Skip to main content
Log in

Locating collaborative attack targets based on physical invariants toward cyber-physical systems

  • Regular Contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

Various studies have demonstrated that the collaborative false command injection (FCI) and false sensory data injection (FDI) attacks can go undetected by the existing detection methods and result in serious cascading failures. Therefore, fast attack-recovery under attacks are gaining importance. However, previous researches cannot know which data are contaminated and real system state cannot be evaluated, which leads to serious misalignment of attack-recovery. In this paper, we propose a novel and effective method based on physical invariants among heterogeneous control commands and sensory data to locate the maliciously modified command or compromised sensor. First, we analyze changes in invariants under different single attacks and depict how to detect the collaborative attack and locate attack targets by utilizing broken invariants. Second, considering localization becomes difficult when multiple attacks may be launched simultaneously to disrupt different components, we build the causal network by utilizing the physical invariants and develop a causal-network-based algorithm to fast locate compromised objects. Finally, our numerical results validate the effectiveness of our proposed methods and algorithms. Our work will build the foundation to achieve real-time and accurate recovery under attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Data availability

The data and material that support the findings of this study are available from the corresponding author, Peng Xun, upon reasonable request. This research work utilizes the water distribution datasets which are publicly available online.

Code availability

The data and material that support the findings of this study are available from the corresponding author, Peng Xun, upon reasonable request.

References

  1. Karnouskos, S.: Stuxnet worm impact on industrial cyber-physical system security. In IECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society, pp. 4490–4494 (2011)

  2. Cyber-attack against ukrainian critical infrastructure (2016). https://www.ics-cert.us-cert.gov/alerts/IRALERTH-16-056-01/

  3. Lakshminarayana, S., Teo, Z., Tan, R., Yau, D., et al.: On false data injection attacks against railway traction power systems. In IEEE/IFIP International Conference on Dependable System and Networks, pp. 383–394 (2016)

  4. Tian, J., Wang, B., Li, J., Wang, Z., Ma, B., Ozay, M.: Exploring targeted and stealthy false data injection attacks via adversarial machine learning. IEEE Internet Things J. 9(15), 14116 (2022)

    Article  Google Scholar 

  5. Li, W., Xie, L., Deng, Z., Wang, Z.: False sequential logic attack on SCADA system and its physical impact analysis. Comput. Secur. 58(2016), 149 (2016)

    Article  Google Scholar 

  6. Xie, L., Mo, Y., Sinopoli, B.: False data injection attacks in electricity markets. In 2010 First IEEE International Conference on Smart Grid Communications, pp. 226–231 (2010)

  7. Li, Y.G., Yang, G.H., Wang, X.: Optimal energy constrained deception attacks in cyber-physical systems with multiple channels: a fusion attack approach. ISA Trans. 137, 1 (2023)

    Article  Google Scholar 

  8. Garcia, L.A., Brasser, F., Cintuglu, M.H., Sadeghi, A.R., et al.: Hey, My Malware Knows Physics! Attacking PLCs with physical model aware rootkit. In Network and Distributed System Security Symposium, pp. 1–15 (2017)

  9. Zhu, Y., Yan, J., Tang, Y., Sun, Y.L., He, H.: Coordinated attacks against substations and transmission lines in power grids. In 2014 IEEE Global Communications Conference, pp. 655–661 (2014)

  10. Zhang, L., Chen, X., Kong, F., Cardenas, A.: Real-time attack-recovery for cyber-physical systems using linear approximations. In IEEE Real-Time Systems Symposium, pp. 205–217 (2020)

  11. Luo, X., Li, Y., Wang, X., Guan, X.: Interval observer-based detection and localization against false data injection attack in smart grids. IEEE Internet Things J. 8(2), 657 (2021)

    Article  Google Scholar 

  12. Boyaci, O., Narimani, M.R., Davis, K.R., Ismail, M., Overbye, T.J., Serpedin, E.: Joint detection and localization of stealth false data injection attacks in smart grids using graph neural networks. IEEE Trans. Smart Grid 13(1), 807 (2022)

    Article  Google Scholar 

  13. Wang, S., Narimani, S.B., Zhang, Y.J.A.: Locational detection of the false data injection attack in a smart grid: a multilabel classification approach. IEEE Internet Things J. 7(9), 8218 (2020)

    Article  Google Scholar 

  14. Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. In Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 21–32 (2008)

  15. Tian, J., Wang, B., Wang, Z., Cao, K., Li, J., Ozay, M.: Joint adversarial example and false data injection attacks for state estimation in power systems. IEEE Trans. Cybern. 52(12), 13699 (2022)

    Article  Google Scholar 

  16. Kulandaivel, S., Jain, S., Guajardo, J., Sekar, V.: CANNON: reliable and stealthy remote shutdown attacks via unaltered automotive microcontrollers. In IEEE Symposium on Security and Privacy, pp. 195–210 (2021)

  17. Mathur, A.P., Tippenhauer, N.O.: SWaT: a water treatment testbed for research and training on ICS security. In 2016 International Workshop on Cyber-physical Systems for Smart Water Networks, pp. 31–36 (2016)

  18. Hu, F., Lu, Y., Vasilakos, A.V., Hao, Q., et al.: Robust cyber physical systems: concept, models, and implementation. Future Gener. Comput. Syst. 56(2016), 449 (2016)

    Article  Google Scholar 

  19. Kim, T.T., Poor, H.V.: Strategic protection against data injection attacks on power grids. IEEE Trans. Smart Grid 2(2), 326 (2011)

    Article  Google Scholar 

  20. Lin, H., Alemzadeh, H., Chen, D., Kalbarczyk, Z., et al.: Safety-critical cyber-physical attacks: analysis, detection, and mitigation. In Proceedings of the Symposium and Bootcamp on the Science of Security, pp. 82–89 (2016)

  21. Tian, J., Wang, B., Guo, R., Wang, Z., Cao, K., Wang, X.: Adversarial attacks and defenses for deep-learning-based unmanned aerial vehicles. IEEE Internet Things J. 9(22), 22399 (2022)

    Article  Google Scholar 

  22. Tian, J., Wang, B., Li, J., Wang, Z.: Adversarial attacks and defense for CNN based power quality recognition in smart grid. IEEE Trans. Netw. Sci. Eng. 9(2), 807 (2022)

    Article  MathSciNet  Google Scholar 

  23. Gupta, C.: Event correlation for operations management of largescale IT systems. In Proceedings of the 9th International Conference on Autonomic Computing, pp. 91–96 (2012)

  24. Vu, Q.D., Tan, R., Yau, D.K.Y.: On applying fault detectors against false data injection attacks in cyber-physical control systems. In IEEE INFOCOM 2016—The 35th Annual IEEE International Conference on Computer Communications, pp. 1–9 (2016)

  25. Danial, J., Keyhan, S., Marthe, K., Younes, S.: Countering FDI attacks on DERs coordinated control system using FMI-compatible cosimulation. IEEE Trans. Smart Grid 12(2), 1640 (2021)

    Article  Google Scholar 

  26. Chen, Y., Hu, W., Alam, M., Wu, T.: Fiden: intelligent fingerprint learning for attacker identification in the industrial internet of things. IEEE Trans. Ind. Inform. 17(2), 882 (2021)

    Article  Google Scholar 

  27. Wang, X., Luo, X., Zhang, Y., Guan, X.: Detection and Isolation of False Data Injection Attacks in Smart Grids via Nonlinear Interval Observer. IEEE Internet Things J. 6(4), 6498 (2019)

    Article  Google Scholar 

  28. Edib, S.N., Lin, Y., Vokkarane, V.M., Qiu, F., Yao, R., Zhao, D.: Optimal PMU restoration for power system observability recovery after massive attacks. IEEE Trans. Smart Grid 12(2), 1565 (2021)

    Article  Google Scholar 

  29. Jiang, M., Munawar, M.A., Reidemeister, T., Ward, P.A.S.: Efficient fault detection and diagnosis in complex software systems with information-theoretic monitoring. IEEE Trans. Depend. Secure Comput. 8(4), 510 (2011)

    Article  Google Scholar 

  30. Ge, Y., Jiang, G., Ding, M., Xiong, H.: Time series segmentation to discover behavior switching in complex physical systems. ACM Trans. Knowl. Discov. Data 8(2), 8:1 (2014)

    Google Scholar 

  31. Sharma, A.B., Chen, H., Ding, M., Yoshihira, K., Jiang, G.: Fault detection and localization in distributed systems using invariant relationships. In 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 00, pp. 1–8 (2013)

  32. Chen, B., Li, H., Zhou, B.: Real-time identification of false data injection attacks: a novel dynamic-static parallel state estimation based mechanism. IEEE Access 7(2019), 95812 (2019)

    Article  Google Scholar 

  33. Zeng, R., Zeng, C., Wang, X., Li, B., Chu, X.: IEEE Network (In Press)

  34. Cheng, L., Tian, K., Yao, D.: Orpheus: enforcing cyber-physical execution semantics to defend against data-oriented attacks. In Proceedings of the 33rd Annual Computer Security Applications Conference, pp. 315–326 (2017)

  35. Chen, Y., Poskitt, C.M., Sun, J.: Learning from mutants: using code mutation to learn and monitor invariants of a cyber-physical system. In IEEE Symposium on Security and Privacy, pp. 648–660 (2018)

  36. An, L., Yang, G.: Collisions-free distributed optimal coordination for multiple Euler–Lagrangian systems. IEEE Trans. Autom. Control. 67(1), 460 (2022)

    Article  MathSciNet  Google Scholar 

  37. An, L., Yang, G.H.: Distributed optimal coordination for heterogeneous linear multiagent systems. IEEE Trans. Autom. Control 67(12), 6850 (2022)

    Article  MathSciNet  Google Scholar 

  38. de Sa, A.O., Carmo, L.F.R.D.C., Machado, R.C.S.: Covert attacks in cyber-physical control systems. IEEE Trans. Ind. Inform. 13(4), 1641 (2017)

    Article  Google Scholar 

  39. Wang, J., Tu, W., Hui, L.C.K., Yiu, S., Wang, E.K.: Detecting time synchronization attacks in cyber-physical systems with machine learning techniques. In 37th IEEE International Conference on Distributed Computing Systems, pp. 2246–2251 (2017)

  40. Luo, C., Lou, J.G., Lin, Q., Fu, Q., et al.: Correlating events with time series for incident diagnosis. In Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1583–1592 (2014)

  41. Xun, P., Zhu, P.D., Li, C.L., Zhu, H.Y.: Discovering multi-type correlated events with time series for exception detection of complex systems. In 2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW), pp. 21–28 (2016)

  42. Faramondi, L., Flammini, F., Guarino, S., Setola, R.: A hardware-in-the-loop water distribution testbed dataset for cyber-physical security testing. IEEE Access 9(2021), 122385 (2021)

    Article  Google Scholar 

  43. Matpower (2022). https://matpower.org/

  44. Mishra, S., Li, X., Kuhnle, A., Thai, M.T., Seo, J.: Rate alteration attacks in smart grid. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 2353–2361 (2015)

  45. Short, J.A., Infield, D.G., Freris, L.L.: Stabilization of grid frequency through dynamic demand control. IEEE Trans. Power Syst. 22(3), 1284 (2007)

    Article  Google Scholar 

Download references

Funding

This research did not receive any specific funding.

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed to the study conception and design. Material preparation, data collection, and analysis were performed by PX, HZ, and ZY. The draft of the manuscript was written by ZT, and all authors read and approved the current manuscript.

Corresponding author

Correspondence to Peng Xun.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Informed consent

This article does not contain any studies with human participants.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix A: The discussion of NP-complete nature

Appendix A: The discussion of NP-complete nature

For formula 6, our target is to search the set \(V^A\), which has the least number of elements and these selected elements can cover the broken correlations. On another hand, these selected elements cannot cause new broken correlations. An example is shown in Fig. 13. The correlation between node “E1” and node “S1” and the correlation between node “E4” and “S9” are broken. From broken correlations, we can know there exist 4 attacked situations: \(\{E1,E4\}\), \(\{E1,S9\}\),\(\{S1,E4\}\), or \(\{S1, S9\}\). However, other nodes also possible are compromised. For example, when \(E1\) is considered as the attacked node, \(S2\), \(S3\), and \(S4\) need to be considered as compromised nodes because correlations among \(E1\),\(S2\),\(S3\), and \(S4\) are not broken. Considering the above situation, the candidate set keeps growing and when a candidate node is seen as manipulated node, all of nodes related to the candidate node will be recomputed whether it is attacked or not. If we use brute search, for N nodes with n attacked targets, the time complexity is \(O(N\times 2^n)\). With the increase of attacked targets, the cost of solving the problem is very large.

Next, we illustrate the problem is equal to knapsack problem.

In graph \(G(N,L)\), node set \(V\) consists of attacked set \(V^A\) and normal set \(V^N\), which means

$$\begin{aligned} V = V^A \cup V^N \quad \quad \quad and \quad \quad \quad V^A \cap V^N = \emptyset \end{aligned}$$
(16)

\(C^B\) denotes the broken correlation set. For any link \(v_i\rightarrow v_j \in C^B\), \(v_i\) and \(v_j\) will be added into the candidate set \(N^B\). Our target is selecting elements from \(N^B\) to \(V^A\) and obtaining \(V^A\) with the least number of elements. Combining Equ (16), the problem is equal to finding the set \(V^N\) with the most number of elements and no adding new links into set \(C^B\).

We use \(Score(v_i)\) to denote the number of normal nodes when \(v_i\) is considered as manipulated node. \(C^B(v_i)\) denotes the abnormal link set connected with node \(v_i\). Our problem is to search a set \(V^A\) satisfying:

$$\begin{aligned} \max _{{\textrm{V}}^{A}}{\sum _{v_i\in V^A}{Score(v_i)}} \end{aligned}$$
(17)

subject to

$$\begin{aligned} \begin{aligned}&\cup _{v_i\in V^A}{C^B(v_i)}=C^B \\&for \quad \forall v_i,v_j \in V^A:\quad C^B(v_i)\cap C^B(v_j) = \emptyset \end{aligned} \end{aligned}$$

From (17), we can know this is a knapsack problem which needs to be filled(NP-complete problem).

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xun, P., Yang, Z., Zhu, H. et al. Locating collaborative attack targets based on physical invariants toward cyber-physical systems. Int. J. Inf. Secur. 23, 999–1017 (2024). https://doi.org/10.1007/s10207-023-00773-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-023-00773-0

Keywords

Navigation