Efficient Predictive Monitoring of Linear Time-Invariant Systems Under Stealthy Attacks

نویسندگان

چکیده

Attacks on industrial control systems (ICSs) can lead to significant physical damage. While off-line safety and security assessments provide insight into vulnerable system components, they may not account for stealthy attacks designed evade anomaly detectors during long operational transients. In this article, we propose a predictive online monitoring approach check the of under potential false data injection (FDIAs) sensors. Specifically, adapt previous results in reachability analysis attack impact assessment an efficient algorithm linear time-invariant (LTI) systems. The proposed relies computation symbolic reachable sets terms estimated state system. These are then instantiated online, checks performed by leveraging ideas from ellipsoidal calculus. We illustrate evaluate our using Tennessee–Eastman process. also compare with baseline approaches work assess its efficiency scalability. Our evaluation demonstrate that predict timely manner if FDIA will be able cause damage while remaining undetected. Thus, used operators real-time early warnings about attacks.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Linear Time-invariant Systems

control scheme, in which different time scales for the rigid body subsystem dynamics and for the flexible dynamics are used (Canudas de Wit et al., 1996). An application of the two-time scale method is shown, for example, in Kang, Yeung, and Mills (2002). In summary, the aim of the authors to provide an upperlevel undergraduate and graduate textbook and a reference for experienced professionals...

متن کامل

Stealthy Deception Attacks Against SCADA Systems

SCADA protocols for Industrial Control Systems (ICS) are vulnerable to network attacks such as session hijacking. Hence, research focuses on network anomaly detection based on meta–data (message sizes, timing, command sequence), or on the state values of the physical process. In this work we present a class of semantic network-based attacks against SCADA systems that are undetectable by the abo...

متن کامل

AN ALGORITHM FOR FINDING THE STABILITY OF LINEAR TIME-INVARIANT SYSTEMS

The purpose of this paper is to show that the ideas and techniques of the classical methods of finding stability, such as the criteria of Leonhard and Nyquist, can be used to derive simple algorithm to verify stability. This is enhanced by evaluating the argument of the characteristic equation of a linear system in the neighbourhood of the origin of the complex plane along the imaginary axis

متن کامل

Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks

It may take weeks or months before a stealthy attack is detected. As networks scale up in size and speed, monitoring for such attempts is increasingly a challenge; collection and inspection of individual packets is difficult as the volume and the rate of traffic rise. This paper presents an efficient method to overcome such a challenge. Data reduction has become an integral part of passive netw...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Control Systems and Technology

سال: 2023

ISSN: ['1558-0865', '2374-0159', '1063-6536']

DOI: https://doi.org/10.1109/tcst.2022.3196809