基于 SOS-LSTM 的 PHWR 核电机组一次回路隐蔽攻击

IF 5.4 2区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS
Yu Huang, Yan Cui, Tongkai Hao, Peng Zhang, Xi Sun, Xiaoyan Wang
{"title":"基于 SOS-LSTM 的 PHWR 核电机组一次回路隐蔽攻击","authors":"Yu Huang,&nbsp;Yan Cui,&nbsp;Tongkai Hao,&nbsp;Peng Zhang,&nbsp;Xi Sun,&nbsp;Xiaoyan Wang","doi":"10.1016/j.conengprac.2024.106082","DOIUrl":null,"url":null,"abstract":"<div><p>The ongoing advancement of industry and technology has led industrial control systems to evolve towards integration. System structures become increasingly complex, which renders them increasingly vulnerable to external attacks. Due to their clandestine and destructive character, covert attacks pose a significant threat to the secure operation of nuclear power unit control systems. In order to optimize the performance of control systems for nuclear power units, it is important to study the damage process caused by covert attacks on these systems. Facing the problem of obtaining high-precision estimation models of attack targets for covert attacks, this paper proposes a model estimation method based on long and short-term memory (LSTM) neural network and symbiotic organisms search (SOS) algorithm, which takes the feedback controller output and input signals of the attacking target as the dataset of the LSTM neural network, and optimizes the network parameters of the LSTM neural network using SOS algorithm to improve the accuracy of the model, and designs the covert attacker by obtaining the estimation model of the attacked area through training. The root mean square error of the estimation model for the primary loop of the nuclear power unit has been verified by comparative experiments to be reduced by at least 93.59%, 96.52%, and 91.11%, respectively, compared with the other methods. Loop experiment results concerning the covert attack for the primary loop of nuclear power unit illustrate that this attack method successfully meets the predefined objectives while maintaining high levels of stealthiness.</p></div>","PeriodicalId":50615,"journal":{"name":"Control Engineering Practice","volume":"153 ","pages":"Article 106082"},"PeriodicalIF":5.4000,"publicationDate":"2024-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Covert attacks for primary loops of PHWR nuclear power unit based on SOS-LSTM\",\"authors\":\"Yu Huang,&nbsp;Yan Cui,&nbsp;Tongkai Hao,&nbsp;Peng Zhang,&nbsp;Xi Sun,&nbsp;Xiaoyan Wang\",\"doi\":\"10.1016/j.conengprac.2024.106082\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>The ongoing advancement of industry and technology has led industrial control systems to evolve towards integration. System structures become increasingly complex, which renders them increasingly vulnerable to external attacks. Due to their clandestine and destructive character, covert attacks pose a significant threat to the secure operation of nuclear power unit control systems. In order to optimize the performance of control systems for nuclear power units, it is important to study the damage process caused by covert attacks on these systems. Facing the problem of obtaining high-precision estimation models of attack targets for covert attacks, this paper proposes a model estimation method based on long and short-term memory (LSTM) neural network and symbiotic organisms search (SOS) algorithm, which takes the feedback controller output and input signals of the attacking target as the dataset of the LSTM neural network, and optimizes the network parameters of the LSTM neural network using SOS algorithm to improve the accuracy of the model, and designs the covert attacker by obtaining the estimation model of the attacked area through training. The root mean square error of the estimation model for the primary loop of the nuclear power unit has been verified by comparative experiments to be reduced by at least 93.59%, 96.52%, and 91.11%, respectively, compared with the other methods. Loop experiment results concerning the covert attack for the primary loop of nuclear power unit illustrate that this attack method successfully meets the predefined objectives while maintaining high levels of stealthiness.</p></div>\",\"PeriodicalId\":50615,\"journal\":{\"name\":\"Control Engineering Practice\",\"volume\":\"153 \",\"pages\":\"Article 106082\"},\"PeriodicalIF\":5.4000,\"publicationDate\":\"2024-09-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Control Engineering Practice\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0967066124002417\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Control Engineering Practice","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0967066124002417","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

工业和技术的不断进步促使工业控制系统向集成化方向发展。系统结构变得越来越复杂,因而越来越容易受到外部攻击。由于其隐蔽性和破坏性,隐蔽攻击对核电机组控制系统的安全运行构成了重大威胁。为了优化核电机组控制系统的性能,研究隐蔽攻击对这些系统造成的破坏过程非常重要。面对如何获取隐蔽攻击目标高精度估计模型的问题,本文提出了一种基于长短期记忆(LSTM)神经网络和共生有机体搜索(SOS)算法的模型估计方法、该方法以攻击目标的反馈控制器输出和输入信号作为 LSTM 神经网络的数据集,利用 SOS 算法优化 LSTM 神经网络的网络参数以提高模型的精度,并通过训练获得被攻击区域的估计模型来设计隐蔽攻击者。经对比实验验证,与其他方法相比,核电机组一次回路估计模型的均方根误差至少分别降低了 93.59%、96.52% 和 91.11%。有关核电机组一次回路隐蔽攻击的回路实验结果表明,这种攻击方法在保持高度隐蔽性的同时,成功地达到了预定目标。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Covert attacks for primary loops of PHWR nuclear power unit based on SOS-LSTM

The ongoing advancement of industry and technology has led industrial control systems to evolve towards integration. System structures become increasingly complex, which renders them increasingly vulnerable to external attacks. Due to their clandestine and destructive character, covert attacks pose a significant threat to the secure operation of nuclear power unit control systems. In order to optimize the performance of control systems for nuclear power units, it is important to study the damage process caused by covert attacks on these systems. Facing the problem of obtaining high-precision estimation models of attack targets for covert attacks, this paper proposes a model estimation method based on long and short-term memory (LSTM) neural network and symbiotic organisms search (SOS) algorithm, which takes the feedback controller output and input signals of the attacking target as the dataset of the LSTM neural network, and optimizes the network parameters of the LSTM neural network using SOS algorithm to improve the accuracy of the model, and designs the covert attacker by obtaining the estimation model of the attacked area through training. The root mean square error of the estimation model for the primary loop of the nuclear power unit has been verified by comparative experiments to be reduced by at least 93.59%, 96.52%, and 91.11%, respectively, compared with the other methods. Loop experiment results concerning the covert attack for the primary loop of nuclear power unit illustrate that this attack method successfully meets the predefined objectives while maintaining high levels of stealthiness.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Control Engineering Practice
Control Engineering Practice 工程技术-工程:电子与电气
CiteScore
9.20
自引率
12.20%
发文量
183
审稿时长
44 days
期刊介绍: Control Engineering Practice strives to meet the needs of industrial practitioners and industrially related academics and researchers. It publishes papers which illustrate the direct application of control theory and its supporting tools in all possible areas of automation. As a result, the journal only contains papers which can be considered to have made significant contributions to the application of advanced control techniques. It is normally expected that practical results should be included, but where simulation only studies are available, it is necessary to demonstrate that the simulation model is representative of a genuine application. Strictly theoretical papers will find a more appropriate home in Control Engineering Practice''s sister publication, Automatica. It is also expected that papers are innovative with respect to the state of the art and are sufficiently detailed for a reader to be able to duplicate the main results of the paper (supplementary material, including datasets, tables, code and any relevant interactive material can be made available and downloaded from the website). The benefits of the presented methods must be made very clear and the new techniques must be compared and contrasted with results obtained using existing methods. Moreover, a thorough analysis of failures that may happen in the design process and implementation can also be part of the paper. The scope of Control Engineering Practice matches the activities of IFAC. Papers demonstrating the contribution of automation and control in improving the performance, quality, productivity, sustainability, resource and energy efficiency, and the manageability of systems and processes for the benefit of mankind and are relevant to industrial practitioners are most welcome.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信