Model Predictive Control with adaptive resilience for Denial-of-Service Attacks mitigation on a Regulated Dam (2402.18516v1)
Abstract: In recent years, SCADA (Supervisory Control and Data Acquisition) systems have increasingly become the target of cyber attacks. SCADAs are no longer isolated, as web-based applications expose strategic infrastructures to the outside world connection. In a cyber-warfare context, we propose a Model Predictive Control (MPC) architecture with adaptive resilience, capable of guaranteeing control performance in normal operating conditions and driving towards resilience against DoS (controller-actuator) attacks when needed. Since the attackers' goal is typically to maximize the system damage, we assume they solve an adversarial optimal control problem. An adaptive resilience factor is then designed as a function of the intensity function of a Hawkes process, a point process model estimating the occurrence of random events in time, trained on a moving window to estimate the return time of the next attack. We demonstrate the resulting MPC strategy's effectiveness in 2 attack scenarios on a real system with actual data, the regulated Olginate dam of Lake Como.
- Z. Drias, A. Serhrouchni, and O. Vogel, “Analysis of cyber security for industrial control systems,” in 2015 international conference on cyber security of smart cities, industrial control system and communications (ssic). IEEE, 2015, pp. 1–8.
- R. Gandhi, A. Sharma, W. Mahoney, W. Sousan, Q. Zhu, and P. Laplante, “Dimensions of cyber-attacks: Cultural, social, economic, and political,” IEEE Technology and Society Magazine, vol. 30, no. 1, pp. 28–38, 2011.
- M. Rudner, “Cyber-threats to critical national infrastructure: An intelligence challenge,” International Journal of Intelligence and CounterIntelligence, vol. 26, no. 3, pp. 453–481, 2013.
- P. Lis and J. Mendel, “Cyberattacks on critical infrastructure: An economic perspective,” Economics and Business Review, vol. 5, no. 2, pp. 24–47, 2019.
- E. Irmak and İ. Erkek, “An overview of cyber-attack vectors on scada systems,” in 2018 6th international symposium on digital forensic and security (ISDFS). IEEE, 2018, pp. 1–5.
- D. Du, R. Chen, X. Li, L. Wu, P. Zhou, and M. Fei, “Malicious data deception attacks against power systems: A new case and its detection method,” Transactions of the Institute of Measurement and Control, vol. 41, no. 6, pp. 1590–1599, 2019.
- J. D. Markovic-Petrovic and M. D. Stojanovic, “Analysis of scada system vulnerabilities to ddos attacks,” in 2013 11th international conference on telecommunications in modern satellite, cable and broadcasting services (telsiks), vol. 2. IEEE, 2013, pp. 591–594.
- R. Kalluri, L. Mahendra, R. S. Kumar, and G. G. Prasad, “Simulation and impact analysis of denial-of-service attacks on power scada,” in 2016 national power systems conference (NPSC). IEEE, 2016, pp. 1–5.
- Y. Liu, Y. Chen, M. Li, and Z. Wan, “Mpc for the cyber-physical system with deception attacks,” in 2020 chinese control and decision conference (ccdc). IEEE, 2020, pp. 3847–3852.
- M. R. Habibi, H. R. Baghaee, F. Blaabjerg, and T. Dragičević, “Secure mpc/ann-based false data injection cyber-attack detection and mitigation in dc microgrids,” IEEE Systems Journal, vol. 16, no. 1, pp. 1487–1498, 2021.
- Q. Sun, K. Zhang, and Y. Shi, “Resilient model predictive control of cyber–physical systems under dos attacks,” IEEE Transactions on Industrial Informatics, vol. 16, no. 7, pp. 4920–4927, 2019.
- P. J. Laub, T. Taimre, and P. K. Pollett, “Hawkes processes,” arXiv preprint arXiv:1507.02822, 2015.
- R. G. Cestari, F. Barchi, R. Busetto, D. Marazzina, and S. Formentin, “Hawkes-based cryptocurrency forecasting via limit order book data,” arXiv preprint arXiv:2312.16190, 2023.
- E. Bacry, I. Mastromatteo, and J.-F. Muzy, “Hawkes processes in finance,” Market Microstructure and Liquidity, vol. 1, no. 01, p. 1550005, 2015.
- P. Reynaud-Bouret, V. Rivoirard, and C. Tuleau-Malot, “Inference of functional connectivity in neurosciences via hawkes processes,” in 2013 IEEE global conference on signal and information processing. IEEE, 2013, pp. 317–320.
- J. Kwon, Y. Zheng, and M. Jun, “Flexible spatio-temporal hawkes process models for earthquake occurrences,” Spatial Statistics, vol. 54, p. 100728, 2023.
- M.-A. Rizoiu, Y. Lee, S. Mishra, and L. Xie, “Hawkes processes for events in social media,” in Frontiers of multimedia research, 2017, pp. 191–218.
- Y. Bessy-Roland, A. Boumezoued, and C. Hillairet, “Multivariate hawkes process for cyber insurance,” Annals of Actuarial Science, vol. 15, no. 1, pp. 14–39, 2021.
- R. G. Cestari, A. Castelletti, and S. Formentin, “Hourly operation of a regulated lake via model predictive control,” IFAC-PapersOnLine, vol. 55, no. 33, pp. 7–12, 2022.
- ——, “Scenario-based model predictive control of water reservoir systems,” IFAC-PapersOnLine, vol. 56, no. 3, pp. 313–318, 2023.
- M. Grant and S. Boyd, “CVX: Matlab software for disciplined convex programming, version 2.1,” http://cvxr.com/cvx, Mar. 2014.
- Gurobi Optimization, LLC, “Gurobi Optimizer Reference Manual,” 2023. [Online]. Available: https://www.gurobi.com
- A. G. Hawkes, “Spectra of some self-exciting and mutually exciting point processes,” Biometrika, vol. 58, no. 1, pp. 83–90, 1971.
- E. Bacry, M. Bompaire, S. Gaïffas, and S. Poulsen, “Tick: a python library for statistical learning, with a particular emphasis on time-dependent modelling,” 2018.