Table of Contents Author Guidelines Submit a Manuscript
Journal of Electrical and Computer Engineering
Volume 2018, Article ID 7204939, 14 pages
https://doi.org/10.1155/2018/7204939
Research Article

A Novel Covert Agent for Stealthy Attacks on Industrial Control Systems Using Least Squares Support Vector Regression

School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing 100083, China

Correspondence should be addressed to Lun Xie; nc.ude.btsu@nuleix

Received 12 July 2017; Accepted 24 December 2017; Published 1 February 2018

Academic Editor: Vinod Sharma

Copyright © 2018 Weize Li et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. C. Zhou, S. Huang, N. Xiong et al., “Design and analysis of multimodel-based anomaly intrusion detection systems in industrial process automation,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 45, no. 10, pp. 1345–1360, 2015. View at Publisher · View at Google Scholar · View at Scopus
  2. T. Cruz, L. Rosa, J. Proenca et al., “A cybersecurity detection framework for supervisory control and data acquisition systems,” IEEE Transactions on Industrial Informatics, vol. 12, no. 6, pp. 2236–2246, 2016. View at Publisher · View at Google Scholar · View at Scopus
  3. S. McLaughlin, C. Konstantinou, X. Wang et al., “The Cybersecurity Landscape in Industrial Control Systems,” Proceedings of the IEEE, vol. 104, no. 5, pp. 1039–1057, 2016. View at Publisher · View at Google Scholar · View at Scopus
  4. M. Cheminod, L. Durante, and A. Valenzano, “Review of security issues in industrial networks,” IEEE Transactions on Industrial Informatics, vol. 9, no. 1, pp. 277–293, 2013. View at Publisher · View at Google Scholar · View at Scopus
  5. R. Deng, G. Xiao, R. Lu, H. Liang, and A. V. Vasilakos, “False data injection on state estimation in power systems—attacks, impacts, and defense: a survey,” IEEE Transactions on Industrial Informatics, vol. 13, no. 2, pp. 411–423, 2017. View at Publisher · View at Google Scholar
  6. A. Teixeira, K. C. Sou, H. Sandberg, and K. H. Johansson, “Secure control systems: a quantitative risk management approach,” IEEE Control Systems Magazine, vol. 35, no. 1, pp. 24–45, 2015. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  7. C. Kwon, W. Liu, and I. Hwang, “Security analysis for Cyber-Physical Systems against stealthy deception attacks,” in Proceedings of the 2013 1st American Control Conference, ACC 2013, pp. 3344–3349, USA, June 2013. View at Scopus
  8. Z.-H. Pang, G.-P. Liu, D. Zhou, F. Hou, and D. Sun, “Two-channel false data injection attacks against output tracking control of networked systems,” IEEE Transactions on Industrial Electronics, vol. 63, no. 5, pp. 3242–3251, 2016. View at Publisher · View at Google Scholar · View at Scopus
  9. A. Teixeira, H. Sandberg, and K. H. Johansson, “Strategic stealthy attacks: The output-to-output l2-gain,” in Proceedings of the 54th IEEE Conference on Decision and Control, CDC 2015, pp. 2582–2587, Japan, December 2015. View at Publisher · View at Google Scholar · View at Scopus
  10. H. Sedghi and E. Jonckheere, “Statistical structure learning to ensure data integrity in smart grid,” IEEE Transactions on Smart Grid, vol. 6, no. 4, pp. 1924–1933, 2015. View at Publisher · View at Google Scholar
  11. K. Manandhar, X. Cao, F. Hu, and Y. Liu, “Detection of faults and attacks including false data injection attack in smart grid using Kalman filter,” IEEE Transactions on Control of Network Systems, vol. 1, no. 4, pp. 370–379, 2014. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  12. A. Dutta and C. Langbort, “Stealthy output injection attacks on control systems with bounded variables,” International Journal of Control, vol. 90, no. 7, pp. 1389–1402, 2017. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  13. R. S. Smith, “Covert misappropriation of networked control systems: presenting a feedback structure,” IEEE Control Systems Magazine, vol. 35, no. 1, pp. 82–92, 2015. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  14. A. A. Cárdenas, S. Amin, Z.-S. Lin, Y.-L. Huang, C.-Y. Huang, and S. Sastry, “Attacks against process control systems: risk assessment, detection, and response,” in Proceedings of the 6th International Symposium on Information, Computer and Communications Security (ASIACCS '11), pp. 355–366, Hong Kong, March 2011. View at Publisher · View at Google Scholar · View at Scopus
  15. A. Teixeira, I. Shames, H. Sandberg, and K. H. Johansson, “A secure control framework for resource-limited adversaries,” Automatica, vol. 51, pp. 135–148, 2015. View at Publisher · View at Google Scholar · View at Scopus
  16. D. I. Urbina, J. Giraldo, A. A. Cardenas et al., “Limiting the impact of stealthy attacks on Industrial Control Systems,” in Proceedings of the 23rd ACM Conference on Computer and Communications Security, CCS 2016, pp. 1092–1105, Austria, October 2016. View at Publisher · View at Google Scholar · View at Scopus
  17. X. Dai and Z. Gao, “From model, signal to knowledge: A data-driven perspective of fault detection and diagnosis,” IEEE Transactions on Industrial Informatics, vol. 9, no. 4, pp. 2226–2238, 2013. View at Publisher · View at Google Scholar · View at Scopus
  18. Z. Yu and W. Chin, “Blind false data injection attack using pca approximation method in smart grid,” IEEE Transactions on Smart Grid, vol. 6, no. 3, pp. 1219–1226, 2015. View at Publisher · View at Google Scholar
  19. A. Anwar and A. N. Mahmood, “Stealthy and blind false injection attacks on SCADA EMS in the presence of gross errors,” in Proceedings of the 2016 IEEE Power and Energy Society General Meeting, PESGM 2016, USA, July 2016. View at Publisher · View at Google Scholar · View at Scopus
  20. A. Anwar, A. N. Mahmood, and M. Pickering, “Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements,” Journal of Computer and System Sciences, vol. 83, no. 1, pp. 58–72, 2017. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  21. Y. Yuan and Y. Mo, “Security in cyber-physical systems: Controller design against Known-Plaintext Attack,” in Proceedings of the 54th IEEE Conference on Decision and Control, CDC 2015, pp. 5814–5819, Japan, December 2015. View at Publisher · View at Google Scholar · View at Scopus
  22. J. Kim, L. Tong, and R. J. Thomas, “Subspace methods for data attack on state estimation: a data driven approach,” IEEE Transactions on Signal Processing, vol. 63, no. 5, pp. 1102–1114, 2015. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  23. X. Lu, W. Zou, and M. Huang, “A novel spatiotemporal LS-SVM method for complex distributed parameter systems with applications to curing thermal process,” IEEE Transactions on Industrial Informatics, vol. 12, no. 3, pp. 1156–1165, 2016. View at Publisher · View at Google Scholar · View at Scopus
  24. J. A. K. Suykens and J. Vandewalle, “Least squares support vector machine classifiers,” Neural Processing Letters, vol. 9, no. 3, pp. 293–300, 1999. View at Publisher · View at Google Scholar · View at Scopus
  25. F. Kaytez, M. C. Taplamacioglu, E. Cam, and F. Hardalac, “Forecasting electricity consumption: a comparison of regression analysis, neural networks and least squares support vector machines,” International Journal of Electrical Power & Energy Systems, vol. 67, pp. 431–438, 2015. View at Publisher · View at Google Scholar
  26. H. C. Jung, J. S. Kim, and H. Heo, “Prediction of building energy consumption using an improved real coded genetic algorithm based least squares support vector machine approach,” Energy and Buildings, vol. 90, pp. 76–84, 2015. View at Publisher · View at Google Scholar · View at Scopus
  27. M. K. Goyal, B. Bharti, J. Quilty, J. Adamowski, and A. Pandey, “Modeling of daily pan evaporation in sub tropical climates using ANN, LS-SVR, fuzzy logic, and ANFIS,” Expert Systems with Applications, vol. 41, no. 11, pp. 5267–5276, 2014. View at Publisher · View at Google Scholar · View at Scopus
  28. A. Teixeira, I. Shames, H. Sandberg, and K. H. Johansson, “Revealing stealthy attacks in control systems,” in Proceedings of the 2012 50th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2012, pp. 1806–1813, USA, October 2012. View at Publisher · View at Google Scholar · View at Scopus
  29. G. Wu and J. Sun, “Optimal data integrity attack on actuators in Cyber-Physical Systems,” in Proceedings of the 2016 American Control Conference, American Automatic Control Council (AACC) (ACC '16), pp. 1160–1164, USA, July 2016. View at Publisher · View at Google Scholar · View at Scopus
  30. C. Staelin, “Parameter selection for support vector machines,” Hewlett-Packard Company, 2003, Tech. Rep. HPL-2002-354R1. View at Google Scholar
  31. N. F. Thornhill, S. C. Patwardhan, and S. L. Shah, “A continuous stirred tank heater simulation model with applications,” Journal of Process Control, vol. 18, no. 3-4, pp. 347–360, 2008. View at Publisher · View at Google Scholar · View at Scopus
  32. L. Koepcke, G. Ashida, and J. Kretzberg, “Single and multiple change point detection in spike trains: Comparison of different CUSUM methods,” Frontiers in Systems Neuroscience, vol. 10, article no. 51, 2016. View at Publisher · View at Google Scholar · View at Scopus