utility services. However, the integrity and accuracy of data in IIoT networks can be compromised by malicious events, highlighting the need for effective anomaly detection and explanation methods to ensure quality services and data security.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Engineering, Electrical & Electronic

Explicit Analysis on Effectiveness and Hiddenness of Moving Target Defense in AC Power Systems

Mengxiang Liu et al.

Summary: This paper provides an explicit analysis of the performance of moving target defense (MTD) in AC power systems. It derives explicit approximations of measurement residuals to quantify performance metrics and proposes a design method for explicit residual-based MTD (EXR-MTD) to balance effectiveness and hiddenness.

IEEE TRANSACTIONS ON POWER SYSTEMS (2022)

Article Engineering, Electrical & Electronic

Converter-Based Moving Target Defense Against Deception Attacks in DC Microgrids

Mengxiang Liu et al.

Summary: This paper proposes a converter-based moving target defense strategy to defend against deception attacks in DC microgrids by proactively perturbing the primary control gains. Experimental results demonstrate the effectiveness of the proposed strategy.

IEEE TRANSACTIONS ON SMART GRID (2022)

Proceedings Paper Computer Science, Information Systems

Reverse Engineering Physical Semantics of PLC Program Variables Using Control Invariants

Zeyu Yang et al.

Summary: This paper presents ARES, a method that can automatically reverse engineer the semantics of variables in Programmable Logic Controllers (PLCs) programs without requiring any domain knowledge. ARES achieves this by identifying the mapping between PLC code and SCADA data to reverse engineer the physical semantics of program variables. Additionally, ARES provides best practices for implementing control rules that improve the resistance of PLC programs to semantic attacks.

PROCEEDINGS OF THE TWENTIETH ACM CONFERENCE ON EMBEDDED NETWORKED SENSOR SYSTEMS, SENSYS 2022 (2022)

Article Computer Science, Theory & Methods

A Stream Learning Approach for Real-Time Identification of False Data Injection Attacks in Cyber-Physical Power Systems

Ehsan Hallaji et al.

Summary: This paper presents a novel data-driven framework to aid in system state estimation when the power system is under unobservable false data injection attacks. The framework can dynamically detect and classify false data injection attacks, and recover the original control signal.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2022)

Article Computer Science, Information Systems

False Data Injection Attack Detection for Industrial Control Systems Based on Both Time- and Frequency-Domain Analysis of Sensor Data

Dajian Huang et al.

Summary: This article proposes a data-driven intrusion detection method for industrial control systems under false data injection attacks, utilizing time and frequency domain analysis to extract features and establish hidden Markov models. Experimental results demonstrate the effectiveness and superiority of the proposed method.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

A Machine Learning Approach for Anomaly Detection in Industrial Control Systems Based on Measurement Data

Sohrab Mokhtari et al.

Summary: The study proposed a novel solution called MIDS based on measurement data in the SCADA system, to detect abnormal activities in industrial control systems effectively even if attackers try to conceal them in the system's control layer. The supervised machine learning model, tested on a HIL testbed with various machine learning algorithms, demonstrated that random forest performed better in detecting anomalies.

ELECTRONICS (2021)

Article Computer Science, Theory & Methods

Reinforcement Learning-Based Physical-Layer Authentication for Controller Area Networks

Liang Xiao et al.

Summary: This paper proposes a CAN bus authentication framework that leverages physical layer features and reinforcement learning to improve authentication accuracy. A deep learning version is also introduced to enhance authentication efficiency. Experimental results confirm the improvements in authentication accuracy achieved by the proposed schemes.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Computer Science, Theory & Methods

Defending False Data Injection on State Estimation Over Fading Wireless Channels

Saptarshi Ghosh et al.

Summary: This paper studies a cyber-physical system (CPS) where a central controller (CC) conducts state estimation using measurements from a wireless powered sensor network (WPSN). An adversary injects false data into the system by compromising idle sensor nodes (SNs) of the WPSN, making the CPS vulnerable to error and false data injection (FDI) attacks. Existing techniques for launching stealthy FDI attacks are not suitable for this network due to the random nature of wireless channels used for transmitting control and false data.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Computer Science, Theory & Methods

Stealthy MTD Against Unsupervised Learning-Based Blind FDI Attacks in Power Systems

Martin Higgins et al.

Summary: This paper explores the vulnerability of moving target defenses (MTD) in power systems to unsupervised learning-based false data injection (FDI) attacks, and proposes a method to combine MTD with physical watermarking to enhance system resilience. A novel intelligent attack incorporating dimensionality reduction and density-based spatial clustering is shown to effectively maintain stealth against traditional MTD strategies.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Automation & Control Systems

Optimal periodic watermarking schedule for replay attack detection in cyber-physical systems

Chongrong Fang et al.

AUTOMATICA (2020)

Article Automation & Control Systems

A Recursive Watermark Method for Hard Real-Time Industrial Control System Cyber-Resilience Enhancement

Zhen Song et al.

IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING (2020)

Article Computer Science, Information Systems

Noise Removal in the Presence of Significant Anomalies for Industrial IoT Sensor Data in Manufacturing

Yuehua Liu et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Theory & Methods

Temporal Execution Behavior for Host Anomaly Detection in Programmable Logic Controllers

David Formby et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Theory & Methods

Analysis of Moving Target Defense Against False Data Injection Attacks on Power Grid

Zhenyong Zhang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Theory & Methods

Unsupervised Machine Learning-Based Detection of Covert Data Integrity Assault in Smart Grid Networks Utilizing Isolation Forest

Saeed Ahmed et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Theory & Methods

Demystifying Arm TrustZone: A Comprehensive Survey

Sandro Pinto et al.

ACM COMPUTING SURVEYS (2019)

Article Computer Science, Interdisciplinary Applications

The industrial internet of things (IIoT): An analysis framework

Hugh Boyes et al.

COMPUTERS IN INDUSTRY (2018)

Article Engineering, Multidisciplinary

Bridging the gap between sensor noise modeling and sensor characterization

Kshitij Jerath et al.

MEASUREMENT (2018)

Proceedings Paper Computer Science, Information Systems

Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS

Chuadhry Mujeeb Ahmed et al.

34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018) (2018)

Proceedings Paper Computer Science, Information Systems

Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit

Luis A. Garcia et al.

24TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2017) (2017)

Article Computer Science, Theory & Methods

DDOA: A Dirichlet-Based Detection Scheme for Opportunistic Attacks in Smart Grid Cyber-Physical System

Beibei Li et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Information Systems

On the use of open-source firewalls in ICS/SCADA systems

J. Nivethan et al.

INFORMATION SECURITY JOURNAL (2016)

Article Automation & Control Systems

Detecting Integrity Attacks on SCADA Systems

Yilin Mo et al.

IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY (2014)

Proceedings Paper Computer Science, Artificial Intelligence

An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications

Justin M. Beaver et al.

2013 12TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2013), VOL 2 (2013)

Article Computer Science, Theory & Methods

Determining image origin and integrity using sensor noise

Mo Chen et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2008)

Article Engineering, Electrical & Electronic

Analysis and modeling of inertial sensors using Allan variance

Naser EI-Sheimy et al.

IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT (2008)

Article Automation & Control Systems

Stability of networked control systems

W Zhang et al.

IEEE CONTROL SYSTEMS MAGAZINE (2001)