1. Introduction
The cyber–physical system (CPS) is an intelligent system that integrates communication, control and computing. Safe and supervisory control against potential attacks in cyber–physical systems has drawn extensive attention in recent years [
1,
2,
3,
4,
5,
6,
7]. To better describe system behaviors, cyber–physical systems are often abstracted as discrete-event systems (DESs). Due to the significance of security concerns in cyber–physical systems, it is necessary to consider attack detection under the framework with supervisory control in discrete-event systems [
8,
9].
In this article, we explore the issue based on the closed-loop control system shown in
Figure 1, where the supervisor controls the system through actuators and sensors. However, the actuators and sensors are often vulnerable to attacks in the process of delivering signals, and attackers can potentially alter the transmitted signals. The object of our study is a discrete-event system driven by events, where the supervisor disables some actuator events according to a given specification. We study the intrusion detection of actuator enablement attacks (AE-attacks) under a closed-loop control system. Specifically, some actuators in the system are vulnerable to intrusion, and an attacker indirectly causes the system to enter an unsafe state by changing control actions of the vulnerable actuators from “disabled” to “enabled”.
The study of attack detection in the context of DESs can be traced back as far as the work in [
10]. The work in [
11] considers a problem of synthesizing a supervisor under removal attacks and sensor insertion attacks. The approach in [
12] considers the detection and mitigation of actuator and sensor attacks. In [
13], the authors discuss the robust control problem under a sensor replacement attack. The work in [
14] investigates integrated sensor deception attacks in the context of DESs. The work in [
15,
16] focuses on intrusion detection in which the supervisor determines the presence of an intruder by diagnosing faulty behavior in the system. The study in [
17,
18] presents the issue of supervisory control of DESs under malicious attacks using labeled Petri nets (LPN). In [
19], the method of constructing a resilient automaton is proposed by introducing the safety level of the system, which transforms the resilient supervisory synthesis problem into a supervisory control problem. The study in [
20] proposes a new attacks mitigation strategy that maximizes the scope of the normal specification while ensuring security. In [
21], Rashidinejad et al. outline the existing methods to prevent damage from cyberattacks in cyber–physical systems. The work in [
22] investigates joint sensor-actuator network attacks in DESs, defines upper and lower bounds on the language to describe nondeterministic behavior, and successfully solves the issue of supervisory control under network attacks.
The work in [
23] proposes a generic attack detection framework with respect to four different types of cyberattacks in supervisory control systems. An automaton model is used to characterize behaviors of systems under attack. Essentially, the use of an automaton model for the description of systems has worked well. However, with the scale of DESs becoming larger and more complex, the state space of the system grows exponentially with the increase of scale, i.e., there is an issue of “state space explosion”. The large scale of the system leads to the increase of the probability of failure, and the “state space explosion” also increases the difficulty of fault diagnosis [
24]. The aim of our work is to compensate for this drawback and improve the existing detection methods.
The fundamental framework of supervisory control systems in [
23] is adopted. However, in contrast to the model in [
23], we describe the behavior of a system using a Petri net and construct a basis attack model. More specifically, we replace an automaton with a Petri net and establish a supervisory control system for attack detection of AE-attacks. A basis reachability graph (BRG) is proposed in [
25] in which the transitions are divided into two parts, and the net behavior is described by a subset of reachable markings. Our approach is motivated by the research in [
25]. However, the work in [
25] only classifies events as observable and unobservable. In this article, we use Petri nets to address the issue of attack detection with the AE-attacks, which has never been addressed in the literature. The complexity class of the attack detection problem using Petri nets belongs to the NP-complete problem. Finally, we indicate that only the AE-attacks are considered in this article to present our main results.
Based on the above motivation, this article investigates the detection of AE-attacks by using Petri nets in a control system. In a supervisory control system, there are places that are unsafe or critical and that should be prevented from being accessed externally, and our goal is to build an attack model by using a Petri net. If the supervisor can block access to unsafe places after an attack, then the system satisfies safe controllability. Note that the traditional framework for detecting AE-attacks for the system using automata has the same purpose as what we do. However, the BRG alleviates the problem of state explosion and is an improvement to the original approach.
The main contributions of the article are outlined as follows:
(1) We modify the existing approach that originally uses automata to describe the system behavior. In the article, we use Petri nets instead of automata. Compared with automata, Petri nets can describe the system behavior in a more compact structure without exhausting the entire state space. Moreover, we use semi-structural approaches to reduce the computational burden in the attack detection problem.
(2) A new approach of constructing the BRG is proposed, where the explanation vector is computed from controllable events, and uncontrollable events are omitted from the state space, making it more efficient to analyze system behavior after an attack has occurred.
This article is divided into five sections. The necessary fundamental knowledge is recalled in
Section 2. The notion of AE-attacks and the approach to construct a basis attack model are outlined in
Section 3.
Section 4 presents the notion of AE-safe controllability and gives algorithms for analyzing AE-safe controllability.
Section 5 is mainly concerned with an example of cargo delivery to explain the approach.
Section 6 concludes the whole article.
2. Preliminaries
2.1. Basics of Petri Nets
A Petri net (or Petri net structure) is a four tuple , where P is a finite set of places, T is a finite set of transitions, and . We denote by the set of arcs from places to transitions and from transitions to places in the graph. W: is a mapping that attributes a weight to each arc, where is a set of non-negative integers. We denote as and the sets of input places and output places of a transition t, respectively. Similarly, we define and . The marking M of a Petri net is a mapping from P to .
A transition
t is said to be enabled at a marking
M if
, denoted as
. When firing an enabled transition
t,
tokens are removed from every input place
p of
t, and
tokens are added to every output place
p of
t, then generating a new marking
such that
,
. Firing
t at marking
M reaches marking
, denoted as
. The incidence matrix
C of
N is a
integer matrix with
. According to the firing rule of a transition, a transition
t is enabled at
M, and firing
t can reach a marking
. Consequently, for any finite transition sequence
of a Petri net
, we write
to represent that the sequence of transitions
is enabled at
and after firing of
yields
. The vector
is the Parikh vector of
[
26], then
A Petri net is denoted as , where is the initial marking. We use to represent the set of all markings that are reached by N from . A net N is bounded if there is an integer such that and holds.
2.2. Basis Markings and Basis Reachability Graph
We review several results on basis markings presented in [
25,
27]. In a basis partition
, a set
T is partitioned into the controllable transition set
, and the uncontrollable transition set
.
is the incidence matrix restricted to
and a
-induced subnet is a net
, where
and
are the restrictions of
F and
W, respectively. We denote
and
.
Definition 1. Given a marking M and a controllable transition , we defineas the set of explanations of t at M, and we defineas the set of explanation vectors (or e-vectors). Therefore, is a set of uncontrollable sequences whose firing at marking M can enable transition t. consists of firing vectors associated with the sequences from .
Definition 2. Given a marking M and a transition , we defineas the set of minimal explanations of t at M, and we defineas the corresponding set of minimal e-vectors. With the above definitions, a basis marking can be defined as follows. Given a Petri net with its reachability set , the set of basis markings is a subset of satisfying: (1) ; (2) , , , it holds , where .
Briefly, the set of basis markings consists of two parts: an initial marking and the markings reachable from by firing each controllable transition together with its minimal explanation. All basis markings can be obtained by iterative computation starting from the initial marking .
The BRG generated by a Petri net is a quadruple, denoted by
, representing a finite state automaton comprised of all basis markings, where: (1) the set
represents all basis markings; (2) the set
represents the set of transitions
; (3) the transition function is denoted as
, i.e.,
,
, the function
can be extended to
, where
is the Kleene closure of
[
26]; and (4) the state
is the initial marking.
2.3. Supervisory Control Theory
It is assumed that the plant is modeled by a Petri net . Assume that , where and represent the sets of observable and unobservable transitions, respectively. Similarly, , where and are the sets of controllable and uncontrollable transitions, respectively. When the behavior of G needs to be restricted for satisfying a specification , we introduce a feedback control loop as well as a supervisor. The language generated by G is defined by , which is a set of strings. The natural projection is defined such that: (1) ; (2) if ; (3) if ; and (4) for and , where denotes the empty word. Events of the plant are enabled or disabled dynamically by the supervisor, limiting the closed-loop behavior within an acceptable language. Generally, the plant is under partial observation; thus, the supervisor decides to disable certain events on the basis of the projections from strings that are generated by G. To be more specific, a partially observed supervisor is represented as a mapping ; the supervisor makes a decision based on for any string s generated by G. This kind of supervisor is called a -supervisor. Consequently, when two different strings and have the same projection, they will cause the identical control action.
A sublanguage
of
is considered controllable with respect to
and
if
. Moreover,
is observable for
,
and
if for all
and
,
and
implies that
. Observability and controllability are essential and sufficient for the presence of a
-supervisor who performs the specification
[
28].
3. Actuator Enablement Attacks
3.1. Attack Definition and Modeling
We graphically depict a control system architecture under attacks in
Figure 2. The control system is a plant
G controlled by
. The supervisor monitors the plant events through the projection
generated by the system. Without considering attacks, the closed-loop behavior
, in which
is an observable with controllable sublanguage of
.
is a “nominal” supervisor that is designed to enforce the specification
.
Vulnerable actuators from the supervisor to the plant are frequently attacked. We use
to denote the vulnerable actuator events, which is a subset of all actuator controllable events
. Block
in
Figure 2 represents an attacker model in which the identical observable events can be observed by
, and the control actions of the supervisor on vulnerable actuators can be overwritten. In fact, the controllable action affecting plant
G is a combination of the controllable behavior of supervisor
and attacker
on event set
. The attack detection module is indicated as
. It can also receive the occurrence of observable events by
, as the way to infer whether an AE attack has occurred and inform the supervisor
when an attack is detected.
indicates that the system enters a “defense module” when the supervisor
receives the message that the system is attacked. It will disable every controllable event. In this case, the system enters the “defense module”, which corresponds to “expect the worst and put safety first”. Block
denotes that the system enters unmanageable conditions after being attacked.
The main goal of this article is to build an accurate model for monitoring AE-attacks in the system and to understand the impact of AE-attacks. First, the system is modeled by using a Petri net. Then, basis markings are calculated to obtain a basis attack model, finally a basis diagnoser and a basis verifier are constructed, which are used to judge whether the system satisfies AE-safe controllability. Both methods have their advantages. The flowchart of AE-attack detection is shown in
Figure 3.
We consider a closed-loop system with vulnerable actuators. The system is modeled as a Petri net . To represent the events occurring in a plant, we use the transitions in a Petri net instead, i.e., each event is referred to a transition of a Petri net in the article. When a string s contains an event , we write . Equivalently, when a string s contains an event in , we write . The active event set at place p in G is denoted by .
In particular, the supervisor disables some actuator events to achieve the specification. Then, the attacker intrudes into certain actuators and re-enables these events, overriding the supervisor’s control behaviors. The attacker’s aim is to make the system arrive at an unsafe state and be damaged through the events that it enables. This type of attack is called an AE attack.
3.2. The Basis Attack Model under AE-Attacks
We consider a Petri net , a pair is called a basis partition of T, if , , and the -induced subnet is acyclic. If not, the system will become unstable. In this basis partition, the sets and are called the sets of controllable transitions and uncontrollable transitions, respectively. The controllable events (transitions) may be disabled or enabled by . The uncontrollable events are not affected by the supervisor’s actions.
We use to denote the actuator events intruded by an attacker. We refer to it as the attacked actuator event set and define . More precisely, denotes the occurrence of that is disabled in the system by the supervisor and then enabled again by the attacker. The dilation operation is a mapping D: with some properties such as: (1) , (2) if , (3) if , and (4) where and . We also define the compression operator : that has the following operating characteristics: (1) if , and (2) if . The operator of compression can be extended to : .
Assumption 1. The Petri net system used in this paper is a bounded net.
Assumption 1 means that the method of constructing the basis attack model in this article is applied to a bounded net, since the BRG is finite for a bounded Petri net. Under the condition of bounded nets, the maximum capacity of the places in a Petri net does not exceed a fixed constant K. In this paper, we do not give a specific value of K, which can be an arbitrarily large non-negative integer.
Assumption 2. All places in the system with uncontrollable transitions do not form a cycle.
Assumption 2 means that the -induced subnet in the system is acyclic, which allows us to use the state equation to study the reachability of the uncontrollable subnet.
Assumption 3. The -induced subnet is backward-conflict-free.
Assumption 3 means that every place has at most one input transition in the
-induced subnet. Then,
is a singleton [
25]. Thus, the BRG is considered to be a deterministic finite-state automaton.
We construct a closed-loop system under AE-attacks in Algorithm 1. Let H be the supervisor realized by using a Petri net. Review that a -supervisor can capture the set of events that are currently enabled. Particularly, enabled unobservable events can be captured with self-loops at the current place in H. More precisely, a supervisor is able to disable some events of G. First, we construct by adding all possible attack behaviors to G with the compression operator on . Specifically, is constructed by adding a parallel transition labeled by on G. Then, we construct the overall supervisor in the role of AE-attacks. Intuitively, is constructed by adding self-loops to all places with events in , when the candidate event’s compression is not in the set of active events at the place.
Then, we obtain the closed-loop system under attacks by taking the parallel composition of and . simulates the system behavior in the case where AE-attacks are always presented for all vulnerable actuators. We define a new set of events in the given Petri net, , where represents the set of unsafe places. The physical meaning of the set is as follows: the set of basis markings is reachable by firing a sequence , where and . If the sequence contains transitions in , then the markings containing unsafe places may not belong to the set of basis markings.
In Algorithm 2, we modify the method of calculating the BRG. Given a marking M and a transition , we define as the set of explanations of a transition t at a marking M. Correspondingly, the sets of and are modified to the sets of and , respectively. The restriction of the incidence matrix to is denoted as . Finally, we compute the corresponding basis markings by using the minimal e-vectors and the corresponding transitions in the set from the initial marking. The basis attack model is constructed subsequently, which allows a more precise analysis of the attacker.
In the resulting basis attack model, states and arcs are drastically reduced as well as the analysis of system behavior becomes more efficient. Since uncontrollable events can always happen at any time, there is no need to display uncontrollable events in the generated basis attack model , and uncontrollable events are used as explanation vectors to fire a certain event.
In the basis attack model
, only the events in
are controllable, and the events in
are the attacker’s behaviors. However, the events in
are also controllable, except that the original control action is overwritten by the attacker. The observability of the events in
inherits the observability of the corresponding events in
.
Algorithm 1 Algorithm for the closed-loop system under attacks |
- Input:
A Petri net and a supervisor . - Output:
A closed-loop system under attacks . - 1:
Let ; - 2:
for all , do - 3:
if then - 4:
Let ; - 5:
Let ; - 6:
Let ; - 7:
end if - 8:
end for - 9:
Let ; - 10:
for all , do - 11:
if then - 12:
Let ; - 13:
Let ; - 14:
Let ; - 15:
else if then - 16:
Let ; - 17:
Let ; - 18:
Let ; - 19:
end if - 20:
end for - 21:
Compute ; - 22:
Output .
|
Algorithm 2 Construction of the basis attack model |
- Input:
A closed-loop system under attacks . - Output:
A basis attack model . - 1:
Let , ; - 2:
Let be the set of controllable transtions; - 3:
while
do - 4:
Select a state ; - 5:
for all do - 6:
Compute ; - 7:
for all do - 8:
Let ; - 9:
if then - 10:
Let ; - 11:
end if - 12:
Let ; - 13:
end for - 14:
end for - 15:
Let ; - 16:
Let ; - 17:
end while - 18:
Output .
|
Example 1. The plant G is shown in Figure 4 with , , , , . The unsafe place in the plant is , represented by a square graphic, then . The supervisor H is shown in Figure 5, which can control G. The supervisor disables transition in place , thus stopping the system from arriving at an unsafe place . Following Algorithm 1, we build the closed-loop system under attacks by in Figure 6. Following Algorithm 2, the basis attack model is computed, starting from the initial marking . The generated basis attack model is shown in Figure 7. There are seven states and eight arcs in Figure 7, while there are twelve states and twelve arcs in the reachability graph of the plant. As we can see, since the attacker enables vulnerable events, the system can reach the unsafe place through the event . 6. Example
A cargo transportation system under an AE attack is considered, which is represented by a Petri net, as depicted in
Figure 15. The system is responsible for warehousing, processing, handling, packing and discharging cargoes from the factory. The places indicate the location in the factory, the transitions indicate intelligent automatic processing machines, and the arrow indicates the conveyor belt. The attacker modifies the actuator information to force the machine to start, whose ultimate goal is to steal secret information when the system reaches the unsafe state
. The first batch of cargo enters the factory at
, the quality check is performed at
, the unqualified products are sent to
, and the qualified products continue to be sent to
for the next check. The processing route is selected at
according to the number of cargoes. If the number is small, then
is enabled, otherwise
is enabled. The system arrives at
for classification,
is normally enabled for processing,
is the alternate processing route, and it finally arrives at
. When it arrives at
,
is enabled to select the method of cargo transportation and print the transportation order. Expedited transportation arrives at
, and ordinary transportation arrives at
. When the system arrives at
, the factory scans each cargo and registers the information in the cloud platform. In the whole system,
is the most critical step and the most vulnerable to intrusion, and the attacker wants to steal the secret information at
. The goods are finally released at
. After a shipment is completed, it reverts to
for the next shipment.
The set of controllable events of the plant is , the set of remaining events is uncontrollable, and the set of vulnerable events is . The set of observable events is . The set of unsafe places is . The set is . Let system G be controlled by the supervisor , who always disables the set of events in order to prevent damage to the system.
We consider that
is an observable and controllable behavior which is realized by
. The realization
H of the supervisor is depicted in
Figure 16. According to Algorithm 1, we first construct
to represent the change of system state after being attacked. Next, we build
to represent the supervisor after being attacked. Then, we construct the closed-loop system
under attacks by using parallel composition, as shown in
Figure 17. Finally, according to the algorithm presented above, the basis attack model is generated, as depicted in
Figure 18. We can see that the set of unsafe states is
. After the attacked event
, the plant state changes from
to
, and since the events in the set
are uncontrollable events, the system state continues to run uncontrollably from
to the unsafe state
.
According to the safe controllability condition proposed in this article, we use Algorithms 3 and 4 to determine whether the plant satisfies AE-safe controllability. Part of the basis diagnoser
is shown in
Figure 19. It can be seen that the plant can still arrive at state
. At this point, the system detects that an attack has occurred. Next, the system will continue to reach the state
via the event
. There is no controllable event to interrupt the process between the attacked event and the unsafe state, thus violating AE-safe controllability.
The detection of AE-attacks by constructing a basis diagnoser largely improves the efficiency. By using the traditional automaton approach in this example, we generate 123 states and 234 arc relations, the state compression rate is 81.3%, and the arc relation compression rate is 85.5%. Since the reachability graph is equivalent to a finite state automaton, the above comparison is based on the reachability graph.