Efficient Predictive Monitoring of Linear Time-Invariant Systems Under Stealthy Attacks

Research output: Contribution to journalArticlepeer-review

Abstract

Attacks on industrial control systems (ICSs) can lead to significant physical damage. While off-line safety and security assessments can provide insight into vulnerable system components, they may not account for stealthy attacks designed to evade anomaly detectors during long operational transients. In this article, we propose a predictive online monitoring approach to check the safety of the system under potential stealthy false data injection attacks (FDIAs) on sensors. Specifically, we adapt previous results in reachability analysis for attack impact assessment to provide an efficient algorithm for online safety monitoring for linear time-invariant (LTI) systems. The proposed approach relies on an off-line computation of symbolic reachable sets in terms of the estimated physical state of the system. These sets are then instantiated online, and safety checks are performed by leveraging ideas from ellipsoidal calculus. We illustrate and evaluate our approach using the Tennessee-Eastman process. We also compare our approach with the baseline monitoring approaches proposed in previous work and assess its efficiency and scalability. Our evaluation results demonstrate that our approach can predict in a timely manner if an FDIA will be able to cause damage while remaining undetected. Thus, our approach can be used to provide operators with real-time early warnings about stealthy attacks.

Original languageEnglish
Pages (from-to)735-747
Number of pages13
JournalIEEE Transactions on Control Systems Technology
Volume31
Issue number2
DOIs
Publication statusPublished - 1 Mar 2023

UN SDGs

This output contributes to the following UN Sustainable Development Goals (SDGs)

  1. SDG 9 - Industry, Innovation, and Infrastructure
    SDG 9 Industry, Innovation, and Infrastructure

Keywords

  • Control system security
  • ellipsoids
  • industrial control
  • linear systems
  • reachability analysis

Fingerprint

Dive into the research topics of 'Efficient Predictive Monitoring of Linear Time-Invariant Systems Under Stealthy Attacks'. Together they form a unique fingerprint.

Cite this