Yu Huang, Yan Cui, Tongkai Hao, Peng Zhang, Xi Sun, Xiaoyan Wang
{"title":"Covert attacks for primary loops of PHWR nuclear power unit based on SOS-LSTM","authors":"Yu Huang, Yan Cui, Tongkai Hao, Peng Zhang, Xi Sun, Xiaoyan Wang","doi":"10.1016/j.conengprac.2024.106082","DOIUrl":null,"url":null,"abstract":"<div><p>The ongoing advancement of industry and technology has led industrial control systems to evolve towards integration. System structures become increasingly complex, which renders them increasingly vulnerable to external attacks. Due to their clandestine and destructive character, covert attacks pose a significant threat to the secure operation of nuclear power unit control systems. In order to optimize the performance of control systems for nuclear power units, it is important to study the damage process caused by covert attacks on these systems. Facing the problem of obtaining high-precision estimation models of attack targets for covert attacks, this paper proposes a model estimation method based on long and short-term memory (LSTM) neural network and symbiotic organisms search (SOS) algorithm, which takes the feedback controller output and input signals of the attacking target as the dataset of the LSTM neural network, and optimizes the network parameters of the LSTM neural network using SOS algorithm to improve the accuracy of the model, and designs the covert attacker by obtaining the estimation model of the attacked area through training. The root mean square error of the estimation model for the primary loop of the nuclear power unit has been verified by comparative experiments to be reduced by at least 93.59%, 96.52%, and 91.11%, respectively, compared with the other methods. Loop experiment results concerning the covert attack for the primary loop of nuclear power unit illustrate that this attack method successfully meets the predefined objectives while maintaining high levels of stealthiness.</p></div>","PeriodicalId":50615,"journal":{"name":"Control Engineering Practice","volume":"153 ","pages":"Article 106082"},"PeriodicalIF":5.4000,"publicationDate":"2024-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Control Engineering Practice","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0967066124002417","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
The ongoing advancement of industry and technology has led industrial control systems to evolve towards integration. System structures become increasingly complex, which renders them increasingly vulnerable to external attacks. Due to their clandestine and destructive character, covert attacks pose a significant threat to the secure operation of nuclear power unit control systems. In order to optimize the performance of control systems for nuclear power units, it is important to study the damage process caused by covert attacks on these systems. Facing the problem of obtaining high-precision estimation models of attack targets for covert attacks, this paper proposes a model estimation method based on long and short-term memory (LSTM) neural network and symbiotic organisms search (SOS) algorithm, which takes the feedback controller output and input signals of the attacking target as the dataset of the LSTM neural network, and optimizes the network parameters of the LSTM neural network using SOS algorithm to improve the accuracy of the model, and designs the covert attacker by obtaining the estimation model of the attacked area through training. The root mean square error of the estimation model for the primary loop of the nuclear power unit has been verified by comparative experiments to be reduced by at least 93.59%, 96.52%, and 91.11%, respectively, compared with the other methods. Loop experiment results concerning the covert attack for the primary loop of nuclear power unit illustrate that this attack method successfully meets the predefined objectives while maintaining high levels of stealthiness.
期刊介绍:
Control Engineering Practice strives to meet the needs of industrial practitioners and industrially related academics and researchers. It publishes papers which illustrate the direct application of control theory and its supporting tools in all possible areas of automation. As a result, the journal only contains papers which can be considered to have made significant contributions to the application of advanced control techniques. It is normally expected that practical results should be included, but where simulation only studies are available, it is necessary to demonstrate that the simulation model is representative of a genuine application. Strictly theoretical papers will find a more appropriate home in Control Engineering Practice''s sister publication, Automatica. It is also expected that papers are innovative with respect to the state of the art and are sufficiently detailed for a reader to be able to duplicate the main results of the paper (supplementary material, including datasets, tables, code and any relevant interactive material can be made available and downloaded from the website). The benefits of the presented methods must be made very clear and the new techniques must be compared and contrasted with results obtained using existing methods. Moreover, a thorough analysis of failures that may happen in the design process and implementation can also be part of the paper.
The scope of Control Engineering Practice matches the activities of IFAC.
Papers demonstrating the contribution of automation and control in improving the performance, quality, productivity, sustainability, resource and energy efficiency, and the manageability of systems and processes for the benefit of mankind and are relevant to industrial practitioners are most welcome.