Abstract
The possibility of cyberattacks in Networked Control Systems (NCS), along with the growing use of networked controllers in industry and critical infrastructures, is motivating studies about the cybersecurity of these systems. The literature on cybersecurity of NCSs indicates that accurate and covert model-based attacks require high level of knowledge about the models of the attacked system. In this sense, recent works recognize that Bio-inspired System Identification (BiSI) attacks can be considered an effective tool to provide the attacker with the required system models. However, while BiSI attacks have obtained sufficiently accurate models to support the design of model-based attacks, they have demonstrated loss of accuracy in the presence of noisy signals. In this work, a noise processing technique is proposed to improve the accuracy of BiSI attacks in noisy NCSs. The technique is implemented along with a bio-inspired metaheuristic that was previously used in other BiSI attacks: the Backtracking Search Optimization Algorithm (BSA). The results indicate that, with the proposed approach, the accuracy of the estimated models improves. With the proposed noise processing technique, the attacker is able to obtain the model of an NCS by exploiting the noise as a useful information, instead of having it as a negative factor for the performance of the identification process.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Amin, S., Litrico, X., Sastry, S., Bayen, A.M.: Cyber security of water SCADA systems Part I: analysis and experimentation of stealthy deception attacks. IEEE Trans. Control Syst. Technol. 21(5), 1963–1970 (2013)
Civicioglu, P.: Backtracking search optimization algorithm for numerical optimization problems. Appl. Math. Comput. 219(15), 8121–8144 (2013)
Farooqui, A.A., Zaidi, S.S.H., Memon, A.Y., Qazi, S.: Cyber security backdrop: a scada testbed. In: 2014 IEEE Computing, Communications and IT Applications Conference (ComComAp), pp. 98–103. IEEE (2014)
Ferrari, P., Flammini, A., Rizzi, M., Sisinni, E.: Improving simulation of wireless networked control systems based on wirelessHART. Comput. Stan. Interfaces 35(6), 605–615 (2013)
Ji, K., Wei, D.: Resilient control for wireless networked control systems. Int. J. Control Autom. Syst. 9(2), 285–293 (2011)
Langner, R.: Stuxnet: dissecting a cyberwarfare weapon. IEEE Secur. Priv. 9(3), 49–51 (2011)
Long, M., Wu, C.H., Hung, J.Y.: Denial of service attacks on network-based control systems: impact and mitigation. IEEE Trans. Ind. Inform. 1(2), 85–96 (2005)
de Sá, A.O., da Costa Carmo, L.F., Machado, R.C.: A controller design for mitigation of passive system identification attacks in networked control systems. J. Internet Serv. Appl. 9(1), 2 (2018)
de Sá, A.O., Carmo, L.F.D.C., Machado, R.C.: Bio-inspired active system identification: a cyber-physical intelligence attack in networked control systems. Mobile Netw. Appl., 1–14 (2017)
de Sá, A.O., da Costa Carmo, L.F.R., Machado, R.C.: Covert attacks in cyber-physical control systems. IEEE Trans. Ind. Inform. 13(4), 1641–1651 (2017)
Smith, R.: A decoupled feedback structure for covertly appropriating networked control systems. In: Proceedings of the 18th IFAC World Congress 2011, vol. 18 (2011). IFAC-PapersOnLine
Smith, R.S.: Covert misappropriation of networked control systems: presenting a feedback structure. IEEE Control Syst. 35(1), 82–92 (2015)
Snoeren, A.C., et al.: Single-packet IP traceback. IEEE/ACM Trans. Netw. (ToN) 10(6), 721–734 (2002)
Teixeira, A., Shames, I., Sandberg, H., Johansson, K.H.: A secure control framework for resource-limited adversaries. Automatica 51, 135–148 (2015)
Acknowledgements
This work was partially sponsored by the EU-BR SecureCloud project (MCTI/ RNP 3rd Coordinated Call), by the Coordination for the Improvement of Higher Education Personnel (CAPES), grant 99999.008512/2014-0, and by FCT through project LaSIGE (UID/CEC/00408/2013).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
de Sá, A.O., Casimiro, A., Machado, R.C.S., da Costa Carmo, L.F.R. (2019). Bio-inspired System Identification Attacks in Noisy Networked Control Systems. In: Compagnoni, A., Casey, W., Cai, Y., Mishra, B. (eds) Bio-inspired Information and Communication Technologies. BICT 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 289. Springer, Cham. https://doi.org/10.1007/978-3-030-24202-2_3
Download citation
DOI: https://doi.org/10.1007/978-3-030-24202-2_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-24201-5
Online ISBN: 978-3-030-24202-2
eBook Packages: Computer ScienceComputer Science (R0)