Skip to main content

Detection of Attacks in Cyber-Physical Systems: Theory and Applications

  • Chapter
  • First Online:
Safety, Security and Privacy for Cyber-Physical Systems

Part of the book series: Lecture Notes in Control and Information Sciences ((LNCIS,volume 486))

Abstract

In this chapter, we characterize and illustrate fundamental limitations and trade-offs for the detection of attacks in stochastic systems with linear dynamics. Focusing on attacks that alter the control signals (actuator attacks), we propose metrics to measure the stealthiness level of an attack, which are independent from the specifics of the detection algorithm being used and thus lead to fundamental detectability bounds. Further, we characterize attacks that induce the largest performance degradation, as measured by the error covariance at a state estimator, and illustrate our results via simple examples and more involved power system models.

Text in this chapter is reproduced from Bai et al. (Automatica 82:251–260, 2017), Copyright 2017, with permission from Elsevier.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Farwell, J.P., Rohozinski, R.: Stuxnet and the future of cyber war. Survival 53(1), 23–40 (2011)

    Article  Google Scholar 

  2. Kuvshinkova, S.: SQL Slammer worm lessons learned for consideration by the electricity sector. North American Electric Reliability Council (2003)

    Google Scholar 

  3. Mo, Y., Chabukswar, R., Sinopoli, B.: Detecting integrity attacks on SCADA systems. IEEE Trans. Control Syst. Technol. 22(4), 1396–1407 (2014)

    Article  Google Scholar 

  4. Pasqualetti, F., Dörfler, F., Bullo, F.: Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Control 58(11), 2715–2729 (2013)

    Article  MathSciNet  Google Scholar 

  5. Richards, G.: Hackers vs slackers. Eng. Technol. 3(19), 40–43 (2008)

    Article  Google Scholar 

  6. Slay, J., Miller, M.: Lessons learned from the Maroochy water breach. Crit. Infrastruct. Prot. 253, 73–82 (2007)

    Article  Google Scholar 

  7. Teixeira, A., Pérez, D., Sandberg, H., Johansson, K.H.: Attack models and scenarios for networked control systems. In: Proceedings of the 1st International Conference on High Confidence Networked Systems, pp. 55–64. ACM (2012)

    Google Scholar 

  8. Patton, R., Frank, P., Clark, R.: Fault Diagnosis in Dynamic Systems: Theory and Applications. Prentice Hall, Upper Saddle River (1989)

    Google Scholar 

  9. Pasqualetti, F., Dörfler, F., Bullo, F.: Control-theoretic methods for cyberphysical security: geometric principles for optimal cross-layer resilient control systems. IEEE Control Syst. Mag. 35(1), 110–127 (2015)

    Article  MathSciNet  Google Scholar 

  10. Foroush, H.S., Martínez, S.: On multi-input controllable linear systems under unknown periodic DoS jamming attacks. In: SIAM Conference on Control and Its Applications, pp. 222–229. SIAM (2013)

    Google Scholar 

  11. Mo, Y., Sinopoli, B.: Secure control against replay attacks. In: Allerton Conference on Communications, Control and Computing, Monticello, IL, USA, September, pp. 911–918 (2010)

    Google Scholar 

  12. Smith, R.: A decoupled feedback structure for covertly appropriating network control systems. In: IFAC World Congress, Milan, Italy, August, pp. 90–95 (2011)

    Google Scholar 

  13. Dan, G., Sandberg, H.: Stealth attacks and protection schemes for state estimators in power systems. In: IEEE International Conference on Smart Grid Communications, Gaithersburg, MD, USA, October, pp. 214–219 (2010)

    Google Scholar 

  14. Giani, A., Bitar, E., Garcia, M., McQueen, M., Khargonekar, P., Poolla, K.: Smart grid data integrity attacks: characterizations and countermeasures. In: IEEE International Conference on Smart Grid Communications, Brussels, Belgium, pp. 232–237 (2011)

    Google Scholar 

  15. Liu, Y., Reiter, M.K., Ning, P.: False data injection attacks against state estimation in electric power grids. In: ACM Conference on Computer and Communications Security, Chicago, IL, USA, November, pp. 21–32 (2009)

    Google Scholar 

  16. Mohsenian-Rad, A.-H., Leon-Garcia, A.: Distributed internet-based load altering attacks against smart power grids. IEEE Trans. Smart Grid 2(4), 667–674 (2011)

    Article  Google Scholar 

  17. Teixeira, A., Amin, S., Sandberg, H., Johansson, K.H., Sastry, S.S.: Cyber security analysis of state estimators in electric power systems. In: IEEE Conference on Decision and Control, Atlanta, GA, USA, December, pp. 5991–5998 (2010)

    Google Scholar 

  18. Bhattacharya, S., Başar, T.: Differential game-theoretic approach to a spatial jamming problem. In: Advances in Dynamic Games, pp. 245–268. Springer, Berlin (2013)

    Google Scholar 

  19. Hamza, F., Tabuada, P., Diggavi, S.: Secure state-estimation for dynamical systems under active adversaries. In: Allerton Conference on Communications, Control and Computing, September, pp. 337–344 (2011)

    Google Scholar 

  20. Maharjan, S., Zhu, Q., Zhang, Y., Gjessing, S., Başar, T.: Dependable demand response management in the smart grid: a Stackelberg game approach. IEEE Trans. Smart Grid 4(1), 120–132 (2013)

    Article  Google Scholar 

  21. Manshaei, M., Zhu, Q., Alpcan, T., Başar, T., Hubaux, J.-P.: Game theory meets network security and privacy. ACM Comput. Surv. 45(3), 1–39 (2011)

    Article  Google Scholar 

  22. Zhu, M., Martínez, S.: Stackelberg-game analysis of correlated attacks in cyber-physical systems. In: American Control Conference, San Francisco, CA, USA, July, pp. 4063–4068 (2011)

    Google Scholar 

  23. Zhu, Q., Tembine, H., Başar, T.: Hybrid learning in stochastic games and its application in network security. In: Reinforcement Learning and Approximate Dynamic Programming for Feedback Control, pp. 303–329 (2013)

    Google Scholar 

  24. Basile, G., Marro, G.: Controlled and Conditioned Invariants in Linear System Theory. Prentice Hall, Upper Saddle River (1991)

    Google Scholar 

  25. Fawzi, H., Tabuada, P., Diggavi, S.: Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Trans. Autom. Control 59(6), 1454–1467 (2014)

    Article  MathSciNet  Google Scholar 

  26. Cui, S., Han, Z., Kar, S., Kim, T.T., Poor, H.V., Tajer, A.: Coordinated data-injection attack and detection in the smart grid: a detailed look at enriching detection solutions. IEEE Signal Process. Mag. 29(5), 106–115 (2012)

    Article  Google Scholar 

  27. Kosut, O., Jia, L., Thomas, R.J., Tong, L.: Malicious data attacks on the smart grid. IEEE Trans. Smart Grid 2(4), 645–658 (2011)

    Article  Google Scholar 

  28. Kwon, C., Liu, W., Hwang, I.: Security analysis for cyber-physical systems against stealthy deception attacks. In: American Control Conference, Washington, DC, USA, pp. 3344–3349. IEEE (2013)

    Google Scholar 

  29. Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. 14(1), 13 (2011)

    Article  Google Scholar 

  30. Bai, C.-Z., Gupta, V.: On Kalman filtering in the presence of a compromised sensor: fundamental performance bounds. In: American Control Conference, Portland, OR, June, pp. 3029–3034 (2014)

    Google Scholar 

  31. Bai, C.-Z., Pasqualetti, F., Gupta, V.: Security in stochastic control systems: fundamental limitations and performance bounds. In: American Control Conference, Chicago, IL, USA, July, pp. 195–200 (2015)

    Google Scholar 

  32. Kung, E., Dey, S., Shi, L.: The performance and limitations of \(\epsilon \)-stealthy attacks on higher order systems. IEEE Trans. Autom. Control 62(2), 941–947 (2017)

    Article  MathSciNet  Google Scholar 

  33. Zhang, R., Venkitasubramaniam, P.: Stealthy control signal attacks in vector LQG systems. In: American Control Conference, Boston, MA, USA, pp. 1179–1184 (2016)

    Google Scholar 

  34. Guo, Z., Shi, D., Johansson, K.H., Shi, L.: Optimal linear cyber-attack on remote state estimation. IEEE Trans. Control Netw. Syst. 4(1), 4–13 (2017)

    Article  MathSciNet  Google Scholar 

  35. Weerakkody, S., Sinopoli, B., Kar, S., Datta, A.: Information flow for security in control systems. IEEE Conference on Decision and Control, Las Vegas, NV, USA, pp. 5065–5072 (2016)

    Google Scholar 

  36. Chen, Y., Kar, S., Moura, J.M.F.: Optimal attack strategies subject to detection constraints against cyber-physical systems. IEEE Trans. Control Netw. Syst. 5(3), 1157–1168 (2018)

    Article  MathSciNet  Google Scholar 

  37. Cover, T.M., Thomas, J.A.: Elements of Information Theory, 2nd edn. Wiley, Hoboken (2006)

    Google Scholar 

  38. Bai, C.-Z., Pasqualetti, F., Gupta, V.: Data-injection attacks in stochastic control systems: detectability and performance tradeoffs. Automatica 82, 251–260 (2017)

    Article  MathSciNet  Google Scholar 

  39. Hespanha, J.P.: Linear Systems Theory. Princeton University Press, Princeton (2009)

    Google Scholar 

  40. El Gamal, A., Kim, Y.-H.: Network Information Theory. Cambridge University Press, Cambridge (2011)

    Google Scholar 

  41. Kundur, P.: Power System Stability and Control. McGraw-Hill Education, New York (1994)

    Google Scholar 

  42. Athay, T., Podmore, R., Virmani, S.: A practical method for the direct analysis of transient stability. IEEE Trans. Power Appar. Syst. (PAS) 98(2), 573–584 (1979)

    Google Scholar 

  43. Varga, A.: Descriptor system tools (DSTOOLS) user’s guide (2018). ArXiv eprint arXiv:1707.07140

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fabio Pasqualetti .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Katewa, V., Bai, CZ., Gupta, V., Pasqualetti, F. (2021). Detection of Attacks in Cyber-Physical Systems: Theory and Applications. In: Ferrari, R.M., Teixeira, A.M.H. (eds) Safety, Security and Privacy for Cyber-Physical Systems. Lecture Notes in Control and Information Sciences, vol 486. Springer, Cham. https://doi.org/10.1007/978-3-030-65048-3_5

Download citation

Publish with us

Policies and ethics