Anil Kumar Badavath, Y. V. Hote, Avinash Singh, Bhawna Jain
{"title":"通过系统识别检测和缓解网络攻击","authors":"Anil Kumar Badavath, Y. V. Hote, Avinash Singh, Bhawna Jain","doi":"10.1109/ICPS55917.2022.00024","DOIUrl":null,"url":null,"abstract":"In this paper, conventional controllers, PI and PID are used to counter various types of cyber-attacks such as Gain attack and Man-in-the-middle (MITM) or deception attack. In this ARX estimator is used to estimate new plant dynamics. This ARX estimator is invoked by an attack detector, which works on safety band theory. The overall plant dynamics obtained by ARX estimator is used to compute conventional controllers gains for compensator. This new compensator will mitigate the after effects of cyber-attacks on the plant and makes the plant to operate normally. The validation of the proposed approach is carried out on the servo system and simulated in MATLAB-SIMULINK environment.","PeriodicalId":263404,"journal":{"name":"2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cyber Attack Detection and Mitigation Through System Identification\",\"authors\":\"Anil Kumar Badavath, Y. V. Hote, Avinash Singh, Bhawna Jain\",\"doi\":\"10.1109/ICPS55917.2022.00024\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, conventional controllers, PI and PID are used to counter various types of cyber-attacks such as Gain attack and Man-in-the-middle (MITM) or deception attack. In this ARX estimator is used to estimate new plant dynamics. This ARX estimator is invoked by an attack detector, which works on safety band theory. The overall plant dynamics obtained by ARX estimator is used to compute conventional controllers gains for compensator. This new compensator will mitigate the after effects of cyber-attacks on the plant and makes the plant to operate normally. The validation of the proposed approach is carried out on the servo system and simulated in MATLAB-SIMULINK environment.\",\"PeriodicalId\":263404,\"journal\":{\"name\":\"2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICPS55917.2022.00024\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICPS55917.2022.00024","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cyber Attack Detection and Mitigation Through System Identification
In this paper, conventional controllers, PI and PID are used to counter various types of cyber-attacks such as Gain attack and Man-in-the-middle (MITM) or deception attack. In this ARX estimator is used to estimate new plant dynamics. This ARX estimator is invoked by an attack detector, which works on safety band theory. The overall plant dynamics obtained by ARX estimator is used to compute conventional controllers gains for compensator. This new compensator will mitigate the after effects of cyber-attacks on the plant and makes the plant to operate normally. The validation of the proposed approach is carried out on the servo system and simulated in MATLAB-SIMULINK environment.