Detection of Multiplicative False Data Injection Cyberattacks on Process Control Systems via Randomized Control Mode Switching

Narasimhan, Shilpa and Ellis, Matthew J. and El-Farra, Nael H. (2024) Detection of Multiplicative False Data Injection Cyberattacks on Process Control Systems via Randomized Control Mode Switching. Processes, 12 (2). p. 327. ISSN 2227-9717

[thumbnail of processes-12-00327.pdf] Text
processes-12-00327.pdf - Published Version

Download (962kB)
[thumbnail of processes-12-00327.pdf] Text
processes-12-00327.pdf - Published Version

Download (962kB)

Abstract

A fundamental problem at the intersection of process control and operations is the design of detection schemes monitoring a process for cyberattacks using operational data. Multiplicative false data injection (FDI) attacks modify operational data with a multiplicative factor and could be designed to be detection evading without in-depth process knowledge. In a prior work, we presented a control mode switching strategy that enhances the detection of multiplicative FDI attacks in processes operating at steady state (when process states evolve within a small neighborhood of the steady state). Control mode switching on the attack-free process at steady-state may induce transients and generate false alarms in the detection scheme. To minimize false alarms, we subsequently developed a control mode switch-scheduling condition for processes with an invertible output matrix. In the current work, we utilize a reachable set-based detection scheme and use randomized control mode switches to augment attack detection capabilities. The detection scheme eliminates potential false alarms occurring from control mode switching, even for processes with a non-invertible output matrix, while the randomized switching helps bolster the confidentiality of the switching schedule, preventing the design of a detection-evading “smart” attack. We present two simulation examples to illustrate attack detection without false alarms, and the merits of randomized switching (compared with scheduled switching) for the detection of a smart attack.

Item Type: Article
Subjects: Asian STM > Multidisciplinary
Depositing User: Managing Editor
Date Deposited: 03 Feb 2024 10:57
Last Modified: 03 Feb 2024 10:57
URI: http://journal.send2sub.com/id/eprint/3093

Actions (login required)

View Item
View Item