学报(中文)

网络化倒立摆系统的偏差攻击及其检测方法

展开
  • 浙江工业大学 信息工程学院, 杭州 310023
徐彬彬(1993-),男,浙江省衢州市人,硕士生,从事工业网络安全的研究.

网络出版日期: 2020-07-31

基金资助

国家自然科学基金(61673351),NSFC-浙江省两化融合联合基金(U1709213),浙江省自然科学基金(LY20F020030) 资助项目

Bias Attack and Detection Method for Networked Inverted Pendulum System

Expand
  • College of Information Engineering, Zhejiang University of Technology, Hangzhou 310023, China

Online published: 2020-07-31

摘要

为解决网络化控制系统数据完整性的攻击问题,设计了基于网络化倒立摆平台状态信息的偏差攻击,并提出了对应的检测方法.利用Ettercap工具对平台网络成功入侵,对位置数据进行了偏差攻击;结合支持向量机(SVM)方法,使用LibSVM分类器,对倒立摆系统的4种状态信息进行训练、建模和数据分类,并与K最近邻、决策树方法进行对比;在平台上验证了所提出的方法.仿真和实验结果表明,所设计的攻击方法能够改变系统的稳定状态,与常用的机器学习方法相比,SVM在偏差攻击检测的二分类问题上更加优越,能较好地区分掺杂在数据的虚假数据.

本文引用格式

徐彬彬, 洪榛, 赵磊, 俞立 . 网络化倒立摆系统的偏差攻击及其检测方法[J]. 上海交通大学学报, 2020 , 54(7) : 697 -704 . DOI: 10.16183/j.cnki.jsjtu.2020.174

Abstract

In order to solve the data integrity attack of networked control systems, a bias attack and its detection method based on the networked inverted pendulum platform sensors are designed in this paper. First, the Ettercap tool is utilized to realize network intrusion and inject false data. Next, combined with the support vector machine (SVM) method, the LibSVM classifier is used to train the four kinds of state information in the inverted pendulum system to obtain the model and classify the data. After that, the SVM method is compared with K-nearest neighbor and decision tree methods in the self-built system. Finally, the method proposed is validated on the platform. The simulation and experimental results show that the designed attack method can change the stability of the system. Compared with the commonly used machine learning method, the SVM has more advantages in the binary classification of bias attack detection and can effectively distinguish the false data in the transmission data.

参考文献

[1]WALSH G C, YE H, BUSHNELL L G. Stability analysis of networked control systems [J]. IEEE Transactions on Control Systems Technology, 2002, 10(3): 438-446. [2]ZHANG X M, HAN Q L, YU X H. Survey on recent advances in networked control systems[J]. IEEE Transactions on Industrial Informatics, 2016, 12(5): 1740-1752. [3]DRIAS Z, SERHROUCHNI A, VOGEL O. Analysis of cyber security for industrial control systems[C]∥International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications. Shanghai, China: IEEE, 2015: 1-8. [4]刘烃, 田决, 王稼舟, 等. 信息物理融合系统综合安全威胁与防御研究[J]. 自动化学报, 2019, 45(1): 5-24. LIU Ting, TIAN Jue, WANG Jiazhou, et al. Integrated security threats and defense of cyber-physical systems[J]. Acta Automatica Sinica, 2019, 45(1): 5-24. [5]URBINA D I, GIRALDO J A, TIPPENHAUER N O, et al. Attacking fieldbus communications in ICS: Applications to the SWaT testbed[C]∥Singapore Cyber-Security Conference. Singapore: Singapore University of Technology and Design, 2016: 75-89. [6]QUARTA D, POGLIANI M, POLINO M, et al. An experimental security analysis of an industrial robot controller[C]∥IEEE Symposium on Security and Privacy. San Jose, CA, USA: IEEE, 2017: 268-286. [7]MANANDHAR K, CAO X J, HU F, et al. Detection of faults and attacks including false data injection attack in smart grid using kalman filter[J]. IEEE Transactions on Control of Network Systems, 2014, 1(4): 370-379. [8]URBINA D I, GIRALDO J A, CARDENAS A A, et al. Limiting the impact of stealthy attacks on industrial control systems[C]∥23rd ACM Conference on Computer and Communications Security. Vienna, Austria: ACM, 2016: 1092-1105. [9]俞立. 现代控制理论[M]. 北京: 清华大学出版社, 2007. YU Li. Modern control theory[M]. Beijing: Tsinghua University Press, 2007. [10]CARDENAS A A, AMIN S, SASTRY S. Secure control: Towards survivable cyber-physical systems[C]∥28th International Conference on Distributed Computing Systems Workshops. Beijing, China: IEEE, 2008: 495-500. [11]MOON D, LEE J D, JEONG Y S, et al. RTNSS: A routing trace-based network security system for preventing ARP spoofing attacks[J]. The Journal of Supercomputing, 2016, 72(5): 1740-1756. [12]LIU Y, NING P, REITER M K. False data injection attacks against state estimation in electric power grids [J]. ACM Transactions on Information and System Security, 2011, 14(1): 1-33. [13]陆耿虹, 冯冬芹. 基于改进C-SVC的工控网络安全态势感知[J]. 控制与决策, 2017, 32(7): 1223-1228. LU Genghong, FENG Dongqin. Industrial control network security situation awareness based on improved C-SVC[J]. Control and Decision, 2017, 32(7): 1223-1228. [14]REGALADO D, HARRIS S. 灰帽黑客: 正义黑客的道德规范、渗透测试、攻击方法和漏洞分析[M]. 第4版. 北京: 清华大学出版社, 2016. REGALADO Daniel, HARRIS Shon. Gray hat hacking: The ethical hacker’s handbook[M]. 4th ed. Beijing: Tsinghua University Press, 2016. [15]李航. 统计学习方法[M]. 北京: 清华大学出版社, 2012. LI Hang. Statistical learning method[M]. Beijing: Tsinghua University Press, 2012. [16]CHANG C C, LIN C J. LIBSVM-A library for support vector machines [CP/OL]. (2019-9-11)[2019-12-10]. http:∥www.csie.ntu.edu.tw/~cjlin/libsvm/. [17]周志华. 机器学习[M]. 北京: 清华大学出版社, 2016. ZHOU Zhihua. Machine learning[M]. Beijing: Tsinghua University Press, 2016.
文章导航

/