File Download
  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Anomaly detection using isomorphic analysis for false data injection attacks in industrial control systems

TitleAnomaly detection using isomorphic analysis for false data injection attacks in industrial control systems
Authors
KeywordsAnomaly detection
False-data injection attacks
Industrial control systems
Secure control
Issue Date1-Sep-2024
PublisherElsevier
Citation
Journal of The Franklin Institute, 2024, v. 361, n. 13 How to Cite?
Abstract

As the Industrial Internet-of-Things (IIoT) evolves, a growing number of industrial control systems (ICSs) are connecting to the Internet, making them more vulnerable to malicious attacks. This paper addresses the detection of false data injection (FDI) attacks, a prevalent threat to open ICSs. We introduce an innovative anomaly detection technique using isomorphic analysis to safeguard ICSs against FDI attacks. Isomorphic analysis involves comparing transmitted signals with their expected values, which are derived from mathematical models or isomorphic components. For a comprehensive defense mechanism, we incorporate three specific detectors: the control signal detector, the actuating signal detector, and the sensor reading detector. Designed to detect FDI attacks across various parts of the ICS, these detectors ensure the integrity of all transmitted signals throughout the physical control system. While the control signal detector adopts a threshold method, the other two rely on statistical approaches. If an attack is detected, the detectors can correct tampered signals before they reach downstream components, enhancing the system's overall resilience and fault tolerance. The effectiveness of these detectors is supported by rigorous mathematical proofs. Moreover, our experimental findings further reveal the superiority of the isomorphic strategy over prior work in terms of detection rate, detection time delay, and system resilience.


Persistent Identifierhttp://hdl.handle.net/10722/353303
ISSN
2023 Impact Factor: 3.7
2023 SCImago Journal Rankings: 1.191
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorZhang, Xinchen-
dc.contributor.authorJiang, Zhihan-
dc.contributor.authorDing, Yulong-
dc.contributor.authorNgai, Edith C.H.-
dc.contributor.authorYang, Shuang-Hua-
dc.date.accessioned2025-01-17T00:35:28Z-
dc.date.available2025-01-17T00:35:28Z-
dc.date.issued2024-09-01-
dc.identifier.citationJournal of The Franklin Institute, 2024, v. 361, n. 13-
dc.identifier.issn0016-0032-
dc.identifier.urihttp://hdl.handle.net/10722/353303-
dc.description.abstract<p>As the Industrial Internet-of-Things (IIoT) evolves, a growing number of industrial control systems (ICSs) are connecting to the Internet, making them more vulnerable to malicious attacks. This paper addresses the detection of false data injection (FDI) attacks, a prevalent threat to open ICSs. We introduce an innovative anomaly detection technique using isomorphic analysis to safeguard ICSs against FDI attacks. Isomorphic analysis involves comparing transmitted signals with their expected values, which are derived from mathematical models or isomorphic components. For a comprehensive defense mechanism, we incorporate three specific detectors: the control signal detector, the actuating signal detector, and the sensor reading detector. Designed to detect FDI attacks across various parts of the ICS, these detectors ensure the integrity of all transmitted signals throughout the physical control system. While the control signal detector adopts a threshold method, the other two rely on statistical approaches. If an attack is detected, the detectors can correct tampered signals before they reach downstream components, enhancing the system's overall resilience and fault tolerance. The effectiveness of these detectors is supported by rigorous mathematical proofs. Moreover, our experimental findings further reveal the superiority of the isomorphic strategy over prior work in terms of detection rate, detection time delay, and system resilience.</p>-
dc.languageeng-
dc.publisherElsevier-
dc.relation.ispartofJournal of The Franklin Institute-
dc.subjectAnomaly detection-
dc.subjectFalse-data injection attacks-
dc.subjectIndustrial control systems-
dc.subjectSecure control-
dc.titleAnomaly detection using isomorphic analysis for false data injection attacks in industrial control systems-
dc.typeArticle-
dc.identifier.doi10.1016/j.jfranklin.2024.107000-
dc.identifier.scopuseid_2-s2.0-85197192455-
dc.identifier.volume361-
dc.identifier.issue13-
dc.identifier.eissn1879-2693-
dc.identifier.isiWOS:001265936300001-
dc.identifier.issnl0016-0032-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats