2022
DOI: 10.1002/aic.17875
|View full text |Cite
|
Sign up to set email alerts
|

A control‐switching approach for cyberattack detection in process systems with minimal false alarms

Abstract: The frequency of cyberattacks against process control systems has increased in recent years. This work considers multiplicative false‐data injection attacks involving the multiplication of the data communicated over the sensor‐controller communication link by a factor. An active detection method utilizing switching between two control modes is developed to balance the trade‐off between closed‐loop performance and attack detectability. Under the first mode, the control parameters are selected using traditional … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 32 publications
0
9
0
Order By: Relevance
“…For example, detection of some attacks may be possible when the detection scheme uses the residual to monitor the process; however, these attacks may go undetected when the detection scheme uses the measured output. This realization motivated the formulation of a generalized monitoring variable in [13,14] which may be expressed in terms of the measured and estimated outputs as:…”
Section: Commonly Used Monitoring Variables Include the Measured Outputmentioning
confidence: 99%
See 3 more Smart Citations
“…For example, detection of some attacks may be possible when the detection scheme uses the residual to monitor the process; however, these attacks may go undetected when the detection scheme uses the measured output. This realization motivated the formulation of a generalized monitoring variable in [13,14] which may be expressed in terms of the measured and estimated outputs as:…”
Section: Commonly Used Monitoring Variables Include the Measured Outputmentioning
confidence: 99%
“…As a result, the detectability of such attacks may be influenced by the stability of the closed-loop process under an attack. In prior works [13,15], we presented a control mode switching-enabled attack detection method for the detection of multiplicative sensor-controller link FDI attacks. We considered processes under steady-state operation, when the augmented state and the monitoring variable are bounded within the minimum invariant set and the terminal set, respectively.…”
Section: Control Mode Switching For Cyberattack Detectionmentioning
confidence: 99%
See 2 more Smart Citations
“…To balance the above trade‐off, in reference 23, a framework for active attack detection using the controller parameter switching of reference 22 was developed, where one set of controller parameters corresponds to conventional controller design criteria, while the other set of controller parameters maximizes cyberattack detectability. Due to the possibility of controller parameter switching leading to excitement of the process, leading to false alarms, reference 24 proposed a switching condition to reduce the triggering of false alarms. Based on our review of the literature on encrypted MPC, to the best of our knowledge, the use of encryption in nonlinear MPC has not been addressed in the systems engineering literature, which warrants the construction of such a framework.…”
Section: Introductionmentioning
confidence: 99%