In order to solve the data integrity attack of networked control systems, a bias attack and its detection method based on the networked inverted pendulum platform sensors are designed in this paper. First, the Ettercap tool is utilized to realize network intrusion and inject false data. Next, combined with the support vector machine (SVM) method, the LibSVM classifier is used to train the four kinds of state information in the inverted pendulum system to obtain the model and classify the data. After that, the SVM method is compared with K-nearest neighbor and decision tree methods in the self-built system. Finally, the method proposed is validated on the platform. The simulation and experimental results show that the designed attack method can change the stability of the system. Compared with the commonly used machine learning method, the SVM has more advantages in the binary classification of bias attack detection and can effectively distinguish the false data in the transmission data.
XU Binbin, HONG Zhen, ZHAO Lei, YU Li
. Bias Attack and Detection Method for
Networked Inverted Pendulum System[J]. Journal of Shanghai Jiaotong University, 2020
, 54(7)
: 697
-704
.
DOI: 10.16183/j.cnki.jsjtu.2020.174
[1]WALSH G C, YE H, BUSHNELL L G. Stability analysis of networked control systems [J]. IEEE Transactions on Control Systems Technology, 2002, 10(3): 438-446.
[2]ZHANG X M, HAN Q L, YU X H. Survey on recent advances in networked control systems[J]. IEEE Transactions on Industrial Informatics, 2016, 12(5): 1740-1752.
[3]DRIAS Z, SERHROUCHNI A, VOGEL O. Analysis of cyber security for industrial control systems[C]∥International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications. Shanghai, China: IEEE, 2015: 1-8.
[4]刘烃, 田决, 王稼舟, 等. 信息物理融合系统综合安全威胁与防御研究[J]. 自动化学报, 2019, 45(1): 5-24.
LIU Ting, TIAN Jue, WANG Jiazhou, et al. Integrated security threats and defense of cyber-physical systems[J]. Acta Automatica Sinica, 2019, 45(1): 5-24.
[5]URBINA D I, GIRALDO J A, TIPPENHAUER N O, et al. Attacking fieldbus communications in ICS: Applications to the SWaT testbed[C]∥Singapore Cyber-Security Conference. Singapore: Singapore University of Technology and Design, 2016: 75-89.
[6]QUARTA D, POGLIANI M, POLINO M, et al. An experimental security analysis of an industrial robot controller[C]∥IEEE Symposium on Security and Privacy. San Jose, CA, USA: IEEE, 2017: 268-286.
[7]MANANDHAR K, CAO X J, HU F, et al. Detection of faults and attacks including false data injection attack in smart grid using kalman filter[J]. IEEE Transactions on Control of Network Systems, 2014, 1(4): 370-379.
[8]URBINA D I, GIRALDO J A, CARDENAS A A, et al. Limiting the impact of stealthy attacks on industrial control systems[C]∥23rd ACM Conference on Computer and Communications Security. Vienna, Austria: ACM, 2016: 1092-1105.
[9]俞立. 现代控制理论[M]. 北京: 清华大学出版社, 2007.
YU Li. Modern control theory[M]. Beijing: Tsinghua University Press, 2007.
[10]CARDENAS A A, AMIN S, SASTRY S. Secure control: Towards survivable cyber-physical systems[C]∥28th International Conference on Distributed Computing Systems Workshops. Beijing, China: IEEE, 2008: 495-500.
[11]MOON D, LEE J D, JEONG Y S, et al. RTNSS: A routing trace-based network security system for preventing ARP spoofing attacks[J]. The Journal of Supercomputing, 2016, 72(5): 1740-1756.
[12]LIU Y, NING P, REITER M K. False data injection attacks against state estimation in electric power grids [J]. ACM Transactions on Information and System Security, 2011, 14(1): 1-33.
[13]陆耿虹, 冯冬芹. 基于改进C-SVC的工控网络安全态势感知[J]. 控制与决策, 2017, 32(7): 1223-1228.
LU Genghong, FENG Dongqin. Industrial control network security situation awareness based on improved C-SVC[J]. Control and Decision, 2017, 32(7): 1223-1228.
[14]REGALADO D, HARRIS S. 灰帽黑客: 正义黑客的道德规范、渗透测试、攻击方法和漏洞分析[M]. 第4版. 北京: 清华大学出版社, 2016.
REGALADO Daniel, HARRIS Shon. Gray hat hacking: The ethical hacker’s handbook[M]. 4th ed. Beijing: Tsinghua University Press, 2016.
[15]李航. 统计学习方法[M]. 北京: 清华大学出版社, 2012.
LI Hang. Statistical learning method[M]. Beijing: Tsinghua University Press, 2012.
[16]CHANG C C, LIN C J. LIBSVM-A library for support vector machines [CP/OL]. (2019-9-11)[2019-12-10]. http:∥www.csie.ntu.edu.tw/~cjlin/libsvm/.
[17]周志华. 机器学习[M]. 北京: 清华大学出版社, 2016.
ZHOU Zhihua. Machine learning[M]. Beijing: Tsinghua University Press, 2016.