CN115051872B - Attack detection method considering attack signal and unknown disturbance based on interconnected CPS - Google Patents

Attack detection method considering attack signal and unknown disturbance based on interconnected CPS Download PDF

Info

Publication number
CN115051872B
CN115051872B CN202210764383.4A CN202210764383A CN115051872B CN 115051872 B CN115051872 B CN 115051872B CN 202210764383 A CN202210764383 A CN 202210764383A CN 115051872 B CN115051872 B CN 115051872B
Authority
CN
China
Prior art keywords
matrix
attack
cps
signal
interconnected
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210764383.4A
Other languages
Chinese (zh)
Other versions
CN115051872A (en
Inventor
郭胜辉
唐明珠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou University of Science and Technology
Original Assignee
Suzhou University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou University of Science and Technology filed Critical Suzhou University of Science and Technology
Priority to CN202210764383.4A priority Critical patent/CN115051872B/en
Publication of CN115051872A publication Critical patent/CN115051872A/en
Application granted granted Critical
Publication of CN115051872B publication Critical patent/CN115051872B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/16Threshold monitoring

Abstract

The invention relates to an attack detection method based on an interconnected CPS (control system) and considering attack signals and unknown disturbance, which comprises the following steps: establishing a relation model and a connection topological graph for describing an interconnection information physical system, wherein each subsystem in the relation model has a random noise signal and an attack signal; setting a robust observer for the sensors in the CPS according to the relational model, using H And mixing L 2 ‑L /H Performance and setting an optimal parameter calculation gain matrix to obtain state estimation information of the CPS; wherein the optimal parameter is the minimum parameter value when the linear inequality condition is satisfied; and setting an interval threshold value generation method according to the state estimation information of the CPS, comparing the output state with the magnitude relation between the upper limit and the lower limit of the threshold value, and judging whether the CPS is attacked or not. The attack detection method based on the interconnected CPS and considering the attack signal and the unknown disturbance effectively solves the problems of certain limitation, non-wide application range and poor applicability of the existing method.

Description

Attack detection method considering attack signal and unknown disturbance based on interconnected CPS
Technical Field
The invention relates to the technical field of attack detection, in particular to an attack detection method based on an interconnected CPS (control system) and considering attack signals and unknown disturbance.
Background
Cyber Physical Systems (CPS) are complex multidimensional systems involving information networks and physical processes, with subsystems working in coordination and communicating through network connections. Due to the rapid development of technologies and the improvement of data processing, it has attracted much research attention as an intelligent system that is highly integrated and interactive in a network environment. Although the network connection enables each subsystem to process information and communicate with each other, it also increases the likelihood that the system will be attacked. Further research into CPS is needed to increase its susceptibility to attack to meet security and protection standards. For a system under unknown disturbance, if the unknown input is not reasonably processed, the control effect of the system will be affected. In the past, attack detection research on CPS and an interconnection system mainly focuses on attack signals in a full frequency domain, and malicious attack detection belonging to a limited frequency domain is ignored. When a single index is considered and the interference robustness and the sensitivity to the attack are not considered simultaneously, the application effect of the design method is poor.
Based on H - /H Has been proposed to suppress the effect of perturbation and attack signals on the residual. The sensitivity to attack is considered while the residual robustness is considered, but the method has certain limitations and is not flexible enough. When a detection method is designed, constant threshold residual error evaluation is selected, but the method is not wide in application range and poor in applicability. Therefore, it is necessary to design a new technical solution to comprehensively solve the problems in the prior art.
Disclosure of Invention
The invention aims to provide an attack detection method based on an interconnected CPS (control performance system) and considering attack signals and unknown disturbance, which can effectively solve the problems of certain limitation, non-wide application range and poor applicability of the existing method.
In order to solve the technical problems, the invention adopts the following technical scheme:
an attack detection method based on an interconnected CPS considering attack signals and unknown disturbance comprises the following steps:
s1, establishing a relation model and a connection topological graph for describing an interconnection information physical system, wherein each subsystem in the relation model has a random noise signal and an attack signal;
s2, setting a robust observer for a sensor in an interconnection information physical system according to the relation model, and using H - And mixing L 2 -L /H Setting the optimal parameters to obtain a gain matrix to obtain state estimation information of the interconnection information physical system; wherein the optimal parameter is a minimum parameter value when the linear inequality is satisfied;
and S3, setting an interval threshold value generation method according to the state estimation information of the interconnected information physical system, comparing the magnitude relation between the output state and the upper limit and the lower limit of the threshold value, and judging whether the attack signal is received or not.
Wherein, step S1 includes the following steps:
defining an interconnected CPS comprising N-dimensional subsystems, each subsystem consisting of a physical part and a network part, the subsystems being coupled to each other and the construction of the subsystems being as follows:
Figure BDA0003722640100000021
wherein x is i (k)∈R m Represents a state vector, u i (k)∈R n Representing the control input signal, ω i (k)∈R q Representing an unknown perturbation signal; a is an element of R m ,B∈R m×n ,C∈R p×m ,D∈R m×q And K ∈ R p×r Respectively known coefficient matrixes with certain dimensionality; the scalar a represents the coupling strength between the subsystems, Λ is the coupling matrix describing the connections between the subsystems, y i (k)∈R p Is an output signal, and K ∈ R p×r A matrix of constants; sensor attack f si (k)∈R r Occurs in a low frequency range and satisfies a frequency condition
Figure BDA0003722640100000022
Wherein
Figure BDA0003722640100000023
Which is indicative of the frequency of the signal,
Figure BDA0003722640100000024
representing a low frequency boundary;
the dynamic equation of the whole system is expressed as:
Figure BDA0003722640100000025
wherein the content of the first and second substances,
Figure BDA0003722640100000026
f s =[f s1 T …f sN T ] T ,y=[y 1 T …y N T ] T ,Γ 1 =ΛC,Γ 2 =ΛK;
Figure BDA0003722640100000027
when at least one subsystem is attacked by a sensor, an observer is designed and described as follows:
Figure BDA0003722640100000028
wherein z (k) is ∈ R Nm Is a vector of the system, and is,
Figure BDA0003722640100000029
state estimation value, F ∈ R Nm×Nm ,J∈R Nm×Nm ,L∈R Nm×Np And H ∈ R Nm×Np A matrix to be determined is obtained;
defining state errors
Figure BDA00037226401000000210
The error dynamic equation can be described as:
e(k+1)=Jx(k+1)-z(k+1)+HK y f s (k+1)
=J(Ax(k)+Bu(k)+Dω(k)+K x f s (k))
-(Fz(k)+JBu(k)+Ly(k))+HK y f s (k+1)
=Fe(k)+(JA-F-(FH+L)C)x(k)+JK x f s (k)
-(FH+L)K y f s (k)+HK y f s (k+1)+JDω(k)
when the condition JA-F- (FH + L) C =0 is satisfied, it is known that:
e(k+1)=Fe(k)+JK x f s (k)-(FH+L)K y f s (k)+HK y f s (k+1)+JDω(k)
assuming that the matrix M is a full rank matrix, M T M is a nonsingular matrix, and the pseudo-inverse matrix of M is expressed as M * =(M T M) -1 M T ,Z∈R (Nm)×(Nm+NP) Is an arbitrary matrix. It can be seen that J and H are described as:
Figure BDA0003722640100000031
Figure BDA0003722640100000032
the step S2 includes the steps of:
let the residual signal be
Figure BDA0003722640100000033
The error dynamics equation can be described as:
Figure BDA0003722640100000034
wherein, K 1 =[K x 0],K 2 =[K y 0],K 3 =[0 K y ],
Figure BDA0003722640100000035
a. Let V 1 (k)=e T (k)P ω e (k), when system stability is considered, the lyapunov stability condition is satisfied:
ΔV 1 (k)=V 1 (k+1)-V 1 (k)<0
the following inequality holds:
Figure BDA0003722640100000036
b. when the residual signal and the unknown disturbance satisfy L 2 -L /H When the condition is satisfied, the following inequality is satisfied:
Figure BDA0003722640100000037
when b =0, only H is satisfied An index; when b =1, only L is satisfied 2 -L An index;
it can be seen that the inequality holds:
Figure BDA0003722640100000041
with the linear matrix equation of small, the following equation of small holds:
Figure BDA0003722640100000042
order to
Figure BDA0003722640100000043
And Φ = [ F JD]Obtaining an inequality:
Figure BDA0003722640100000044
wherein the content of the first and second substances,
Figure BDA0003722640100000045
in a clear view of the above, it is known that,
Figure BDA0003722640100000046
if true;
c. when only H is considered - When indicating, let V 2 (k)=e T (k)Q f e (k), and satisfies the Lyapunov stabilization condition:
ΔV 2 (k)=V 2 (k+1)-V 2 (k)<0
knowing that this inequality holds:
Figure BDA0003722640100000047
wherein, the first and the second end of the pipe are connected with each other,
Figure BDA0003722640100000048
introducing additional parameters and matrix according to the linear matrix inequality, and making F = JA-GC, M 1 =α 2 G,M 2 =V 1 T G and W = GG, and found that
Figure BDA0003722640100000049
Wherein the content of the first and second substances,
Figure BDA0003722640100000051
d. combining the above indices, for a given performance scalar η>0,γ>0,α 1 ,α 2 And 0 ≦ b ≦ 1, the proposed error system is considered stable and satisfies if there is a symmetric matrix P ω =P ω T >0,P f =P f T >0,Q f =Q f T >0, with appropriate dimensional matrix W, V 1 And G, satisfying L 2 -L /H And H index, such that the following conditions hold:
Figure BDA0003722640100000052
wherein, the first and the second end of the pipe are connected with each other,
Figure BDA0003722640100000053
Figure BDA0003722640100000054
for a given scalar η>0, stabilizing the system, and obtaining a minimum parameter gamma according to the conditions; according to G = G -1 W, a gain matrix is obtained.
Step S3 includes the following steps:
defining a status signal:
Figure BDA0003722640100000055
therefore, the following steps are carried out:
Figure BDA0003722640100000056
the state interval is defined as:
Figure BDA0003722640100000061
wherein, the first and the second end of the pipe are connected with each other,
Figure BDA0003722640100000062
is a gain matrix;
when Z ∈ R (Nm)×(Nm+Np) For an arbitrary matrix, define
Figure BDA0003722640100000063
And
Figure BDA0003722640100000064
comprises the following steps:
Figure BDA0003722640100000065
order to
Figure BDA0003722640100000066
T is an invertible constant matrix, and the state interval can be redefined as:
Figure BDA0003722640100000067
if it is not
Figure BDA0003722640100000068
For a schuler matrix, define
Figure BDA0003722640100000069
Wherein R is a randomly selected Schur matrix, which can be generally selected to be a non-negative matrix;
describing a Sylvester equation:
Figure BDA00037226401000000610
for any Q, then a unique matrix T and
Figure BDA00037226401000000611
when the system state is satisfied
Figure BDA00037226401000000612
When the system outputs, the following conditions are met:
Figure BDA00037226401000000613
for discrete CPS, the attack detection method based on interconnected CPS considering attack signals and unknown disturbance provided by the technical scheme focuses on sensor attack signals existing in a limited frequency range, and uses generalized Kalman-Yakubovic-Popov (GKYP) lemma to deduce sufficient conditions for designing a finite frequency observer; in order to consider the robustness of residual errors to interference, the method of the invention is used for mixing H - And mixing L 2 -L /H Proposed on the basis of indices, involving only a single H The indexes are compared, and the method is more flexible and effective.
In addition, with H - And mixing L 2 -L /H Combined with, rather than involving, only a single L 2 -L /H Compared with the index method, the method of the invention has more sensitivity; the conservatism of the observer design can be reduced by using additional parameters and matrices due to the presence of the matrices coupled to each other.
The attack detection method based on the interconnected CPS and considering the attack signals and unknown disturbance ensures the reasonable operation of the system by constructing the control framework of the system, designing mixed parameter control, estimating the state of the system and detecting the attack signals in real time.
Drawings
FIG. 1 is a topological block diagram of a system;
FIG. 2 shows the actual values and estimated values of the system according to embodiment 1 of the present invention;
FIG. 3 shows the output value and the upper and lower threshold values of the interval threshold of the system 1 according to embodiment 1 of the present invention;
FIG. 4 shows the output values and the upper and lower values of the interval threshold of the system 2 according to embodiment 1 of the present invention;
FIG. 5 shows the output values of the system 3 and the upper and lower values of the threshold interval according to embodiment 1 of the present invention;
FIG. 6 shows the output values of the system 4 and the upper and lower values of the threshold interval according to embodiment 1 of the present invention;
FIG. 7 shows the residual signal and H only used in embodiment 1 of the present invention Residual signal values generated by the method;
FIG. 8 shows the actual values and estimated values of the system according to embodiment 2 of the present invention;
FIG. 9 shows the output values and the upper and lower values of the interval threshold of the system 1 according to embodiment 2 of the present invention;
FIG. 10 shows the output values of the system 2 and the upper and lower threshold values of the interval according to embodiment 2 of the present invention;
FIG. 11 shows the output values of the system 3 and the upper and lower values of the threshold interval according to embodiment 2 of the present invention;
FIG. 12 shows the output values of the system 4 and the upper and lower values of the threshold interval according to embodiment 2 of the present invention;
FIG. 13 shows the residual signal and L only used in embodiment 2 of the present invention 2 -L /H The method generates residual signal values.
Detailed Description
In order that the objects and advantages of the invention will be more clearly understood, the following description is given in conjunction with the examples. It is to be understood that the following text is merely illustrative of one or more specific embodiments of the invention and does not strictly limit the scope of the invention as specifically claimed.
The technical scheme adopted by the invention is shown in figures 1-13, and the attack detection method based on the interconnected CPS considering attack signals and unknown disturbance comprises the following steps:
the method comprises the following steps: the method comprises the steps of establishing a relation model and a connection topological graph for describing an interconnection information physical system, constructing an integral system by using interconnection information of a plurality of subsystems, and then solving the problems related to observer design for constructing the system.
Here, an interconnected CPS is defined comprising N-dimensional subsystems, each subsystem consisting of a physical part and a network part, and the subsystems may be constructed as follows:
Figure BDA0003722640100000071
wherein x is i (k)∈R m Represents a state vector, u i (k)∈R n Representing the control input signal, ω i (k)∈R q Representing an unknown perturbation signal. In addition, A ∈ R m ,B∈R m×n ,C∈R p×m ,D∈R m×q And K ∈ R p×r Respectively a matrix of coefficients known to have a certain dimension. The subsystems are coupled to each other, and a scalar a represents the coupling strength between the subsystems, and Λ is a coupling matrix describing the connections between the subsystems. The output signal is y i (k)∈R p And K ∈ R p×r A matrix of constants.
Sensor attack f si (k)∈R r Occurs in a low frequency range and satisfies a frequency condition
Figure BDA0003722640100000081
Wherein
Figure BDA0003722640100000082
Which is indicative of the frequency of the signal,
Figure BDA0003722640100000083
indicating a low frequency boundary.
The dynamic equation of the overall system is expressed as:
Figure BDA0003722640100000084
wherein the content of the first and second substances,
Figure BDA0003722640100000085
f s =[f s1 T …f sN T ] T ,y=[y 1 T …y N T ] T ,Γ 1 =ΛC,Γ 2 =ΛK,
Figure BDA0003722640100000086
when at least one subsystem is attacked by a sensor, an observer is designed and described as follows:
Figure BDA0003722640100000087
wherein z (k) epsilon R Nm Is a vector of the system, and is,
Figure BDA0003722640100000088
state estimate, F ∈ R Nm×Nm ,J∈R Nm×Nm ,L∈R Nm×Np And H ∈ R Nm×Np Is the matrix that needs to be determined.
Defining state errors
Figure BDA0003722640100000089
The error dynamics equation can be described as:
e(k+1)=Jx(k+1)-z(k+1)+HK y f s (k+1)
=J(Ax(k)+Bu(k)+Dω(k)+K x f s (k))
-(Fz(k)+JBu(k)+Ly(k))+HK y f s (k+1)
=Fe(k)+(JA-F-(FH+L)C)x(k)+JK x f s (k)
-(FH+L)K y f s (k)+HK y f s (k+1)+JDω(k)
when the condition JA-F- (FH + L) C =0 is satisfied, it is known that:
e(k+1)=Fe(k)+JK x f s (k)-(FH+L)K y f s (k)+HK y f s (k+1)+JDω(k)
assuming that the matrix M is a full rank matrix, M T M is a nonsingular matrix, and the pseudo-inverse matrix of M is expressed as M * =(M T M) -1 M T ,Z∈R (Nm)×(Nm+Np) Is an arbitrary matrix. It can be seen that J and H are described as:
Figure BDA0003722640100000091
Figure BDA0003722640100000092
step two: in view of the residual sensitivity to attacks and its robustness to unknown disturbances, the observer is designed and uses H - And mixing L 2 -L /H And a gain matrix obtained by performance is used for inhibiting the influence of unknown interference and attack signals on state estimation errors and finite frequency domain attack detection, and the generalized Kalman-Yakubovic-Popov (GKYP) lemma is used for setting relevant effective conditions of an observer.
Let the residual signal be
Figure BDA0003722640100000093
The error dynamics equation can be described as:
Figure BDA0003722640100000094
wherein, K 1 =[K x 0],K 2 =[K y 0],K 3 =[0 K y ],
Figure BDA0003722640100000095
a. Let V 1 (k)=e T (k)P ω e (k), when system stability is considered, the lyapunov stability condition is satisfied:
ΔV 1 (k)=V 1 (k+1)-V 1 (k)<0
the following inequality holds:
Figure BDA0003722640100000096
b. when the residual signal and the unknown disturbance satisfy L 2 -L /H When the condition is satisfied, the following inequality is satisfied:
Figure BDA0003722640100000097
when b =0, only H is satisfied An index; when b =1, only L is satisfied 2 -L And (4) an index. It can be seen that the inequality holds:
Figure BDA0003722640100000098
with the linear matrix inequality, the following inequality holds:
Figure BDA0003722640100000101
order to
Figure BDA0003722640100000102
And Φ = [ F JD]To obtain the inequality:
Figure BDA0003722640100000103
wherein the content of the first and second substances,
Figure BDA0003722640100000104
in the knowledge that,
Figure BDA0003722640100000105
this is true.
When the following inequalities hold, that is
bt T (k)r(k)-V 1 (k)=be T (k)C T Ce(k)-V 1 (k)
=be T (k)C T Ce(k)-e T (k)P ω e(k)
=e T (k)(bC T C-P ω )e(k)<0
It can be known that
Figure BDA0003722640100000106
At this time L 2 -L /H The exponential condition holds.
c. When only H is considered - When indicating, let V 2 (k)=e T (k)Q f e (k) and satisfies the Lyapunov stability condition Δ V 2 (k)=V 2 (k+1)-V 2 (k)<0
The following inequality is known to hold:
Figure BDA0003722640100000107
wherein
Figure BDA0003722640100000108
Introducing additional parameters and matrix according to the linear matrix inequality, and making F = JA-GC, M 1 =α 2 G,M 2 =V 1 T G and W = GG, and found that
Figure BDA0003722640100000111
Wherein the content of the first and second substances,
Figure BDA0003722640100000112
d. combining the above indices, for a given performance scalar η>0,γ>0,α 1 ,α 2 And b is 0. Ltoreq. B.ltoreq.1, inThe error system is considered stable and satisfies the symmetry matrix P if present ω =P ω T >0,P f =P f T >0,Q f =Q f T >0, with appropriate dimensional matrix W, V 1 And G, satisfying L 2 -L /H And H - An index such that the following condition holds:
Figure BDA0003722640100000113
wherein, the first and the second end of the pipe are connected with each other,
Figure BDA0003722640100000114
Figure BDA0003722640100000115
for a given scalar η>0, the system is stable, and the minimum parameter gamma can be obtained according to the above conditions. According to G = G -1 W, a gain matrix is obtained.
Step three: a threshold upper limit and lower limit generation method based on an interval threshold is provided, and the feasibility of the method is verified through a simulation result.
Defining a status signal:
Figure BDA0003722640100000121
therefore, the following steps are carried out:
Figure BDA0003722640100000122
the state interval may be defined as:
Figure BDA0003722640100000123
wherein the content of the first and second substances,
Figure BDA0003722640100000124
is a gain matrix.
When Z is equal to R (Nm)×(Nm+Np) For arbitrary matrices, define
Figure BDA0003722640100000125
And
Figure BDA0003722640100000126
comprises the following steps:
Figure BDA0003722640100000127
order to
Figure BDA0003722640100000128
T is an invertible constant matrix, and the state interval can be redefined as:
Figure BDA0003722640100000129
if it is used
Figure BDA00037226401000001210
For a schuler matrix, define
Figure BDA00037226401000001211
Where R is a randomly selected Schur matrix, which can generally be selected to be a non-negative matrix. Describing a Sylvester equation:
Figure BDA00037226401000001212
for any Q, then a unique matrix T and
Figure BDA00037226401000001213
when the system state is satisfied
Figure BDA00037226401000001214
When the system outputs, the following conditions are met:
Figure BDA00037226401000001215
as shown in fig. 1, considering an interconnected CPS with four subsystems, assuming the same structure for all subsystems, the pre-designed coefficient parameters are chosen as:
Figure BDA0003722640100000131
Figure BDA0003722640100000132
a=1,
Figure BDA0003722640100000133
the perturbation signal is described as ω (k) =0.5sin (0.3 k), and its upper and lower bounds can be described as:
Figure BDA0003722640100000134
ω(k)=[-0.5 -0.5 -0.5 -0.5] T
example 1
In this case, the system is subject to a sudden low frequency domain attack after k =65 and satisfies
Figure BDA0003722640100000135
The attack signal is described as:
Figure BDA0003722640100000136
f s1 (k)=f s3 (k)=f s4 (k)=0。
definition of alpha 1 =0.04,α 2 =-0.832,b=0.6,V 1 =-1.52HK 3 η =0.585. And (3) obtaining the minimum parameter gamma =0.019 according to the conditions given in the step 2.
Figure BDA0003722640100000137
Are respectively described as
Figure BDA0003722640100000138
Wherein:
Figure BDA0003722640100000139
the non-negative matrix R is defined as:
R=diag{0.126,0.042,0.126,0.042,0.084,0.126,0.042,0.084,0.126,0.084,0.042,0.126}。
Figure BDA00037226401000001310
Q 1 =-4I 8 ,Q 2 =[-1.255I 4 -1.75I 4 ]. Solving Sylvester equation to obtain matrix
Figure BDA00037226401000001311
Fig. 2-7 show simulation results. The state estimation of the system is shown in fig. 2, where the solid line represents the actual state and the dashed line represents the estimated state generated by the proposed method. Simulation results show that the method has higher speed in the aspect of state estimation and converges to a close state, so that good control is realized.
To demonstrate the increased sensitivity of the residual to the attack, we paired the use of H The method of performance was compared to the method set forth in case 1. Fig. 3-6 depict the detection effect, where the dashed lines represent the boundaries of the threshold. In fig. 3,5 and 6, all output signals are within the threshold. In fig. 4, the output signal obtained according to the proposed method exceeds its upper or lower threshold, i.e. it means that an attack occurs after k = 65. Based on the proposed strategy we can notice that the subsystem 2 is under attack. In FIG. 7, the finite frequency H is not considered - In the case of the index, the residual error resulting from the method used in this study is greater than the residual error obtained in the previous study. It can be concluded that the proposed process ratio with mixing index hasSingle H The method of performance is more sensitive to attack signals.
Example 2
In this case, the system is suddenly attacked at 45 < k < 75 and satisfies the low frequency range
Figure BDA0003722640100000141
And is described as:
Figure BDA0003722640100000142
f s1 (k)=f s2 (k)=f s3 (k)=0。
definition of alpha 1 =0.97,α 2 =-0.62,b=0.13,V 1 =-2.85HK 3 η =0.36, and the minimum coefficient γ =0.080 is obtained.
Figure BDA0003722640100000143
And
Figure BDA0003722640100000144
are respectively described as
Figure BDA0003722640100000145
Wherein
Figure BDA0003722640100000146
Figure BDA0003722640100000147
R and Q are defined as:
R=diag{0.045,0.015,0.045,0.015,0.03,0.045,0.015,0.03,0.045,0.03,0.015,0.045},
Figure BDA0003722640100000148
Q 1 =-3.6I 8 and Q 2 =[-0.8I 4 -1.5I 4 ]。
Solving Sylvester equation to obtain matrix
Figure BDA0003722640100000151
The simulation results are shown in fig. 8-13. The state estimation of the system is illustrated in fig. 8, where the solid line represents the actual state and the dashed line represents the estimated state generated by the proposed method. Simulation results show that the method has higher speed in the aspect of state estimation and converges to a close state, so that good control is realized.
Fig. 9-11 show that all output signals are within the threshold range. In fig. 12, when the finite frequency H is considered at the same time - Exponentially, the output signal obtained according to the proposed method exceeds its upper or lower threshold limit, i.e. it means that an attack occurring between k =45 and k =75 can be successfully detected. To show the improvement in residual sensitivity, the simulation results are compared in fig. 13. Between k =45 and k =75, by combining L 2 -L /H And H - Exponential, it can be seen that the residual signal ratio with hybrid performance uses only L 2 -L /H The method produces larger residual values.
By the proposed method we can detect that the subsystem 4 is under attack.
The present invention is not limited to the above embodiments, and those skilled in the art can make various equivalent changes and substitutions without departing from the principle of the present invention after learning the content of the present invention, and these equivalent changes and substitutions should be considered as belonging to the protection scope of the present invention.

Claims (3)

1. An attack detection method considering attack signals and unknown disturbance based on an interconnected CPS is characterized by comprising the following steps:
s1, establishing a relation model and a connection topological graph for describing an interconnection information physical system, wherein each subsystem in the relation model has a random noise signal and an attack signal;
s2, setting a robust observer for a sensor in an interconnected information physical system according to the relation model, and using H-and mixed L 2 -L /H Performance and setting an optimal parameter calculation gain matrix to obtain state estimation information of the interconnection information physical system; the optimal parameter is the minimum parameter value when a linear inequality condition is met;
the gain matrix is obtained as follows:
let the residual signal be
Figure FDA0004077216940000011
The error dynamics equation can be described as:
Figure FDA0004077216940000012
wherein, K 1 =[K x 0],K 2 =[K y 0],K 3 =[0 K y ],
Figure FDA0004077216940000013
a. Let V 1 (k)=e T (k)P ω e (k), when system stability is considered, the lyapunov stability condition is satisfied:
ΔV 1 (k)=V 1 (k+1)-V 1 (k)<0
the following inequality holds:
Figure FDA0004077216940000014
b. when the residual signal and the unknown disturbance satisfy L 2 -L /H When the condition is satisfied, the following inequality is satisfied:
Figure FDA0004077216940000015
when b =0, only H is satisfied An index; when b =1, only L is satisfied 2 -L An index;
it can be seen that the inequality holds:
Figure FDA0004077216940000016
with the linear matrix inequality, the following inequality holds:
Figure FDA0004077216940000017
order to
Figure FDA0004077216940000021
And Φ = [ F JD]Obtaining an inequality:
Figure FDA0004077216940000022
wherein the content of the first and second substances,
Figure FDA0004077216940000023
in a clear view of the above, it is known that,
Figure FDA0004077216940000024
if true;
c. when only H is considered - When indicating, let V 2 (k)=e T (k)Q f e (k), and satisfies the Lyapunov stabilization condition:
ΔV 2 (k)=V 2 (k+1)-V 2 (k)<0
knowing that this inequality holds:
Figure FDA0004077216940000025
wherein the content of the first and second substances,
Figure FDA0004077216940000026
introducing additional parameters and matrix according to the linear matrix inequality, and making F = JA-GC, M 1 =α 2 G,M 2 =V 1 T G and W = GG, and found that
Figure FDA0004077216940000027
Wherein the content of the first and second substances,
Figure FDA0004077216940000028
d. combining the above indices, for a given performance scalar η > 0, γ > 0, α 1 ,α 2 And 0 ≦ b ≦ 1, the proposed error system is considered stable and satisfies if there is a symmetric matrix P ω =P ω T >0,P f =P f T >0,Q f =Q f T > 0, with a matrix W, V of appropriate dimensions 1 And G, satisfying L 2 -L /H And H - An index such that the following conditions are satisfied:
Figure FDA0004077216940000031
wherein, the first and the second end of the pipe are connected with each other,
Figure FDA0004077216940000032
Figure FDA0004077216940000033
for a given scalar η > 0, the systemStable, the minimum parameter gamma can be obtained according to the above conditions; according to G = G -1 W, obtaining a gain matrix;
and S3, setting an interval threshold value generation method according to the state estimation information of the interconnected information physical system, comparing the magnitude relation between the output state and the upper limit and the lower limit of the threshold value, and judging whether the attack signal is received or not.
2. The interconnected CPS-based attack detection method taking into account attack signals and unknown disturbances according to claim 1, wherein step S1 comprises the steps of:
defining an interconnected cyber-physical system comprising N-dimensional subsystems, each subsystem comprising a physical part and a network part, the subsystems being coupled to each other and the subsystems being constructed as follows:
Figure FDA0004077216940000034
wherein x is i (k)∈R m Represents a state vector, u i (k)∈R n Representing the control input signal, ω i (k)∈R q Representing an unknown perturbation signal; a is equal to R m ,B∈R m×n ,C∈R p×m ,D∈R m×q And K ∈ R p×r Respectively coefficient matrixes with certain dimensionality are known; a scalar a represents the coupling strength between the subsystems, a is the coupling matrix describing the connections between the subsystems, y i (k)∈R p Is an output signal, and K ∈ R p×r A matrix of constants; sensor attack f si (k)∈R r Occurs in a low frequency range and satisfies a frequency condition
Figure FDA0004077216940000041
Wherein
Figure FDA0004077216940000042
Which is indicative of the frequency of the signal,
Figure FDA0004077216940000043
representing a low frequency boundary;
the dynamic equation of the whole system is expressed as:
Figure FDA0004077216940000044
wherein the content of the first and second substances,
Figure FDA0004077216940000045
f s =[f s1 T ...f sN T ] T ,y=[y 1 T ...y N T ] T ,Γ 1 =ΛC,Γ 2 =ΛK;
Figure FDA0004077216940000046
when at least one subsystem is attacked by a sensor, an observer is designed and described as follows:
Figure FDA0004077216940000047
wherein z (k) is ∈ R Nm Is a vector of the system, and is,
Figure FDA0004077216940000048
state estimation value, F ∈ R Nm×Nm ,J∈R Nm×Nm ,L∈R Nm×Np And H ∈ R Nm×Np A matrix to be determined is obtained;
defining state errors
Figure FDA0004077216940000049
The error dynamic equation can be described as:
e(k+1)=Jx(k+1)-z(k+1)+HK y f s (k+1)
=J(Ax(k)+Bu(k)+Dω(k)+K x f s (k))
-(Fz(k)+JBu(k)+Ly(k))+HK y f s (k+1)
=Fe(k)+(JA-F-(FH+L)C)x(k)+JK x f s (k)
-(FH+L)K y f s (k)+HK y f s (k+1)+JDω(k)
when the condition JA-F- (FH + L) C =0 is satisfied, it is known that:
e(k+1)=Fe(k)+JK x f s (k)-(FH+L)K y f s (k)+HK y f s (k+1)+JDω(k)
assuming that the matrix M is a full rank matrix, M T M is a nonsingular matrix, and the pseudo-inverse matrix of M is expressed as M * =(M T M) -1 M T ,Z∈R (Nm)×(Nm+Np) Is an arbitrary matrix; it can be seen that J and H are described as:
Figure FDA0004077216940000051
Figure FDA0004077216940000052
3. the interconnected CPS-based attack detection method taking into account attack signals and unknown perturbations as claimed in claim 1, wherein step S3 comprises the steps of:
defining a status signal:
Figure FDA0004077216940000053
therefore, the following steps are carried out:
Figure FDA0004077216940000054
the state interval is defined as:
Figure FDA0004077216940000055
wherein the content of the first and second substances,
Figure FDA0004077216940000056
is a gain matrix;
when Z is equal to R (Nm)×(Nm+Np) For arbitrary matrices, define
Figure FDA0004077216940000057
And
Figure FDA0004077216940000058
comprises the following steps:
Figure FDA0004077216940000059
order to
Figure FDA00040772169400000510
T is an invertible constant matrix, and the state interval can be redefined as:
Figure FDA00040772169400000511
if it is not
Figure FDA00040772169400000512
For the schuler matrix, define
Figure FDA00040772169400000513
Wherein R is a randomly selected Schur matrix, which can be selected as a non-negative matrix;
describing a Sylvester equation:
Figure FDA00040772169400000514
for any Q, then a unique matrix T and
Figure FDA0004077216940000061
when the system state is satisfied
Figure FDA0004077216940000062
When the system output meets the following conditions:
Figure FDA0004077216940000063
CN202210764383.4A 2022-06-30 2022-06-30 Attack detection method considering attack signal and unknown disturbance based on interconnected CPS Active CN115051872B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210764383.4A CN115051872B (en) 2022-06-30 2022-06-30 Attack detection method considering attack signal and unknown disturbance based on interconnected CPS

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210764383.4A CN115051872B (en) 2022-06-30 2022-06-30 Attack detection method considering attack signal and unknown disturbance based on interconnected CPS

Publications (2)

Publication Number Publication Date
CN115051872A CN115051872A (en) 2022-09-13
CN115051872B true CN115051872B (en) 2023-03-17

Family

ID=83165662

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210764383.4A Active CN115051872B (en) 2022-06-30 2022-06-30 Attack detection method considering attack signal and unknown disturbance based on interconnected CPS

Country Status (1)

Country Link
CN (1) CN115051872B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117039890B (en) * 2023-10-08 2023-12-22 南京邮电大学 Network attack detection-oriented power distribution network prediction auxiliary interval state estimation method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109191326A (en) * 2018-08-23 2019-01-11 东北大学 The interdependent deposit system network attack methods of risk assessment of power distribution network CPS based on attacker visual angle
CN109861825A (en) * 2019-02-15 2019-06-07 浙江工商大学 Detection method is internaled attack based on Weighted Rule and consistent degree in CPS system
CN112600814A (en) * 2020-12-08 2021-04-02 震兑工业智能科技有限公司 Detection method and system for deception attack of ship CPS (cyber-physical system)
CN113009825A (en) * 2021-02-08 2021-06-22 云境商务智能研究院南京有限公司 Deception-attacked nonlinear networked system state estimation method
CN114063602A (en) * 2021-11-15 2022-02-18 沈阳航空航天大学 Active attack detection method for improving detection rate

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8666111B2 (en) * 2011-05-24 2014-03-04 Tata Consultancy Services Limited System and method for detecting the watermark using decision fusion
US11252169B2 (en) * 2019-04-03 2022-02-15 General Electric Company Intelligent data augmentation for supervised anomaly detection associated with a cyber-physical system
CN110213115B (en) * 2019-06-25 2022-04-22 南京财经大学 Security control method of event-driven network control system under multi-network attack
CN110855683B (en) * 2019-11-18 2021-08-10 东北电力大学 Method for carrying out attack detection and reconstruction on electric power information physical system
CN111130106B (en) * 2020-01-10 2024-04-12 浙江工业大学 Attack detection method for multi-region power system
CN113765880B (en) * 2021-07-01 2022-05-20 电子科技大学 Power system network attack detection method based on space-time correlation
CN113741198A (en) * 2021-09-16 2021-12-03 云境商务智能研究院南京有限公司 T-S fuzzy system self-adaptive event trigger state estimation method under random network attack
CN114326382A (en) * 2021-11-16 2022-04-12 山东师范大学 Adaptive elastic tracking control method and system with spoofing attack

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109191326A (en) * 2018-08-23 2019-01-11 东北大学 The interdependent deposit system network attack methods of risk assessment of power distribution network CPS based on attacker visual angle
CN109861825A (en) * 2019-02-15 2019-06-07 浙江工商大学 Detection method is internaled attack based on Weighted Rule and consistent degree in CPS system
CN112600814A (en) * 2020-12-08 2021-04-02 震兑工业智能科技有限公司 Detection method and system for deception attack of ship CPS (cyber-physical system)
CN113009825A (en) * 2021-02-08 2021-06-22 云境商务智能研究院南京有限公司 Deception-attacked nonlinear networked system state estimation method
CN114063602A (en) * 2021-11-15 2022-02-18 沈阳航空航天大学 Active attack detection method for improving detection rate

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
孔令霖 ; 林家骏 ; 周昆 ; .一种抗CPS控制层欺骗攻击的算法.2015,(02),全文. *

Also Published As

Publication number Publication date
CN115051872A (en) 2022-09-13

Similar Documents

Publication Publication Date Title
Karimi Robust H∞ filter design for uncertain linear systems over network with network-induced delays and output quantization
Shi et al. Distributed fault detection for a class of second‐order multi‐agent systems: an optimal robust observer approach
CN115051872B (en) Attack detection method considering attack signal and unknown disturbance based on interconnected CPS
CN107070734B (en) A kind of network control system fault detection method
CN113741309B (en) Dual-dynamic event trigger controller model design method based on observer
CN112350664B (en) Limited frequency fault detection method based on event trigger strategy
Chen et al. Resilient filter of nonlinear network systems with dynamic event-triggered mechanism and hybrid cyber attack
CN110989552B (en) Fault estimation method of continuous stirred tank reactor system under network attack
CN109936568B (en) Malicious attack prevention sensor data acquisition method based on recurrent neural network
CN114615143A (en) Elastic distributed safety monitoring method under multi-sensor-observation network
CN107122897B (en) Unmanned ship airworthiness evaluation method based on deep learning algorithm
Duan et al. Finite-time distributed H∞ filtering for Takagi-Sugeno fuzzy system with uncertain probability sensor saturation under switching network topology: Non-PDC approach
CN113325708B (en) Fault estimation method of multi-unmanned aerial vehicle system based on heterogeneous multi-agent
CN109660522B (en) Deep self-encoder-based hybrid intrusion detection method for integrated electronic system
CN111208731B (en) Method for attack detection and reconstruction of electric power information physical system
Zhu et al. Fault detection for nonlinear networked control systems based on fuzzy observer
CN112215197A (en) Underground cable fault early warning method and system based on artificial intelligence
CN114063602B (en) Active attack detection method for improving detection rate
Lu et al. General decay synchronization and H∞ synchronization of multi-weighted coupled reaction-diffusion neural networks
CN112953943B (en) False data injection attack resisting method based on trust mechanism in distributed estimation
Naami et al. Unknown input observer design for TS fuzzy systems with time-varying bounded delays
Wang et al. Limited information based emergency response control for underwater vehicle systems with disturbances and DoS attacks
CN114039867A (en) Joint interval estimation method for state and fault of networked control system under hidden attack
Wang et al. Sensor gain fault diagnosis for a class of nonlinear systems
Lv et al. Finite-Time Attack Detection and Secure State Estimation for Cyber-Physical Systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant