RESEARCH ON THE ABILITY TO DETECT THE LINEAR ATTACK OF THE CHI-SQUARED METHOD AND THE CUSUM METHOD
138 viewsKeywords:
Linear attack; Chi-squared method; CUSUM method; detection threhold; Receiver Operating Characteristic – ROCAbstract
This paper presents the ability to detect linear attacks of the Chi-squared (CHI2) and the Cumulative Sum (CUSUM) methods, in case the Kullback–Leibler (K-L) method cannot detect. The object, which is attacked by the linear attack, is the wireless communication process from sensors to controller with a simulated mathematical model. The attack matrices are calculated to ensure that the K-L method cannot detect. With these matrices, the detection thresholds of CHI2 method and CUSUM method are chosen and tested to estimate the ability to detect the linear attack. Simulated results show that an appropriate range of threshold of the CHI2 and the CUSUM methods can be chosen to detect the linear attack in case the K-L method cannot detect. In addition, the obtained results also show that the detection ability of the CUSUM method is better than that of the CHI2 method.
References
[1]. Nguyễn Đức Dương, Lê Minh Thùy, Cung Thành Long “Nghiên cứu khả năng phát hiện tấn công tuyến tính trong các hệ thống diều khiển công nghiệp bằng phương pháp CUSUM”, Tạp chí khoa học công nghệ ĐHBKHN, số 145, 2020, tr 14-20.
[2]. A. Hijazi, A. E. Safadi, and J.-M. Flaus, “A Deep Learning Approach for Intrusion Detection System in Industry Network,” in BDCSIntell, Beirut, Lebanon, 2020, pp. 55-62.
[3]. M. Basseville and I. V. Nikiforov, “Detection of Abrupt Changes: Theory and Application”, Englewood Cliffs, N.J: Prentice Hall, 1993.
[4]. Derui Ding, Qing-Long Han, Yang Xiang, Xiaohua Ge, Xian-Ming Zhang, “A survey on security control and attack detection for industrial cyber-physical systems,” Neurocomputing, Volume 275, 2018, Pages 1674-1683.
[5]. Z. Guo, D. Shi, K. H. Johansson, and L. Shi, “Optimal Linear Cyber-Attack on Remote State Estimation,” IEEE Trans. Control Netw. Syst., vol. 4, no. 1, (2017) pp. 4–13.
[6]. Z. Guo, D. Shi, K. H. Johansson, and L. Shi, “Worst-case stealthy innovation-based linear attack on remote state estimation” Automatica 89 (2018) pp. 117-124.
[7]. S. KULLBACK (1959). “Information Theory and Statistics”. Wiley, New York (also Dover, New York, 1968).
[8]. Nikulin, M. S. (1973), "Chi-squared test for normality"
[9]. R.H.WOODWARD and P.L. GOLDSMITH (1964). Cumulative Sum Techniques. Oliver and Boyd, Edinburgh, UK.
[10]. C.Parloir, M.Kinnaert “Performance evaluation of fault detection algorithms by Monte Carlo methos”, IPAC System, Structure and Control Oaxaca, Mexico, USA, 8-10 December 2004.