Xiangming Wang;Yang Liu;Nanpeng Yu;Pengfei Liu;Nanyi Deng;Yanan Li;Ting Liu
{"title":"基于被动故障安全偏差的现场总线网络物理入侵攻击检测","authors":"Xiangming Wang;Yang Liu;Nanpeng Yu;Pengfei Liu;Nanyi Deng;Yanan Li;Ting Liu","doi":"10.1109/TASE.2025.3556720","DOIUrl":null,"url":null,"abstract":"Fieldbus is widely used for real-time distributed control in Industrial Control Systems (ICSs) due to its simplicity and stability. The real-world fieldbus network contains hundreds of interconnected devices, presenting a widespread network layout. Attackers can attach external intrusion devices to these communication lines to launch various attacks. In this paper, we model the fieldbus network’s channel fingerprint based on the signal’s amplitude and propose a detection method to identify potential attackers (silent intrusion devices that are eavesdropping) via channel fingerprint differences. Leveraging the passive fail-safe biasing voltage in the fieldbus network such as RS485, we can still detect the intrusion device when the fieldbus is idle (i.e., no devices are transmitting commands), which can significantly reduce the detection delay with lower sampling costs. Moreover, our method can adapt to environmental changes with little computational overhead by generating dynamic thresholds. Using a monitoring unit with stored channel fingerprints, our method can be easily deployed in fieldbus networks without occupying communication resources. The effectiveness and robustness of the proposed method have been demonstrated via extensive experiments on two real-world scenarios and one simulation scenario, where we can achieve 100% accuracy and 0% false alarm rates against various intrusion devices. Note to Practitioners—This paper is motivated by a practical need for detecting unauthorized intrusion devices in fieldbus networks. Existing detection methods face several challenges: active detection methods based on traffic analysis may disrupt normal bus communication, and it is hard to identify silent intrusion devices that are eavesdropping. Moreover, adapting these methods to changing environments is still challenging and costly. To address these issues, we leverage the inevitable amplitude differences in fail-safe biasing voltage signals and benign devices’ communication voltage signals to detect intrusion devices passively. Furthermore, to adapt to rapidly changing environments, we generate the detection thresholds dynamically based on the hypothesis testing theory. Extensive physical and simulation experiments demonstrate that the detection method against physical intrusion attacks is accurate and robust.","PeriodicalId":51060,"journal":{"name":"IEEE Transactions on Automation Science and Engineering","volume":"22 ","pages":"14008-14019"},"PeriodicalIF":6.4000,"publicationDate":"2025-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Physical Intrusion Attack Detection in Fieldbus Network With Passive Fail-Safe Biasing\",\"authors\":\"Xiangming Wang;Yang Liu;Nanpeng Yu;Pengfei Liu;Nanyi Deng;Yanan Li;Ting Liu\",\"doi\":\"10.1109/TASE.2025.3556720\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Fieldbus is widely used for real-time distributed control in Industrial Control Systems (ICSs) due to its simplicity and stability. The real-world fieldbus network contains hundreds of interconnected devices, presenting a widespread network layout. Attackers can attach external intrusion devices to these communication lines to launch various attacks. In this paper, we model the fieldbus network’s channel fingerprint based on the signal’s amplitude and propose a detection method to identify potential attackers (silent intrusion devices that are eavesdropping) via channel fingerprint differences. Leveraging the passive fail-safe biasing voltage in the fieldbus network such as RS485, we can still detect the intrusion device when the fieldbus is idle (i.e., no devices are transmitting commands), which can significantly reduce the detection delay with lower sampling costs. Moreover, our method can adapt to environmental changes with little computational overhead by generating dynamic thresholds. Using a monitoring unit with stored channel fingerprints, our method can be easily deployed in fieldbus networks without occupying communication resources. The effectiveness and robustness of the proposed method have been demonstrated via extensive experiments on two real-world scenarios and one simulation scenario, where we can achieve 100% accuracy and 0% false alarm rates against various intrusion devices. Note to Practitioners—This paper is motivated by a practical need for detecting unauthorized intrusion devices in fieldbus networks. Existing detection methods face several challenges: active detection methods based on traffic analysis may disrupt normal bus communication, and it is hard to identify silent intrusion devices that are eavesdropping. Moreover, adapting these methods to changing environments is still challenging and costly. To address these issues, we leverage the inevitable amplitude differences in fail-safe biasing voltage signals and benign devices’ communication voltage signals to detect intrusion devices passively. Furthermore, to adapt to rapidly changing environments, we generate the detection thresholds dynamically based on the hypothesis testing theory. Extensive physical and simulation experiments demonstrate that the detection method against physical intrusion attacks is accurate and robust.\",\"PeriodicalId\":51060,\"journal\":{\"name\":\"IEEE Transactions on Automation Science and Engineering\",\"volume\":\"22 \",\"pages\":\"14008-14019\"},\"PeriodicalIF\":6.4000,\"publicationDate\":\"2025-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Automation Science and Engineering\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10947044/\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Automation Science and Engineering","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10947044/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
Physical Intrusion Attack Detection in Fieldbus Network With Passive Fail-Safe Biasing
Fieldbus is widely used for real-time distributed control in Industrial Control Systems (ICSs) due to its simplicity and stability. The real-world fieldbus network contains hundreds of interconnected devices, presenting a widespread network layout. Attackers can attach external intrusion devices to these communication lines to launch various attacks. In this paper, we model the fieldbus network’s channel fingerprint based on the signal’s amplitude and propose a detection method to identify potential attackers (silent intrusion devices that are eavesdropping) via channel fingerprint differences. Leveraging the passive fail-safe biasing voltage in the fieldbus network such as RS485, we can still detect the intrusion device when the fieldbus is idle (i.e., no devices are transmitting commands), which can significantly reduce the detection delay with lower sampling costs. Moreover, our method can adapt to environmental changes with little computational overhead by generating dynamic thresholds. Using a monitoring unit with stored channel fingerprints, our method can be easily deployed in fieldbus networks without occupying communication resources. The effectiveness and robustness of the proposed method have been demonstrated via extensive experiments on two real-world scenarios and one simulation scenario, where we can achieve 100% accuracy and 0% false alarm rates against various intrusion devices. Note to Practitioners—This paper is motivated by a practical need for detecting unauthorized intrusion devices in fieldbus networks. Existing detection methods face several challenges: active detection methods based on traffic analysis may disrupt normal bus communication, and it is hard to identify silent intrusion devices that are eavesdropping. Moreover, adapting these methods to changing environments is still challenging and costly. To address these issues, we leverage the inevitable amplitude differences in fail-safe biasing voltage signals and benign devices’ communication voltage signals to detect intrusion devices passively. Furthermore, to adapt to rapidly changing environments, we generate the detection thresholds dynamically based on the hypothesis testing theory. Extensive physical and simulation experiments demonstrate that the detection method against physical intrusion attacks is accurate and robust.
期刊介绍:
The IEEE Transactions on Automation Science and Engineering (T-ASE) publishes fundamental papers on Automation, emphasizing scientific results that advance efficiency, quality, productivity, and reliability. T-ASE encourages interdisciplinary approaches from computer science, control systems, electrical engineering, mathematics, mechanical engineering, operations research, and other fields. T-ASE welcomes results relevant to industries such as agriculture, biotechnology, healthcare, home automation, maintenance, manufacturing, pharmaceuticals, retail, security, service, supply chains, and transportation. T-ASE addresses a research community willing to integrate knowledge across disciplines and industries. For this purpose, each paper includes a Note to Practitioners that summarizes how its results can be applied or how they might be extended to apply in practice.