Skip to main content

Bio-inspired System Identification Attacks in Noisy Networked Control Systems

  • Conference paper
  • First Online:
Bio-inspired Information and Communication Technologies (BICT 2019)

Abstract

The possibility of cyberattacks in Networked Control Systems (NCS), along with the growing use of networked controllers in industry and critical infrastructures, is motivating studies about the cybersecurity of these systems. The literature on cybersecurity of NCSs indicates that accurate and covert model-based attacks require high level of knowledge about the models of the attacked system. In this sense, recent works recognize that Bio-inspired System Identification (BiSI) attacks can be considered an effective tool to provide the attacker with the required system models. However, while BiSI attacks have obtained sufficiently accurate models to support the design of model-based attacks, they have demonstrated loss of accuracy in the presence of noisy signals. In this work, a noise processing technique is proposed to improve the accuracy of BiSI attacks in noisy NCSs. The technique is implemented along with a bio-inspired metaheuristic that was previously used in other BiSI attacks: the Backtracking Search Optimization Algorithm (BSA). The results indicate that, with the proposed approach, the accuracy of the estimated models improves. With the proposed noise processing technique, the attacker is able to obtain the model of an NCS by exploiting the noise as a useful information, instead of having it as a negative factor for the performance of the identification process.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Amin, S., Litrico, X., Sastry, S., Bayen, A.M.: Cyber security of water SCADA systems Part I: analysis and experimentation of stealthy deception attacks. IEEE Trans. Control Syst. Technol. 21(5), 1963–1970 (2013)

    Article  Google Scholar 

  2. Civicioglu, P.: Backtracking search optimization algorithm for numerical optimization problems. Appl. Math. Comput. 219(15), 8121–8144 (2013)

    MathSciNet  MATH  Google Scholar 

  3. Farooqui, A.A., Zaidi, S.S.H., Memon, A.Y., Qazi, S.: Cyber security backdrop: a scada testbed. In: 2014 IEEE Computing, Communications and IT Applications Conference (ComComAp), pp. 98–103. IEEE (2014)

    Google Scholar 

  4. Ferrari, P., Flammini, A., Rizzi, M., Sisinni, E.: Improving simulation of wireless networked control systems based on wirelessHART. Comput. Stan. Interfaces 35(6), 605–615 (2013)

    Article  Google Scholar 

  5. Ji, K., Wei, D.: Resilient control for wireless networked control systems. Int. J. Control Autom. Syst. 9(2), 285–293 (2011)

    Article  Google Scholar 

  6. Langner, R.: Stuxnet: dissecting a cyberwarfare weapon. IEEE Secur. Priv. 9(3), 49–51 (2011)

    Article  Google Scholar 

  7. Long, M., Wu, C.H., Hung, J.Y.: Denial of service attacks on network-based control systems: impact and mitigation. IEEE Trans. Ind. Inform. 1(2), 85–96 (2005)

    Article  Google Scholar 

  8. de Sá, A.O., da Costa Carmo, L.F., Machado, R.C.: A controller design for mitigation of passive system identification attacks in networked control systems. J. Internet Serv. Appl. 9(1), 2 (2018)

    Article  Google Scholar 

  9. de Sá, A.O., Carmo, L.F.D.C., Machado, R.C.: Bio-inspired active system identification: a cyber-physical intelligence attack in networked control systems. Mobile Netw. Appl., 1–14 (2017)

    Google Scholar 

  10. de Sá, A.O., da Costa Carmo, L.F.R., Machado, R.C.: Covert attacks in cyber-physical control systems. IEEE Trans. Ind. Inform. 13(4), 1641–1651 (2017)

    Article  Google Scholar 

  11. Smith, R.: A decoupled feedback structure for covertly appropriating networked control systems. In: Proceedings of the 18th IFAC World Congress 2011, vol. 18 (2011). IFAC-PapersOnLine

    Article  Google Scholar 

  12. Smith, R.S.: Covert misappropriation of networked control systems: presenting a feedback structure. IEEE Control Syst. 35(1), 82–92 (2015)

    Article  MathSciNet  Google Scholar 

  13. Snoeren, A.C., et al.: Single-packet IP traceback. IEEE/ACM Trans. Netw. (ToN) 10(6), 721–734 (2002)

    Article  Google Scholar 

  14. Teixeira, A., Shames, I., Sandberg, H., Johansson, K.H.: A secure control framework for resource-limited adversaries. Automatica 51, 135–148 (2015)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

This work was partially sponsored by the EU-BR SecureCloud project (MCTI/ RNP 3rd Coordinated Call), by the Coordination for the Improvement of Higher Education Personnel (CAPES), grant 99999.008512/2014-0, and by FCT through project LaSIGE (UID/CEC/00408/2013).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alan Oliveira de Sá .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

de Sá, A.O., Casimiro, A., Machado, R.C.S., da Costa Carmo, L.F.R. (2019). Bio-inspired System Identification Attacks in Noisy Networked Control Systems. In: Compagnoni, A., Casey, W., Cai, Y., Mishra, B. (eds) Bio-inspired Information and Communication Technologies. BICT 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 289. Springer, Cham. https://doi.org/10.1007/978-3-030-24202-2_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-24202-2_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-24201-5

  • Online ISBN: 978-3-030-24202-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics