DETERMINATION OF PARAMETERS OF STEALTHY CYBER ATTACKS ON CONTROL SYSTEMS OF CRITICAL INFRASTRUCTURE OBJECTS

Authors

DOI:

https://doi.org/10.20535/kpisn.2025.1.322905

Keywords:

Control Theory, Cybersecurity, Stealthy Attacks, Parameter Identification

Abstract

Background. The integration of industrial control systems with modern network technologies has led to a significant increase in cyber attacks targeting critical infrastructure. Detection and mitigation methods for such attacks remain underdeveloped, necessitating the advancement of mathematical frameworks capable of identifying attack parameters in such systems.

Objective. The objective of this study is to develop and investigate the parameters of a stealthy attack on a critical infrastructure control system. The attack serves as a testing tool for cybersecurity systems by evading standard fault detection mechanisms.

Methods. The industrial control system model is represented as a differential equation. Parameters of an additive attack on the control system are introduced. A fault detection criterion is defined. The problem of determining attack parameters is addressed using optimal state control methods, employing the Lagrangе functional and the gradient descent method.

Results. A new method and corresponding algorithm for identifying malicious control distortions using variational optimization and the fast gradient descent method are proposed. A computational experiment confirms the effectiveness of the proposed algorithm.

Conclusions. A stealthy attack aimed at modifying control signals in critical infrastructure management systems, capable of bypassing standard fault detectors, is examined. The proposed method and algorithm can be utilized in penetration testing to assess the security of automated control systems in industrial critical infrastructure. The algorithm’s functionality has been validated through computational experiments.

References

Y. Hu, H. Li, H. Yang, Y. Sun, L. Sun, and Z. Wang, "Detecting stealthy attacks against industrial control systems based on residual skewness analysis," EURASIP Journal on Wireless Communications and Networking, vol. 74, pp. 1–14, 2019, doi: https://doi.org/10.1186/s13638-019-1389-1

Y. Wang, M. C. Vuran, and S. Goddard, "Cyber-physical systems in industrial process control," ACM Sigbed Review, vol. 5, no. 1, pp. 1–2, 2008, doi: https://doi.org/10.1145/1366283.1366295 .

A. M. Mohan, N. Meskin, and H. Mehrjerdi, "A comprehensive review of the cyber-attacks and cyber-security on load frequency control of power systems," MDPI Energies, vol. 13, no. 3860, pp. 1–33, 2020. [Online]. Available: https://www.mdpi.com/1996-1073/13/15/3860 .

H. S. Sánchez, D. Rotondo, T. Escobet, V. Puig, and J. Quevedo, "Bibliographical review on cyber attacks from a control oriented perspective," Annual Reviews in Control, vol. 48, pp. 103–128, 2019, doi: https://doi.org/10.1016/j.arcontrol.2019.08.002 .

O. Novikov, M. Shreider, I. Stopochkina, M. Ilin, “Cyber Attacks Simulation for Modern Energy Facilities”, CEUR Workshop Proceedings. Selected Papers of the XXIII International Scientific and Practical Conference "Information Technologies and Security" (ITS 2023), vol.3887, pp. 35-49. [Online]. Available: https://ceur-ws.org/Vol-3887/ .

L. Alekseichuk, O. Novikov, A. Rodionov, and D. Yakobchuk, "Cyber security logical and probabilistic model of a critical infrastructure facility in the electric energy industry," Theoretical and Applied Cybersecurity, vol. 5, no. 1, pp. 61–66, 2023, doi: https://doi.org/10.20535/tacs.2664-29132023.1.287365 .

M. Syfert, A. Ordys, J. Maciej Koscielny, P. Wnuk, J. Mozaryn, and K. Kukielka, "Integrated approach to diagnostics of failures and cyber-attacks in industrial control systems," MDPI Energies, vol. 15, no. 17, pp. 1–24, 2022, doi: https://doi.org/10.3390/en15176212 .

A. A. Cardenas, S. Amin, B. Sinopoli, A. Giani, A. Perrig, and S. Sastry, "Challenges for securing cyber physical systems," DHS, July 2009. [Online]. Available: https://ptolemy.berkeley.edu/projects/chess/pubs/601.html .

Y. Mo and B. Sinopoli, "Secure control against replay attacks," in 47th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, USA, Sept. 30 – Oct. 2, 2009, pp. 911–918, doi: https://doi.org/10.1109/Allerton16076.2009 .

A. Cooper, A. Bretas, and S. Meyn, "Anomaly detection in power system state estimation: Review and new directions," MDPI Energies, vol. 16, no. 18, pp. 1–15, 2023. [Online]. Available: https://www.mdpi.com/1996-1073/16/18/6678 .

A. Sztyber-Betley, M. Syfert, J. Maciej Koscielny, and Z. Gorecka, "Controller cyber-attack detection and isolation," MDPI Sensors, vol. 23, no. 5, pp. 1–27, 2023, doi: https://doi.org/10.3390/s23052778 .

D. E. Kirk, Optimal Control Theory: An Introduction. Mineola, NY, USA: Dover Publications, Inc., 2004, p. 443. [Online]. Available: https://books.google.com.ua/books?id=fCh2SAtWIdwC&printsec=copyright&redir_esc=y#v=onepage&q&f=false .

W. H. Ray, Advanced Process Control. New York, NY, USA: McGraw-Hill Book Company, 1981, p. 376. [Online]. Available: https://books.google.com.ua/books/about/Advanced_Process_Control.html?id=-7tTAAAAMAAJ&redir_esc=y .

A. P. Sage and C. C. White III, Optimum Systems Control. New Jersey, USA: Prentice-Hall, 1977, p. 413. [Online]. Available: https://www.semanticscholar.org/paper/Optimum-systems-control%3A-by-A.-P.-Sage-and-C.-C.-Eslami/83d44a3e6cd41f834a99209a671a248dfef12634#citing-papers .

Published

2025-04-24