Yu Huang, Yan Cui, Tongkai Hao, Peng Zhang, Xi Sun, Xiaoyan Wang
{"title":"基于 SOS-LSTM 的 PHWR 核电机组一次回路隐蔽攻击","authors":"Yu Huang, Yan Cui, Tongkai Hao, Peng Zhang, Xi Sun, Xiaoyan Wang","doi":"10.1016/j.conengprac.2024.106082","DOIUrl":null,"url":null,"abstract":"<div><p>The ongoing advancement of industry and technology has led industrial control systems to evolve towards integration. System structures become increasingly complex, which renders them increasingly vulnerable to external attacks. Due to their clandestine and destructive character, covert attacks pose a significant threat to the secure operation of nuclear power unit control systems. In order to optimize the performance of control systems for nuclear power units, it is important to study the damage process caused by covert attacks on these systems. Facing the problem of obtaining high-precision estimation models of attack targets for covert attacks, this paper proposes a model estimation method based on long and short-term memory (LSTM) neural network and symbiotic organisms search (SOS) algorithm, which takes the feedback controller output and input signals of the attacking target as the dataset of the LSTM neural network, and optimizes the network parameters of the LSTM neural network using SOS algorithm to improve the accuracy of the model, and designs the covert attacker by obtaining the estimation model of the attacked area through training. The root mean square error of the estimation model for the primary loop of the nuclear power unit has been verified by comparative experiments to be reduced by at least 93.59%, 96.52%, and 91.11%, respectively, compared with the other methods. Loop experiment results concerning the covert attack for the primary loop of nuclear power unit illustrate that this attack method successfully meets the predefined objectives while maintaining high levels of stealthiness.</p></div>","PeriodicalId":50615,"journal":{"name":"Control Engineering Practice","volume":"153 ","pages":"Article 106082"},"PeriodicalIF":5.4000,"publicationDate":"2024-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Covert attacks for primary loops of PHWR nuclear power unit based on SOS-LSTM\",\"authors\":\"Yu Huang, Yan Cui, Tongkai Hao, Peng Zhang, Xi Sun, Xiaoyan Wang\",\"doi\":\"10.1016/j.conengprac.2024.106082\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>The ongoing advancement of industry and technology has led industrial control systems to evolve towards integration. System structures become increasingly complex, which renders them increasingly vulnerable to external attacks. Due to their clandestine and destructive character, covert attacks pose a significant threat to the secure operation of nuclear power unit control systems. In order to optimize the performance of control systems for nuclear power units, it is important to study the damage process caused by covert attacks on these systems. Facing the problem of obtaining high-precision estimation models of attack targets for covert attacks, this paper proposes a model estimation method based on long and short-term memory (LSTM) neural network and symbiotic organisms search (SOS) algorithm, which takes the feedback controller output and input signals of the attacking target as the dataset of the LSTM neural network, and optimizes the network parameters of the LSTM neural network using SOS algorithm to improve the accuracy of the model, and designs the covert attacker by obtaining the estimation model of the attacked area through training. The root mean square error of the estimation model for the primary loop of the nuclear power unit has been verified by comparative experiments to be reduced by at least 93.59%, 96.52%, and 91.11%, respectively, compared with the other methods. Loop experiment results concerning the covert attack for the primary loop of nuclear power unit illustrate that this attack method successfully meets the predefined objectives while maintaining high levels of stealthiness.</p></div>\",\"PeriodicalId\":50615,\"journal\":{\"name\":\"Control Engineering Practice\",\"volume\":\"153 \",\"pages\":\"Article 106082\"},\"PeriodicalIF\":5.4000,\"publicationDate\":\"2024-09-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Control Engineering Practice\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0967066124002417\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Control Engineering Practice","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0967066124002417","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0
摘要
工业和技术的不断进步促使工业控制系统向集成化方向发展。系统结构变得越来越复杂,因而越来越容易受到外部攻击。由于其隐蔽性和破坏性,隐蔽攻击对核电机组控制系统的安全运行构成了重大威胁。为了优化核电机组控制系统的性能,研究隐蔽攻击对这些系统造成的破坏过程非常重要。面对如何获取隐蔽攻击目标高精度估计模型的问题,本文提出了一种基于长短期记忆(LSTM)神经网络和共生有机体搜索(SOS)算法的模型估计方法、该方法以攻击目标的反馈控制器输出和输入信号作为 LSTM 神经网络的数据集,利用 SOS 算法优化 LSTM 神经网络的网络参数以提高模型的精度,并通过训练获得被攻击区域的估计模型来设计隐蔽攻击者。经对比实验验证,与其他方法相比,核电机组一次回路估计模型的均方根误差至少分别降低了 93.59%、96.52% 和 91.11%。有关核电机组一次回路隐蔽攻击的回路实验结果表明,这种攻击方法在保持高度隐蔽性的同时,成功地达到了预定目标。
Covert attacks for primary loops of PHWR nuclear power unit based on SOS-LSTM
The ongoing advancement of industry and technology has led industrial control systems to evolve towards integration. System structures become increasingly complex, which renders them increasingly vulnerable to external attacks. Due to their clandestine and destructive character, covert attacks pose a significant threat to the secure operation of nuclear power unit control systems. In order to optimize the performance of control systems for nuclear power units, it is important to study the damage process caused by covert attacks on these systems. Facing the problem of obtaining high-precision estimation models of attack targets for covert attacks, this paper proposes a model estimation method based on long and short-term memory (LSTM) neural network and symbiotic organisms search (SOS) algorithm, which takes the feedback controller output and input signals of the attacking target as the dataset of the LSTM neural network, and optimizes the network parameters of the LSTM neural network using SOS algorithm to improve the accuracy of the model, and designs the covert attacker by obtaining the estimation model of the attacked area through training. The root mean square error of the estimation model for the primary loop of the nuclear power unit has been verified by comparative experiments to be reduced by at least 93.59%, 96.52%, and 91.11%, respectively, compared with the other methods. Loop experiment results concerning the covert attack for the primary loop of nuclear power unit illustrate that this attack method successfully meets the predefined objectives while maintaining high levels of stealthiness.
期刊介绍:
Control Engineering Practice strives to meet the needs of industrial practitioners and industrially related academics and researchers. It publishes papers which illustrate the direct application of control theory and its supporting tools in all possible areas of automation. As a result, the journal only contains papers which can be considered to have made significant contributions to the application of advanced control techniques. It is normally expected that practical results should be included, but where simulation only studies are available, it is necessary to demonstrate that the simulation model is representative of a genuine application. Strictly theoretical papers will find a more appropriate home in Control Engineering Practice''s sister publication, Automatica. It is also expected that papers are innovative with respect to the state of the art and are sufficiently detailed for a reader to be able to duplicate the main results of the paper (supplementary material, including datasets, tables, code and any relevant interactive material can be made available and downloaded from the website). The benefits of the presented methods must be made very clear and the new techniques must be compared and contrasted with results obtained using existing methods. Moreover, a thorough analysis of failures that may happen in the design process and implementation can also be part of the paper.
The scope of Control Engineering Practice matches the activities of IFAC.
Papers demonstrating the contribution of automation and control in improving the performance, quality, productivity, sustainability, resource and energy efficiency, and the manageability of systems and processes for the benefit of mankind and are relevant to industrial practitioners are most welcome.