Netinfo Security ›› 2022, Vol. 22 ›› Issue (12): 34-46.doi: 10.3969/j.issn.1671-1122.2022.12.005

Previous Articles     Next Articles

Defense Research of High-Hidden Data Attack in Industry Control System

XU Ruzhi1, LYU Changran1(), LONG Yan2, LIU Yuanbin1   

  1. 1. School of Control and Computer Engineering, North China Electric Power University, Beijing 102206, China
    2. State Power Investment Group Digital Technology Co., Ltd., Beijing 100080, China
  • Received:2022-07-01 Online:2022-12-10 Published:2022-12-30
  • Contact: LYU Changran E-mail:120212227100@ncepu.edu.cn

Abstract:

Industrial control systems (ICS) is the key infrastructure in the industrial production process. Attackers attack multiple devices at the same time. This kind of data attack can aggravate the disorder of the system. In view of the data attacks in industrial control systems, this paper improved the process-aware stealthy-attack detection mechanism (PASAD), and proposed a robust principal component analysis and process-aware hidden attack detection algorithm(RPCA-PASAD) suitable for multivariate environments. Firstly, this paper used pearson correlation coefficient to divide the strongly correlated data into the same cluster, and magnifies the abnormal data. In this paper, RPCA was used to reduce and de-noise the data, and the de-noised data was embedded into the Hankel matrix. Secondly, this paper used the properties of the projection matrix to analyze the internal relationship between the denoised data to obtain the center of the system’s steady state data. At last, this paper used the least squares method to quantify the data and obtain the threshold for judging whether the data was abnormal. Simulation tests are carried out with the tennessee eastman (TE) process model and the secure water treatment (SWaT) model. The experimental results show that the detection algorithm in this paper is suitable for multivariate malicious data attack detection environment. The impact of the results has a strong real-time detection of hidden data attacks and a low false alarm rate, and can be efficiently deployed in the supervisory control and data acquisition (SCADA) host and programmable logic controller (PLC). It is of great significance for industrial control systems to reduce losses in production and life.

Key words: industrial control system, anomaly detection, hidden data attack

CLC Number: