Abstract
Dynamic traffic monitoring is a critical part of industrial communication network cybersecurity, which can be used to analyze traffic behavior and identify anomalies. In this paper, industrial networks are modeled by a dynamic fluid-flow model of TCP behavior. The model can be described as a class of systems with unmeasurable states. In the system, anomalies and normal variants are represented by the queuing dynamics of additional traffic flow (ATF) and can be considered as a disturbance. The novel contributions are described as follows: (1) a novel continuous terminal sliding-mode observer (TSMO) is proposed for such systems to estimate the disturbance for traffic monitoring; (2) in TSMO, a novel output injection strategy is proposed using the finite-time stability theory to speed up convergence of the internal dynamics; and (3) a full-order sliding-mode-based mechanism is developed to generate a smooth output injection signal for real-time estimations, which is directly used for anomaly detection. To verify the effectiveness of the proposed approach, the real traffic profiles from the Center for Applied Internet Data Analysis (CAIDA) DDoS attack datasets are used.
1. Introduction
An industrial network is a communication network that applied in an industrial environment, i.e., manufacturing, power generation, energy distribution, and transportation, with protocols to provide real-time control and monitoring of industrial systems. Due to the development of the Industrial Internet of Things (IIoT), a variety of technologies, such as sensors, wireless communications, and computing, have paved the way from local to remote networks for performing remote operations, monitoring, and maintenance through the Internet. Security concerns about the IIoT have been raised. On 21 October 2016, attackers utilize the Mirai IoT botnet to launch high-impact distributed denial of service (DDoS) attacks against the Dyn DNS service, which caused an extended Internet outage [1]. Therefore, the vulnerability of industrial networks have reinforced the importance of safety and security to protect industrial systems against cyber threats [2]. To detect and prevent the attacks, researchers are focused on designing traffic monitoring devices, such as firewalls and intrusion detection systems (IDSs), placed at different levels of industrial networks to detect and prevent attacks [3].
In the past years, many IDS methods have been proposed for monitoring malicious activities in industrial networks. By the types of information source, IDSs can be classified into two types: host-based IDSs (HIDSs) and network-based IDSs (NIDSs). HIDSs monitor the characteristics of information in hosts to detect anomalous behavior. A data stream mining-based HIDS is proposed for the advanced metering infrastructure to collect and analyze energy usage data [4]. A novel multiattribute HIDS is developed in supervisory control and data acquisition (SCADA) cybersystems [5]. On the other hand, NIDSs analyze network activities in terms of traffic volume, protocol usage, IP address, and so on. Several NIDSs are proposed at network gateways, e.g., firewalls or routers, to online monitor the whole networks. For example, a deep packet inspection method is proposed to deal with high-layer protocols in terms of performance indexes at firewalls [6]. However, the typical case of limited-size data packets are not considered. A Markov chain NIDS is investigated to study the performance of rule-based IP traffic include throughput, packet loss, and packet delay at firewalls [7]. Furthermore, a filtering system-based NIDS is developed to block spurious traffic by using an IP packet queuing engine [8]. With the increased complexity and the growing amount network usages, the static analytical approach fails to meet the monitoring criteria in accuracy and efficiency. Thus, the real-time monitoring approach is needed to analyze network traffic at network gateways to detect malicious attacks. The dynamics of industrial TCP networks in routers can be expressed as a fluid-flow model by using stochastic differential nonlinear equations [9]. Based on the model, some observers have been proposed for the dynamical network monitoring system [10]. The observers are capable to detect anomalies. Since the anomalies are being considered as perturbations in the systems, observers can be designed to estimate the anomalies [11].
The current observers for traffic monitoring can be classified into two categories: linear observers and nonlinear observers. The linear observer strategy is developed to feed back the output errors in a linear manner. For example, the Luenberger observers (LOs) are developed to monitor the TCP traffic flows [12]. Moreover, LOs are synthesized to reconstruct the unmeasurable congestion window, i.e., , for traffic estimations. The time-delay observers are applied to supervise the network via TCP flow estimations and detecting anomalies. However, they are unable to accurately estimate the system states in the presence of unknown signals or uncertainties [13]. Thus, the fuzzy observers (FOs) are designed by using a Takagi-Sugeno (T-S) system that consists of a number of linear time-invariant models to achieve global performance [14], whereas the local linear observers of FOs are still hardly able to force the estimation errors to zero. The nonlinear observers, such as sliding-mode observers (SMOs), are applied for traffic monitoring [15,16]. SMOs are designed using sliding-mode control (SMC) method. SMC has unique properties, such as low sensitivity to parameter variations and strong robustness to external disturbances, and has been applied in many areas [17,18,19,20]. The existing SMOs can be classified into two types, i.e., linear SMOs and terminal SMOs. The linear SMOs that include conventional SMOs (CSMOs) and super-twisting observers (STOs) use the linear hypersurface with asymptotic stability. For example, CSMOs are proposed for traffic monitoring and detecting anomalies [21]. In the CSMOs, low-pass filters are used to soften the signals with high frequency components, which cause a phase lag and delay. To deal with the chattering phenomenon, STOs are proposed to estimate ATF without any low-pass filters [22]. However, the STOs are activated when the estimate errors converged to zero, which results in a long start-up time. In contrast, terminal SMOs employ the nonlinear a hypersurface and drive the estimate errors to the hypersurface in finit-time [23,24,25,26,27].
Different from the existing observer methods for anomaly detection under the network communication scenario [28,29,30], the novel terminal sliding-mode observer (TSMO) is proposed with the contributions described as: (1) TSMO is designed for disturbance estimation with the properties of finite-time convergence of the estimation error; (2) the proposed TSMO can increase the convergence speed of the internal dynamics to meet the criteria for real-time anomaly detection; (3) a full order sliding mode is designed to achieve a smooth output injection and is directly applied for estimation; and (4) the TSMO is proposed to increase the estimation dynamics of the abnormal traffic, in which the estimation error will converge to a bounded small area within a finite-time and then converge to zero asymptotically. For the network communication scenarios, it is required to meet two criterias: robustness and smooth output injection signals. The results of the estimation for ATF can be further used for the anomaly detection. The paper aims at overcoming the following three challenges from the theoretical viewpoints:
- How to develop an observer for a class of systems where parts of states are unmeasurable.
- How to increase the convergence speed of the internal dynamics in the observer.
- How to design a smooth output injection of the observer and apply it directly for the estimation algorithm.
The remainder of the paper is organized as follows. The fluid-flow model of industrial networks is described in Section 3. The sliding-mode observer for the system is proposed in Section 4. In Section 5, the practical traffic replay is carried out to illustrate the effectiveness of the proposed method. Finally, conclusions are given in Section 6.
2. Problem Formulation and Preliminaries
Consider a class of linear time-varying delay systems represented by
where is the system state, is the control input, is the time delay, is the disturbance, and , , , and are time invariant system parameters.
Some assumptions are made as: (1). the system (1) is stable; (2). the state is measurable; and (3). the state is unmeasurable.
The objective in the paper is to design an observer for estimating the disturbance in (1). Now, an observer is proposed for the system (1) in the form
where is the estimate of , and is the output injection of the observer.
If the errors between the estimates and the true states are written as , then, from (1) and (2), the following error system is obtained
and the estimate of the disturbance follows that
The estimation process includes the following two steps:
- The error system (3) converges to zero asymptotically or in finite-time by using the output injection of the observer.
The output injection of the observer in (2) can only utilize the measurable error , i.e., , . The output injection can be designed to force converging to zero, although there exists unmeasurable and disturbance in the error system (3). However, in the conventional observer [22], there is no output injection for the internal dynamics of error system (3). In such a case, the error state will converge to zero asymptotically due to the assumption 1. As a result, the convergence of cannot be affected by the signal and may be very slow. To address this problem in the conventional methods, an output injection signal is proposed to the error system (3), which aims at speeding up the convergence of the internal dynamics of the error system (3).
When the error system (3) converges to zero, the estimate of the disturbance can be obtained using (4). Hence, the output injection of the observer is required to be smooth, which is a challenge to the design of the SMO.
Two Lemmas are stated below and will be used in the proof of the Theorems later.
Lemma 1
([31]). Given a nonlinear system , where , , and is a continuous function. If there exists a continuous positive definite function such that , where and are two constants. Then, , , approaches to zero in a finite-time T, where .
To prove the Theorems in the paper, the stability of the following form of linear systems with time-varying delay is considered:
where is the state, and are constant matrices with appropriate dimensions, the time delay, , is a time-varying continuous function that satisfies and , where , , and are all known positive constants, and the initial condition, , is a continuous function of .
Lemma 2
([32]). The system (5) is asymptotically stable if there exist matrices ; , , for , and ; , , and , with appropriate dimensions such that the following LMI holds:
whereΦis the symmetric matrix, , , , , , , , , , , , , , , , , , , , , , , , for and , , and .
3. Fluid-Flow Model of Industrial Networks
Industrial networks interconnect various industrial control systems (ICS), e.g., local-area switched networks, such as distributed control systems, and wide-area routed networks, such as SCADA, to support the communication between devices. Most ICSs adopt some specialized protocols, such as Open Platform Communications, Modbus, Distributed Network Protocol, Inter-Control Center Protocol, Profibus, etc. However, these protocols were initially designed for serial communications and must been adapted to operate over TCP/IP networks, which is a standard Ethernet link layer and has been widely implemented at common network infrastructures. To this end, the industrial TCP/IP networks will be studied in the paper.
An industrial TCP/IP network consists of multiple hosts and clients in industrial control systems, which are physically connected in any number of topologies including star, tree, and even full-mesh. In industrial networks, a star topology is extremely common to connect to end devices [33]. So, a typical industrial TCP/IP network in a star topology is adopted in this study. In the topology, all nodes (hosts or any other industrial control systems peripherals) are connected to an industrial router. Each connected host has a dedicated, point-to-point connection between the host and the router. It is assumed that there are N homogeneous sources, i.e., all sources are the same in structure, nature, parameters, and software implementations. They connect to a destination (a host or a client devices) through a router, where two mechanisms are embedded: an Active Queue Management (AQM) and an observer. The AQM regulates the queue length in the router buffer with a randomization of choosing connections to notify the congestion, so that the network utilization can be improved. The observer is used to estimate the traffic flow and further detect its abnormal behavior of the traffics in industrial TCP/IP networks.
To describe the behavior of the traffics in industrial networks, the following fluid-flow model of TCP behavior can be used [9]:
where is the average TCP congestion window size in packets. Congestion Window () is a TCP state variable that limits the amount of data the TCP can send into the network before receiving an ACK. is expected queue length in packets. w and q are positive and bounded, i.e., and , where and are known and denote maximum window size and buffer size, respectively. is the round-trip time in seconds which induces time varying delay in the communication channel. is the probability of packet loss and takes value at . is the propagation delay in seconds. N and C are the numbers of TCP sections and the link bandwidth in packets/second, respectively.
In system (7), represents the unmeasurable queuing dynamics of ATF in the network. It includes the modeling errors and anomalies. Both of them are uncertain and perturb the normal TCP/IP network behavior at the router level. In normal working conditions, is around a fixed value, which forms a layer near the value; however, when an anomaly intrusion happens, it will suddenly increase.
The purpose of the paper is to estimate only using in (7). After obtaining the estimate of , we can detect and further analyze the anomalies.
The equilibrium point of system (7) is assumed as , where is the equilibrium window size, and is the required queue length set by the AQM. is the equilibrium input value, and is the equilibrium round-trip time. They can be determined as follows by and :
The system (7) can be linearized around its equilibrium point. Defining the perturbation of the equilibrium point as and , the dynamics of the industrial TCP networks (7) can be linearized to
where and are available in the router. Some software programs, such as Netflow, PacketScope, and Loss Measurement Management, have been installed in routers. They can monitor and measure [34]. The congestion window cannot be used in the AQM or the observer because it is unmeasurable.
To simplify the design of the observer for the linearized model of the industrial TCP/IP network (8), a state transformation is made first.
Define a new state variable , an output , and a control . Then, system (8) can be rewritten as
where , , , , and . C and N are defined in (7).
It should be noted that the lower bound of is as defined in (10). is the propagation delay at the circumstance of neither congestion nor queuing delay in a router. In addition, the upper bound of in (10) is the combination of the propagation delay and the maximum queuing delay under the worst case of congestion in the router buffer, i.e., , cannot exceed .
The derivative of can be assumed to satisfy
where is a known positive constant.
The condition of (10) and (11) can be obtained as below. Differentiating the last equation in (7) with the time t gives
The term in (12) is actually the amount of data being transmitted in the TCP/IP network, which is physically constrained to the TCP/IP network capacities, namely where is the buffer capacity defined in (7). BDP is the Bandwidth-Delay Product, which represents the amount of data that can be in transit [35]. BDP refers to the product of a data link’s capacity C and its round-trip delay time , i.e., , where C and are defined in (7). Normally, the buffer capacity of a router in (7) is dependent on the BDP, i.e., , where is a constant [36]. Then, it can be obtained that and furthermore, we have the condition (11) is true.
The state variable in the linearized model of the TCP/IP network (9) satisfies the inequality as follows:
where is the known positive constant, i.e., the maximum window size, and is defined in (7).
In TCP/IP networks, the window size refers to the amount of dada that a host is currently willing to send. Normally, the maximum window size at a host is configured as a constant, i.e., is set as (0xFFFF) bytes [37]. As seen as in (8) and (9), is the perturbation around the equilibrium point of that is limited to the known constant maximum window size . As , so cannot exceed the maximum value of , i.e., the inequality (13) is true.
The aformentioned amount of data being transmitted in the TCP/IP network, , in (12) includes traffic flow of all N TCP sections , as well as the dynamics of ATF. It is physically constrained to the TCP/IP network capacities, namely , which means that holds because of , , i.e., , where is a known positive constant which can be determined in the experiments.
As is physically limited to the router communication capacity, its change rate is always constrained to , where T is the sampling period and kept as a constant [9]. Hence, we have , i.e., , where is a known positive constant. Summarizing the analysis above gives
where both and are known positive constants.
The block diagram of the AQM and observer in a router is shown in Figure 1. The AQM is utilized to control the queue length to a required value by regulating the probability of packets loss . The inputs of the observer, i.e., and , are measurable states. The outputs of the observer is the estimate of . The paper aims to design an observer for estimating the dynamics of ATF in real-time and further detecting anomalies in industrial networks.
Figure 1.
Block diagram of the AQM and observer in an industrial switch/router.
4. Design of the TSM Observer
In the fluid-flow model of TCP/IP networks in (9), the ATF dynamics can be considered as a disturbance. The estimate of can be used for anomaly detection. To estimate , an observer is proposed as
where and represent the estimates of the system state and output , respectively, and and are output injection for the observer.
Define and as the errors between the system states and their estimates. The error system can be obtained from (9) and (15) as follows:
It should be noted that the state in error system (16) is measurable and can be used in the design of the output injection. However, the state is unmeasurable and cannot be used in the design of the output injection, i.e., and in (16) can include only .
4.1. Measurable Error Subsystem
The measurable error subsystem in (16) is firstly considered, namely
A TSM manifold is chosen as the following form [38,39]:
where are constants, and and are positive odd integers which satisfy .
Theorem 1.
Proof.
Substituting (19) and (20) into the above gives
Further substituting (21) into the above equation gives
Introduce a candidate Lyapunov function given by . Taking the derivative of along the trajectories of (16), and using the above expression, it follows that
From the conditions (13), (14) and the above, we have
it can be seen that measurable error subsystem (17) will reach to within the finite-time ; in other words, , Once the ideal sliding-mode is established, the measurable error subsystem (17) will maintain on thereafter and behaves in an identical fashion as , which will converge to zero along in the finite-time . □
4.2. Unmeasurable Error Subsystem
For the unmeasurable error subsystem in (16), namely
Define an area for unmeasurable near zero as
where is a positive constant and defined as , is defined in (14), and is a positive constant, which can be chosen by .
The purpose of introducing the area is to design a output injection strategy in the following Theorem for increasing the convergence speed of the error , when it is outside .
Theorem 2.
The unmeasurable error subsystem (23) will converge to zero asymptotically, if the output injection is given by
where , is a constant defined in (7), and is a constant.
Proof.
The error state space of can be divided into two different areas, and , and defined, respectively, as and , where is defined in (24). So, two different cases, i.e., Case 1 and 2, are considered.
Case 1: the error state is in area . The measurable error subsystem (17) will move toward the sliding manifold under the output injection (19)–(21). When the measurable error subsystem reaches and stays on the sliding manifold, , under the output injection in Theorem 1, it follows from (22) that
From the above equation and (26), it gives that
As is in area , the inequality holds. According to (28) and the above inequality, we can have that . So, the output injection (25) can be rewritten as
As we have that , where is defined in (24), and is defined in (14), further, we can obtain that . For the case of , similarly, we can have that . So, it can be concluded that
According to the above equation, the output injection (29) can be rewritten as
further substituting (31) into (23), the unmeasurable error subsystem (23) can be reformed as
Consider a candidate Lyapunov function . Taking the time-derivative of yields
which means that, in Case 1, the error state in area must converge into the area in a finite-time.
Case 2: is in area . The inequality holds. According to (28) and the above inequality, it can be obtained that . Therefore, the output injection (25) becomes , and the system (23) is rewritten as
To prove the stability of the system (33), consider the Lyapunov function [32] as
where g, , for , and , for , are all positive constants to be determined.
Define , , and is the symmetric matrix, where , , , , , , , , , , , , , , and is a sufficient small positive value.
From (6) in Lemma 2 and the above inequality, it can be obtained as
which ensures the asymptotic stability of the error system (33), i.e., , will converge to zero asymptotically.
The state space of can be divided into two different areas, and . In Case 1, when the state is in , the output injection strategies (25)–(26) drive the error system (32) converging to the area in a finite time. Once the state reached and entered the area , namely Case 2 occurred, and the error system (33) will converge to zero asymptotically. That means the the unmeasurable error subsystem (23) will converge to zero asymptotically. □
Remark 1.
In practice, the output injection strategies (25)–(26) are implemented by , where is a boxcar function and expressed by
where is a constant.
The whole state space of and can be divided into two different areas, and , defined as and .
When the system states are in , the boxcar function , and then in (25) is equal to zero, which means that the measurable error subsystem (17) has not reached to the sliding manifold . In this case, the output injection (25) has not been applied in the unmeasurable error subsystem (23).
The measurable error subsystem (17) will move toward the sliding manifold under the output injection (19)–(21). Once it reaches to , the system states enter into the area . σ is selected as a small constant for practical implementation.
The output injection strategies (19)–(21) in Theorem 1 drive the error subsystem (17) toward the sliding manifold and remain on the manifold thereafter, which guarantees the system states to converge into the area in a finite-time. Then, the unmeasurable error system (23) will converge to zero asymptotically.
In ideal condition, , i.e., the ideal sliding-mode can be detected. However, in practical environments, detecting ideal is not possible. So, we can just only detect an area near zero, . In this case, substituting (19) and (20) into (18), we have , where . Hence, it can be chosen σ as , where . It should be noted that σ can affect only the convergence speed in dynamical process but cannot affect the final observation.
Theorem 3.
If the two output injection signals in the error system (16) are designed using Theorems 1 and 2, respectively, the estimation errors and . Then, the ATF dynamics in (9) can be estimated by as
where is designed in (19).
5. Real Traffic Replay Results
The real traffic replay results are given to varify the effectiveness of the proposed TSMO method in real-time.
5.1. Real Traffic Replay Setup
For experimental purposes, we used the real traffic dataset from CAIDA, which is governed by the Regents of the University of California and located at the University of California San Diego (UCSD) [40].
In the paper, the CAIDA “DDoS Attack 2007” dataset is used to test the proposed method. This dataset contains approximately one hour of anonymized traffic traces from a DDoS attack on 4 August 2007 ( UTC to UTC). The DDoS attack attempts to disrupt access to the targeted server and all of the bandwidth of the network connecting the server to the Internet, by consuming computing resources on the server. The 1-h trace is split up into 5-min pcap files, where pcap is an application programming interface for capturing network traffic. The total uncompressed size of the dataset is 21 GB. The traces only include attack traffic to the victim and responses to the attack from the victim. The non-attack traffic in the traces has been removed as much as possible. Traces in this dataset are anonymized using CryptoPAn prefix-preserving anonymization using a single key. The payload has been removed from all packets. These traces can be read with any software that reads the format of packet capture (pcap), including the CoralReef Software Suite, Tcpdump, Wireshark, and many others. The details of traffic features are shown in Table 1. In this experiment, the real-time DDoS attack scenarios for the CAIDA datasets are considered. This collection groups the backscatter datasets, which were created from the massive amount of data continuously collected from the UCSD Network Telescope.
Table 1.
Traffic features of Caida “DDoS Attack 2007” dataset [40].
To study the network traffic behavior, a network simulator is used to set up network environments. It is a discrete event-based network simulator for networking research, which contains the necessary features, e.g., a traffic trace generator, to replay the real traffic traces profiles.
A typical star topology of the TCP/IP network consisting of a number of hosts and clients with one network gateway is considered in the study. There are N source agents and destination agents being created to represent the hosts and clients in the network, respectively, where . The ‘newreno tcp’ agents are used for the sources with ‘ftp’ connections to generate long-lived TCP flows to the destination clients. The maximum value of in each ‘tcp’ agent is set to be the same as Mb. The link capacity C of the network gateway router is set to be 15 Mb. Moreover, the packet size is set to be 500 bytes. The connections between each host/client and the router are set by ‘full-duplex’, which construct bi-directional links at propagation delay ms. The proportional integral (PI) AQM mechanism is applied to regulate the queue length (QL) at a desired value of packets in router buffer [41]. The capacity of router buffer is set to be 800 packets. A traffic trace generates payload bursts according to the given trace file of the DDoS attack profile from the CAIDA Dataset. In the network simulator, traffic trace is implemented by using the C++ class ‘TrafficTrace’, which is bound to the specified real DDoS attack traffic trace file in the OTcl domain.
A hundred distributed attackers are created and attached with the real traffic trace files from the CAIDA datasets. In the paper, an increasing rate attack profile of the CAIDA DDoS 2007 datasets is used to test the proposed method. This DoS attack lasts a period of five min.
The parameters in the linearized TCP/IP network model (9) are: , , , , and .
5.2. Real Traffic Replay Results and Discussion
Figure 2, Figure 3, Figure 4, Figure 5, Figure 6 and Figure 7 depict the experimental results of the proposed TSMO-based NTM in the scenarios of CAIDA Dataset-6 and Dataset-11. Figure 2 and Figure 5 shows the traffic dynamics of QL captured at the router, which includes the normal traffic flows and the DDoS attack profiles. With simple observations at this traffic dynamics of QL, the anomalies displayed in the traffic dynamics cannot be identified and detected in real-time. By contrast, the TSMO-based real-time NTM scheme, which is implemented at the router, is capable to extract TCP traffic flows from the total traffic dynamics in the buffer and estimate the dynamics of ATF for anomaly detection.
Figure 2.
Queue length measured in router buffer in increasing rate attack profile of CAIDA Dataset-6.
Figure 3.
Estimation of in increasing rate attack profile of CAIDA Dataset-6.
Figure 4.
Estimation of attack rate in increasing rate attack profile of CAIDA Dataset-6.
Figure 5.
Queue length measured in router buffer in increasing rate attack profile of CAIDA Dataset-11.
Figure 6.
Estimation of in increasing rate attack profile of CAIDA Dataset-11.
Figure 7.
Estimation of attack rate in increasing rate attack profile of CAIDA Dataset-11.
As the Theorem 1, the measurable error subsystem (17) will reach to the predesigned manifold (18), i.e., , within the finite-time . Therefore the estimation error of QL is governed by the output injection (19) to converge to zero in the finite-time along .
In addition to forcing the estimation error to zero in the finite-time, the other aim is to speed up the convergence of the internal dynamics of the error system (16) for precision estimation to meet the real-time criteria. By Theorem 2, the internal dynamics, i.e., the estimation error , is forced to the defined area (24) in the finite-time and then converges to zero asymptotically. As presented in Figure 3 and Figure 6, the congestion window is accurately estimated, which reflects the serious degradations in sending rate, throuput and bandwidth utilization in the networks when the DDoS attacks started in the scenario. From the Theorem 3, the dynamics of ATF, i.e., , which is represented by the increasing rate attack profile and the subgroup attack profile from the CAIDA datasets, is quickly and exactly estimated. The results of the estimated dynamics of DDoS rate are depicted in Figure 4 and Figure 7.
As the experimental results illustrated in Figure 2, Figure 3, Figure 4, Figure 5, Figure 6 and Figure 7, the proposed TSMO-based NTM presents a good tracking performances of the real traffic trace profile for anomaly detection with the main features of the SMC systems. This real traffic replay experimental results demonstrated the effectiveness and efficiency of the proposed TSMO algorithms in a real-time monitoring capability under real traffic profile environments.
5.3. Comparative Studies
Four different observer algorithms are evaluated in the real traffic replay tests.
5.3.1. The Luenberger Observer (LO)
The output injection strategies of the LO can be designed as [12]:
where is the estimate of in (9), and are the output injection signals of the observer, and and are the gains of the output injection.
5.3.2. The Conventional Sliding Mode Observer (CSMO)
The CSMO chooses the linear sliding surface by the following:
, where is a constant, and the estimation error is defined by . The output injection is equal to zero, and the output injection is designed as [21]:
with , is the gain of the output injection.
As highly frequent switching phenomenon existed in due to the signum function, a low-pass filter is needed to extract the equivalent signal.
5.3.3. The Super-Twisting Observer (STO)
A sliding-mode surface is selected as , where . The is equal to zero, and the is designed by [22]:
where both and are positive constant.
5.3.4. The Terminal Sliding Mode Observer (TSMO)
The output injection strategies of the proposed TSMO are designed using Theorem 1 and 2.
Four observers are implemented as: (1). The parameters of the LO are designed as and , and (2). for the CSMO, the parameters are designed as: , , and . (3). The parameters of the STO are chosen as and . (4). The proposed TSMO: , , , , , and .
In order to make a fair comparison, the parameters of the four types of observer schemes are repeatedly tested, and, thereby, the optimal parameters are obtained. In the processing, the tradeoff between the dynamic performances and the steady-state performances of the closed-loop error system is made. In this condition, the convergence speed and steady-state performances are compared each other for these observers.
To make the quantitative comparisons among the four kinds of observer algorithms in terms of the steady-state performances of closed-loop error systems, Table 2 provides the average displacement error (ADE) and the standard deviation of displacement error (SDE) in the scenario. From the comparative results in Table 2, the proposed TSMO features the fastest dynamical response and the best steady-state accuracies of estimating and compared to other existing three observers.
Table 2.
Comparisons of steady-state performances of four observers in scenario I.
6. Conclusions
This paper has proposed an SMO-based network traffic monitoring approach to estimate the ATF dynamics. The main contributions of this work can be summarized as follows: (i) One output injection of the observer is specially designed to be smooth using the full-order SMC technique. It can be directly used for the estimation of traffic flows in real time, does not need any low-pass filter. (ii) The novel strategy for another output injection of the observer is proposed to increase the convergence speed of the internal dynamics of the observer, which can improve the speed of the estimation algorithms. (iii) The proposed TSMO can be used for a class of linear systems with time-varying delay where some system states are unmeasurable. For the proposed observer, the parameters in the algorithms are to be carefully set. The experimental results have verified the efficiency of the proposed TSMO by comparative studies in real traffic profiles from the CAIDA DDoS attack datasets. The future work will focus on anomaly detection applications considering the multiple area communication networks.
Author Contributions
Conceptualization, L.X.; Data curation, L.X. and W.X.; Formal analysis, L.X. and M.Z.; Funding acquisition, L.X. and W.X.; Investigation, L.X.; Methodology, L.X. and M.Z.; Project administration, L.X.; Resources, L.X.; Software, L.X. and W.X.; Supervision, L.X.; Validation, L.X. and L.C.; Visualization, L.X.; Writing—original draft, L.X.; Writing—review & editing, L.X. All authors have read and agreed to the published version of the manuscript.
Funding
This research was funded by National Natural Science Foundation of China under Grant No. 62003086, and by Shanghai Pujiang Program under Grant No. 21PJ1422000, and by Guangdong Basic and Applied Basic Research Foundation under Grant No. 2020A1515110148, and by Heilongjiang Industrial Revitalization Major Project on Engineering and Science under Grant No. 2019ZX02A01.
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
Not applicable.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Yan, Q.; Huang, W.; Luo, X.; Gong, Q.; Yu, F.R. A multi-level DDoS mitigation framework for the industrial internet of things. IEEE Commun. Mag. 2018, 56, 30–36. [Google Scholar] [CrossRef]
- Sarker, I.H.; Abushark, Y.B.; Alsolami, F.; Khan, A.I. Intrudtree: A machine learning based cyber security intrusion detection model. Symmetry 2020, 12, 754. [Google Scholar] [CrossRef]
- Zegzhda, D.; Lavrova, D.; Pavlenko, E.; Shtyrkina, A. Cyber attack prevention based on evolutionary cybernetics approach. Symmetry 2020, 12, 1931. [Google Scholar] [CrossRef]
- Faisal, M.A.; Aung, Z.; Williams, J.R.; Sanchez, A. Data-stream-based intrusion detection system for advanced metering infrastructure in smart grid: A feasibility study. IEEE Syst. J. 2015, 9, 31–44. [Google Scholar] [CrossRef]
- Yang, Y.; McLaughlin, K.; Sezer, S.; Littler, T.; Im, E.G. Multiattribute SCADA-specific intrusion detection system for power networks. IEEE Trans. Power Del. 2014, 29, 1092–1102. [Google Scholar] [CrossRef] [Green Version]
- Skybakmoen, T. Next Generation Firewall Comparative Analysis- Security; NSS Labs: Austin, TX, USA, 2014; pp. 1–20. [Google Scholar]
- Niu, Y.; Ho, D.W.C. Design of sliding mode control subject to packet losses. IEEE Trans. Autom. Control 2010, 55, 2623–2628. [Google Scholar] [CrossRef]
- Zhang, S.S.; Shang, W.L.; Wan, M.; Zhang, H.; Zeng, P. Security defense module of Modbus TCP communication based on region/enclave rules. Comput. Eng. Des. 2014, 35, 3701–3707. [Google Scholar]
- Misra, V.; Gong, W.; Towsley, D. Fluid-based analysis of a network of AQM routers supporting TCP flows with an application to RED. Comput. Commun. Rev. 2000, 30, 151–160. [Google Scholar] [CrossRef]
- Ariba, Y.; Gouaisbaut, F.; Labit, Y. Feedback control for router management and TCP/IP network stability. IEEE Trans. Netw. Service Manag. 2009, 6, 255–266. [Google Scholar] [CrossRef]
- Hollot, C.V.; Misra, V.; Towsley, D.; Gong, W. Analysis and design of controllers for AQM routers supporting TCP flows. IEEE Trans. Autom. Control 2002, 47, 945–959. [Google Scholar] [CrossRef] [Green Version]
- Ariba, Y.; Gouaisbaut, F.; Rahme, S.; Labit, Y. Traffic monitoring in transmission control protocol/active queue management networks through a time-delay observer. IET Control Theory Appl. 2012, 6, 506–517. [Google Scholar] [CrossRef]
- Cao, L.; Li, H.; Wang, N.; Zhou, Q. Observer-based event-triggered adaptive decentralized fuzzy control for nonlinear large-scale systems. IEEE Trans. Fuzzy Syst. 2018, 27, 1201–1214. [Google Scholar] [CrossRef]
- Wang, Y.; Xie, X.; Chadli, M.; Xie, S.; Peng, Y. Sliding mode control of fuzzy singularly perturbed descriptor systems. IEEE Trans. Fuzzy Syst. 2020. early access. [Google Scholar] [CrossRef]
- Hou, H.; Yu, X.; Xu, L.; Restam, K.; Cao, Z. Finite-time continuous terminal sliding mode control of servo motor systems. IEEE Trans. Ind. Electron. 2020, 67, 5647–5656. [Google Scholar] [CrossRef]
- Hou, H.; Yu, X.; Fu, Z. Sliding-mode control of uncertain time-varying systems with state delays: A non-negative constraints approach. IEEE Trans. Syst. Man, Cybern. Syst. 2020. early access. [Google Scholar] [CrossRef]
- Xu, W.; Qu, S.; Zhao, L.; Zhang, H. An Improved Adaptive Sliding Mode Observer for Middle- and High-Speed Rotor Tracking. IEEE Trans. Power Electron. 2021, 36, 1043–1053. [Google Scholar] [CrossRef]
- Gong, C.; Hu, Y.; Gao, J.; Wang, Y.; Yan, L. An improved delay-suppressed sliding-mode observer for sensorless vector-controlled PMSM. IEEE Trans. Ind. Electron. 2021, 67, 5913–5923. [Google Scholar] [CrossRef]
- Li, H.; Shi, P.; Yao, D. Adaptive Sliding-Mode Control of Markov Jump Nonlinear Systems with Actuator Faults. IEEE Trans. Autom. Control 2017, 62, 1933–1939. [Google Scholar] [CrossRef]
- Wang, Y.; Gao, Y.; Karimi, H.R.; Shen, H.; Fang, Z. Sliding Mode Control of Fuzzy Singularly Perturbed Systems With Application to Electric Circuit. IEEE Trans. Syst. Man, Cybern. Syst. 2018, 48, 1667–1675. [Google Scholar] [CrossRef]
- Rahme, S.; Labit, Y.; Gouaisbaut, F. Sliding mode observer for anomaly detection in TCP/AQM networks. In Proceedings of the IEEE Second International Conference on Communication Theory, Reliability, and Quality of Service (CTRQ’2009), Colmar, France, 20–25 July 2009; pp. 113–118. [Google Scholar]
- Rahme, S.; Labit, Y.; Gouaisbaut, F.; Floquet, T. Sliding modes for anomaly observation in TCP networks: From theory to practice. IEEE Trans. Control Syst. Technol. 2013, 21, 1031–1038. [Google Scholar] [CrossRef] [Green Version]
- Hou, H.; Yu, X.; Xu, L.; Chuei, R.; Cao, Z. Discrete-time terminal sliding-mode tracking control with alleviated chattering. IEEE ASME Trans. Mechatron 2019, 24, 1808–1817. [Google Scholar] [CrossRef]
- Hou, H.; Yu, X.; Fu, Z. Sliding mode control of networked control systems: An auxiliary matrices-based approach. IEEE Trans. Autom. Control 2021. early access. [Google Scholar] [CrossRef]
- Yang, H.; Yin, S. Reduced-Order Sliding-Mode-Observer-Based Fault Estimation for Markov Jump Systems. IEEE Trans. Autom. Control 2019, 64, 4733–4740. [Google Scholar] [CrossRef]
- Chen, S.; Zhang, X.; Wu, X.; Tan, G.; Chen, X. Sensorless Control for IPMSM Based on Adaptive Super-Twisting Sliding-Mode Observer and Improved Phase-Locked Loop. Energies 2019, 12, 1225. [Google Scholar] [CrossRef] [Green Version]
- Zheng, W.; Xia, B.; Wang, W.; Lai, Y.; Wang, M.; Wang, H. State of Charge Estimation for Power Lithium-Ion Battery Using a Fuzzy Logic Sliding Mode Observer. Energies 2019, 12, 2491. [Google Scholar] [CrossRef] [Green Version]
- Khalil, H.K.; Praly, L. High-gain observers in nonlinear feedback control. Int. J. Robust. Nonlinear Control. 2014, 24, 993–1015. [Google Scholar] [CrossRef]
- Beltran-Carbajal, F.; Valderrabano-Gonzalez, A.; Favela-Contreras, A.R.; Rosas-Caro, J.C. Active disturbance rejection control of a magnetic suspension system. Asian J. Control 2015, 17, 842–854. [Google Scholar] [CrossRef]
- Kim, K.S.; Rew, K.H.; Kim, S. Disturbance observer for estimating higher order disturbances in time series expansion. IEEE Trans. Autom. Control 2015, 17, 842–854. [Google Scholar]
- Bhat, S.P.; Bernstein, D.S. Finite-time stability of continuous autonomous systems. SIAM J. Control Optim. 2000, 38, 751–766. [Google Scholar] [CrossRef]
- He, Y.; Wang, Q.; Linb, C.; Wua, M. Delay-range-dependent stability for systems with time-varying delay. Automatica 2007, 43, 371–376. [Google Scholar] [CrossRef]
- Hatzivasilis, G.; Fysarakis, K.; Soultatos, O.; Askoxylakis, I.; Demetriou, G. The Industrial Internet of Things as an enabler for a Circular Economy Hy-LP: A novel IIoT protocol, evaluated on a wind park’s SDN/NFV-enabled 5G industrial network. Comput. Commun. 2018, 119, 127–137. [Google Scholar] [CrossRef]
- Chuck, F.; Moon, S.; Lyles, B.; Cotton, C.; Khan, M.; Moll, D.; Rockell, R.; Seely, T.; Diot, S.C. Packet level traffic measurements from the sprint IP backbone. IEEE Netw. 2003, 17, 6–16. [Google Scholar]
- Jacobson, V.; Braden, R.T. TCP extensions for long-delay paths. Network Working Group Request for Comments: 1072. 1988. Available online: https://www.rfc-editor.org/info/rfc1072 (accessed on 17 May 2020).
- Appenzeller, G.; Keslassy, I.; McKeown, N. Sizing router buffers. Comput. Commun. Rev. 2004, 34, 281–292. [Google Scholar] [CrossRef]
- Stevens, W. TCP slow start, congestion avoidance, fast retransmit, and fast recovery algorithms. Network Working Group Request for Comments: 2001. 1996. Available online: https://datatracker.ietf.org/doc/html/rfc2001 (accessed on 17 May 2020).
- Feng, Y.; Yu, X.; Man, Z. Non-singular terminal sliding mode control of rigid manipulators. Automatica 2002, 38, 2159–2167. [Google Scholar] [CrossRef]
- Feng, Y.; Han, F.; Yu, X. Chattering free full-order sliding-mode control. Automatica 2014, 50, 1310–1314. [Google Scholar] [CrossRef]
- The CAIDA UCSD “DDoS Attack 2007” Dataset. Available online: https://www.caida.org/data/passive/ddos-20070804_dataset.xml (accessed on 17 May 2020).
- Hollot, C.V.; Misra, V.; Towsley, D.; Gong, W. On designing improved controllers for AQM routers supporting TCP flows. In Proceedings of the IEEE INFOCOM’ 2001, Anchorage, AK, USA, 24–26 April 2001; Volume 3, pp. 1726–1734. [Google Scholar]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).