Skip to main content

2018 | OriginalPaper | Buchkapitel

A Game-Based Framework Towards Cyber-Attacks on State Estimation in ICSs

verfasst von : Cong Chen, Dongdai Lin, Wei Zhang, Xiaojun Zhou

Erschienen in: Information Security and Cryptology

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The security issue on remote state estimation process against false data injection (FDI) attacks in Industrial Control Systems (ICSs) is considered in this paper. To be practically, it is more reasonable to assume whether or not a meter measurement could be compromised by an adversary does depend on the defense budget deployed on it by the system defender. Based on this premise, this paper focuses on designing the defense budget strategy to protect state estimation process in ICSs against FDI attacks by applying a game-based framework. With resource-constraints for both the defender and the attacker side, the decision making process of how to deploy the defending budget for defenders and how to launch attacks on the meters for an attacker are investigated. A game-based framework is formulated and it has been proved that the Nash equilibrium is existed. For practical computation convenience, an on-line updating algorithm is proposed. What’s more, the simulation of the game-based framework described in this paper is demonstrated to verify its validity and efficiency. The experimental results have shown that the game-based framework could improve performance of the decision making and estimation process and mitigate the impact of the FDI attack. This may provide a novel and feasible perspective to protect the state estimation process and improve the intrusion tolerance in ICSs.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Clark, A., Zhu, Q., Poovendran, R., Başar, T.: An impact-aware defense against stuxnet. In: 2013 American Control Conference, pp. 4140–4147. IEEE (2013) Clark, A., Zhu, Q., Poovendran, R., Başar, T.: An impact-aware defense against stuxnet. In: 2013 American Control Conference, pp. 4140–4147. IEEE (2013)
2.
Zurück zum Zitat Cheminod, M., Durante, L., Valenzano, A.: Review of security issues in industrial networks. IEEE Trans. Industr. Inf. 9(1), 277–293 (2013)CrossRef Cheminod, M., Durante, L., Valenzano, A.: Review of security issues in industrial networks. IEEE Trans. Industr. Inf. 9(1), 277–293 (2013)CrossRef
3.
Zurück zum Zitat Stouffer, K., Falco, J., Scarfone, K.: Guide to industrial control systems (ICS) security. NIST Spec. Publ. 800(82), 16–16 (2011) Stouffer, K., Falco, J., Scarfone, K.: Guide to industrial control systems (ICS) security. NIST Spec. Publ. 800(82), 16–16 (2011)
5.
Zurück zum Zitat Byres, E., Ginter, A., Langill, J.: How stuxnet spreads-a study of infection paths in best practice systems. Tofino Security, White paper (2011) Byres, E., Ginter, A., Langill, J.: How stuxnet spreads-a study of infection paths in best practice systems. Tofino Security, White paper (2011)
6.
Zurück zum Zitat Falliere, N., Murchu, L.O., Chien, E.: W32. Stuxnet Dossier. White paper, Symantec Corp., Security Response, 5, 6 (2011) Falliere, N., Murchu, L.O., Chien, E.: W32. Stuxnet Dossier. White paper, Symantec Corp., Security Response, 5, 6 (2011)
7.
Zurück zum Zitat Albright, D., Brannan, P., Walrond, C.: Did Stuxnet Take Out 1,000 Centrifuges at the Natanz Enrichment Plant? Institute for Science and International Security (2010) Albright, D., Brannan, P., Walrond, C.: Did Stuxnet Take Out 1,000 Centrifuges at the Natanz Enrichment Plant? Institute for Science and International Security (2010)
9.
Zurück zum Zitat Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(1), 13 (2011)CrossRef Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(1), 13 (2011)CrossRef
10.
Zurück zum Zitat Teixeira, A., Amin, S., Sandberg, H., Johansson, K.H., Sastry, S.S.: Cyber security analysis of state estimators in electric power systems. In: 49th IEEE Conference on Decision and Control (CDC), pp. 5991–5998. IEEE (2010) Teixeira, A., Amin, S., Sandberg, H., Johansson, K.H., Sastry, S.S.: Cyber security analysis of state estimators in electric power systems. In: 49th IEEE Conference on Decision and Control (CDC), pp. 5991–5998. IEEE (2010)
11.
Zurück zum Zitat Mo, Y., Sinopoli, B.: Secure control against replay attacks. In: 47th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2009, pp. 911–918. IEEE (2009) Mo, Y., Sinopoli, B.: Secure control against replay attacks. In: 47th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2009, pp. 911–918. IEEE (2009)
12.
Zurück zum Zitat Smith, R.S.: A decoupled feedback structure for covertly appropriating networked control systems. IFAC Proc. Volumes 44(1), 90–95 (2011)CrossRef Smith, R.S.: A decoupled feedback structure for covertly appropriating networked control systems. IFAC Proc. Volumes 44(1), 90–95 (2011)CrossRef
13.
Zurück zum Zitat Krotofil, M., Cárdenas, Á.A.: Is this a good time?: Deciding when to launch attacks on process control systems. In: Proceedings of the 3rd International Conference on High Confidence Networked Systems, pp. 65–66. ACM (2014) Krotofil, M., Cárdenas, Á.A.: Is this a good time?: Deciding when to launch attacks on process control systems. In: Proceedings of the 3rd International Conference on High Confidence Networked Systems, pp. 65–66. ACM (2014)
14.
Zurück zum Zitat Krotofil, M., Cardenas, A., Larsen, J., Gollmann, D.: Vulnerabilities of cyber-physical systems to stale data–determining the optimal time to launch attacks. Int. J. Crit. Infrastruct. Prot. 7(4), 213–232 (2014)CrossRef Krotofil, M., Cardenas, A., Larsen, J., Gollmann, D.: Vulnerabilities of cyber-physical systems to stale data–determining the optimal time to launch attacks. Int. J. Crit. Infrastruct. Prot. 7(4), 213–232 (2014)CrossRef
15.
Zurück zum Zitat Zhang, H., Cheng, P., Shi, L., Chen, J.: Optimal dos attack scheduling in wireless networked control system. IEEE Trans. Control Syst. Technol. 24(3), 843–852 (2016)CrossRef Zhang, H., Cheng, P., Shi, L., Chen, J.: Optimal dos attack scheduling in wireless networked control system. IEEE Trans. Control Syst. Technol. 24(3), 843–852 (2016)CrossRef
16.
Zurück zum Zitat Pasqualetti, F., Dörfler, F., Bullo, F.: Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Control 58(11), 2715–2729 (2013)MathSciNetCrossRefMATH Pasqualetti, F., Dörfler, F., Bullo, F.: Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Control 58(11), 2715–2729 (2013)MathSciNetCrossRefMATH
17.
Zurück zum Zitat Krotofil, M., Larsen, J., Gollmann, D.: The process matters: ensuring data veracity in cyber-physical systems. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, pp. 133–144. ACM (2015) Krotofil, M., Larsen, J., Gollmann, D.: The process matters: ensuring data veracity in cyber-physical systems. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, pp. 133–144. ACM (2015)
18.
Zurück zum Zitat Bobba, R.B., Rogers, K.M., Wang, Q., Khurana, H., Nahrstedt, K., Overbye, T.J.: Detecting false data injection attacks on DC state estimation. In: Preprints of the First Workshop on Secure Control Systems, CPSWEEK, vol. 2010 (2010) Bobba, R.B., Rogers, K.M., Wang, Q., Khurana, H., Nahrstedt, K., Overbye, T.J.: Detecting false data injection attacks on DC state estimation. In: Preprints of the First Workshop on Secure Control Systems, CPSWEEK, vol. 2010 (2010)
19.
Zurück zum Zitat Kim, T.T., Vincent Poor, H.: Strategic protection against data injection attacks on power grids. IEEE Trans. Smart Grid 2(2), 326–333 (2011)CrossRef Kim, T.T., Vincent Poor, H.: Strategic protection against data injection attacks on power grids. IEEE Trans. Smart Grid 2(2), 326–333 (2011)CrossRef
20.
Zurück zum Zitat Jia, L., Thomas, R.J., Tong, L.: Impacts of malicious data on real-time price of electricity market operations. In: 2012 45th Hawaii International Conference on System Science (HICSS), pp. 1907–1914. IEEE (2012) Jia, L., Thomas, R.J., Tong, L.: Impacts of malicious data on real-time price of electricity market operations. In: 2012 45th Hawaii International Conference on System Science (HICSS), pp. 1907–1914. IEEE (2012)
21.
Zurück zum Zitat Bhattacharya, S., Başar, T.: Game-theoretic analysis of an aerial jamming attack on a UAV communication network. In: Proceedings of the 2010 American Control Conference, pp. 818–823. IEEE (2010) Bhattacharya, S., Başar, T.: Game-theoretic analysis of an aerial jamming attack on a UAV communication network. In: Proceedings of the 2010 American Control Conference, pp. 818–823. IEEE (2010)
22.
Zurück zum Zitat Roy, S., Ellis, C., Shiva, S., Dasgupta, D., Shandilya, V., Wu, Q.: A survey of game theory as applied to network security. In: 2010 43rd Hawaii International Conference on System Sciences (HICSS), pp. 1–10. IEEE (2010) Roy, S., Ellis, C., Shiva, S., Dasgupta, D., Shandilya, V., Wu, Q.: A survey of game theory as applied to network security. In: 2010 43rd Hawaii International Conference on System Sciences (HICSS), pp. 1–10. IEEE (2010)
23.
Zurück zum Zitat Kashyap, A., Basar, T., Srikant, R.: Correlated jamming on mimo Gaussian fading channels. IEEE Trans. Inf. Theory 50(9), 2119–2123 (2004)MathSciNetCrossRefMATH Kashyap, A., Basar, T., Srikant, R.: Correlated jamming on mimo Gaussian fading channels. IEEE Trans. Inf. Theory 50(9), 2119–2123 (2004)MathSciNetCrossRefMATH
24.
Zurück zum Zitat Gupta, A., Langbort, C., Başar, T.: Optimal control in the presence of an intelligent jammer with limited actions. In: 49th IEEE Conference on Decision and Control (CDC), pp. 1096–1101. IEEE (2010) Gupta, A., Langbort, C., Başar, T.: Optimal control in the presence of an intelligent jammer with limited actions. In: 49th IEEE Conference on Decision and Control (CDC), pp. 1096–1101. IEEE (2010)
25.
Zurück zum Zitat Agah, A., Das, S.K., Basu, K.: A game theory based approach for security in wireless sensor networks. In: 2004 IEEE International Conference on Performance, Computing, and Communications, pp. 259–263. IEEE (2004) Agah, A., Das, S.K., Basu, K.: A game theory based approach for security in wireless sensor networks. In: 2004 IEEE International Conference on Performance, Computing, and Communications, pp. 259–263. IEEE (2004)
26.
Zurück zum Zitat Li, Y., Shi, L., Cheng, P., Chen, J., Quevedo, D.E.: Jamming attacks on remote state estimation in cyber-physical systems: a game-theoretic approach. IEEE Trans. Autom. Control 60(10), 2831–2836 (2015)MathSciNetCrossRefMATH Li, Y., Shi, L., Cheng, P., Chen, J., Quevedo, D.E.: Jamming attacks on remote state estimation in cyber-physical systems: a game-theoretic approach. IEEE Trans. Autom. Control 60(10), 2831–2836 (2015)MathSciNetCrossRefMATH
27.
Zurück zum Zitat Li, Y., Quevedo, D.E., Dey, S., Shi, L.: Sinr-based DoS attack on remote state estimation: a game-theoretic approach (2016) Li, Y., Quevedo, D.E., Dey, S., Shi, L.: Sinr-based DoS attack on remote state estimation: a game-theoretic approach (2016)
28.
Zurück zum Zitat Ekneligoda, N.C., Weaver, W.W.: A game theoretic bus selection method for loads in multibus DC power systems. IEEE Trans. Industr. Electron. 61(4), 1669–1678 (2014)CrossRef Ekneligoda, N.C., Weaver, W.W.: A game theoretic bus selection method for loads in multibus DC power systems. IEEE Trans. Industr. Electron. 61(4), 1669–1678 (2014)CrossRef
30.
Zurück zum Zitat Wood, A.J., Wollenberg, B.F.: Power Generation, Operation, and Control. Wiley, New York (2012) Wood, A.J., Wollenberg, B.F.: Power Generation, Operation, and Control. Wiley, New York (2012)
31.
Zurück zum Zitat Anderson, B.D.O., Moore, J.B.: Optimal filtering. Courier Corporation (2012) Anderson, B.D.O., Moore, J.B.: Optimal filtering. Courier Corporation (2012)
32.
Zurück zum Zitat Li, Y., Shi, L., Cheng, P., Chen, J., Quevedo, D.E.: Jamming attack on cyber-physical systems: a game-theoretic approach. In: 2013 IEEE 3rd Annual International Conference on Cyber Technology in Automation, Control and Intelligent Systems (CYBER), pp. 252–257. IEEE (2013) Li, Y., Shi, L., Cheng, P., Chen, J., Quevedo, D.E.: Jamming attack on cyber-physical systems: a game-theoretic approach. In: 2013 IEEE 3rd Annual International Conference on Cyber Technology in Automation, Control and Intelligent Systems (CYBER), pp. 252–257. IEEE (2013)
33.
Zurück zum Zitat Shi, L., Epstein, M., Murray, R.M.: Kalman filtering over a packet-dropping network: a probabilistic perspective. IEEE Trans. Autom. Control 55(3), 594–604 (2010)MathSciNetCrossRefMATH Shi, L., Epstein, M., Murray, R.M.: Kalman filtering over a packet-dropping network: a probabilistic perspective. IEEE Trans. Autom. Control 55(3), 594–604 (2010)MathSciNetCrossRefMATH
34.
Zurück zum Zitat Deng, R., Xiao, G., Rongxing, L.: Defending against false data injection attacks on power system state estimation. IEEE Trans. Industr. Inf. 13(1), 198–207 (2017)CrossRef Deng, R., Xiao, G., Rongxing, L.: Defending against false data injection attacks on power system state estimation. IEEE Trans. Industr. Inf. 13(1), 198–207 (2017)CrossRef
35.
Zurück zum Zitat Gibbons, R.: A Primer in Game Theory. Harvester Wheatsheaf, New York (1992)MATH Gibbons, R.: A Primer in Game Theory. Harvester Wheatsheaf, New York (1992)MATH
Metadaten
Titel
A Game-Based Framework Towards Cyber-Attacks on State Estimation in ICSs
verfasst von
Cong Chen
Dongdai Lin
Wei Zhang
Xiaojun Zhou
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-75160-3_20

Premium Partner