Next Article in Journal
A Modified Krasnosel’skiǐ–Mann Iterative Algorithm for Approximating Fixed Points of Enriched Nonexpansive Mappings
Next Article in Special Issue
Dynamic Event-Triggered Integral Sliding Mode Adaptive Optimal Tracking Control for Uncertain Nonlinear Systems
Previous Article in Journal
On Enhanced GLM-Based Monitoring: An Application to Additive Manufacturing Process
Previous Article in Special Issue
Fixed-Time Formation Control for Second-Order Disturbed Multi-Agent Systems under Directed Graph
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Continuous Terminal Sliding-Mode Observer-Based Anomaly Detection Approach for Industrial Communication Networks

1
Key Laboratory of Measurement and Control of CSE, Ministry of Education, School of Automation, Southeast University, Nanjing 210096, China
2
3onedata Co., Ltd., Shenzhen 518055, China
3
3onedata Qitong Co., Ltd., Shanghai 201601, China
4
School of Electrical and Electronic Engineering, Harbin University of Science and Technology, Harbin 150001, China
5
Advanced Research Institute of Multidisciplinary Science, Beijing Institute of Technology, Beijing 100081, China
*
Author to whom correspondence should be addressed.
Symmetry 2022, 14(1), 124; https://doi.org/10.3390/sym14010124
Submission received: 31 October 2021 / Revised: 14 December 2021 / Accepted: 4 January 2022 / Published: 10 January 2022
(This article belongs to the Special Issue Recent Advances in Sliding Mode Control/Observer and Its Applications)

Abstract

:
Dynamic traffic monitoring is a critical part of industrial communication network cybersecurity, which can be used to analyze traffic behavior and identify anomalies. In this paper, industrial networks are modeled by a dynamic fluid-flow model of TCP behavior. The model can be described as a class of systems with unmeasurable states. In the system, anomalies and normal variants are represented by the queuing dynamics of additional traffic flow (ATF) and can be considered as a disturbance. The novel contributions are described as follows: (1) a novel continuous terminal sliding-mode observer (TSMO) is proposed for such systems to estimate the disturbance for traffic monitoring; (2) in TSMO, a novel output injection strategy is proposed using the finite-time stability theory to speed up convergence of the internal dynamics; and (3) a full-order sliding-mode-based mechanism is developed to generate a smooth output injection signal for real-time estimations, which is directly used for anomaly detection. To verify the effectiveness of the proposed approach, the real traffic profiles from the Center for Applied Internet Data Analysis (CAIDA) DDoS attack datasets are used.

1. Introduction

An industrial network is a communication network that applied in an industrial environment, i.e., manufacturing, power generation, energy distribution, and transportation, with protocols to provide real-time control and monitoring of industrial systems. Due to the development of the Industrial Internet of Things (IIoT), a variety of technologies, such as sensors, wireless communications, and computing, have paved the way from local to remote networks for performing remote operations, monitoring, and maintenance through the Internet. Security concerns about the IIoT have been raised. On 21 October 2016, attackers utilize the Mirai IoT botnet to launch high-impact distributed denial of service (DDoS) attacks against the Dyn DNS service, which caused an extended Internet outage [1]. Therefore, the vulnerability of industrial networks have reinforced the importance of safety and security to protect industrial systems against cyber threats [2]. To detect and prevent the attacks, researchers are focused on designing traffic monitoring devices, such as firewalls and intrusion detection systems (IDSs), placed at different levels of industrial networks to detect and prevent attacks [3].
In the past years, many IDS methods have been proposed for monitoring malicious activities in industrial networks. By the types of information source, IDSs can be classified into two types: host-based IDSs (HIDSs) and network-based IDSs (NIDSs). HIDSs monitor the characteristics of information in hosts to detect anomalous behavior. A data stream mining-based HIDS is proposed for the advanced metering infrastructure to collect and analyze energy usage data [4]. A novel multiattribute HIDS is developed in supervisory control and data acquisition (SCADA) cybersystems [5]. On the other hand, NIDSs analyze network activities in terms of traffic volume, protocol usage, IP address, and so on. Several NIDSs are proposed at network gateways, e.g., firewalls or routers, to online monitor the whole networks. For example, a deep packet inspection method is proposed to deal with high-layer protocols in terms of performance indexes at firewalls [6]. However, the typical case of limited-size data packets are not considered. A Markov chain NIDS is investigated to study the performance of rule-based IP traffic include throughput, packet loss, and packet delay at firewalls [7]. Furthermore, a filtering system-based NIDS is developed to block spurious traffic by using an IP packet queuing engine [8]. With the increased complexity and the growing amount network usages, the static analytical approach fails to meet the monitoring criteria in accuracy and efficiency. Thus, the real-time monitoring approach is needed to analyze network traffic at network gateways to detect malicious attacks. The dynamics of industrial TCP networks in routers can be expressed as a fluid-flow model by using stochastic differential nonlinear equations [9]. Based on the model, some observers have been proposed for the dynamical network monitoring system [10]. The observers are capable to detect anomalies. Since the anomalies are being considered as perturbations in the systems, observers can be designed to estimate the anomalies [11].
The current observers for traffic monitoring can be classified into two categories: linear observers and nonlinear observers. The linear observer strategy is developed to feed back the output errors in a linear manner. For example, the Luenberger observers (LOs) are developed to monitor the TCP traffic flows [12]. Moreover, LOs are synthesized to reconstruct the unmeasurable congestion window, i.e., C w n d , for traffic estimations. The time-delay observers are applied to supervise the network via TCP flow estimations and detecting anomalies. However, they are unable to accurately estimate the system states in the presence of unknown signals or uncertainties [13]. Thus, the fuzzy observers (FOs) are designed by using a Takagi-Sugeno (T-S) system that consists of a number of linear time-invariant models to achieve global performance [14], whereas the local linear observers of FOs are still hardly able to force the estimation errors to zero. The nonlinear observers, such as sliding-mode observers (SMOs), are applied for traffic monitoring [15,16]. SMOs are designed using sliding-mode control (SMC) method. SMC has unique properties, such as low sensitivity to parameter variations and strong robustness to external disturbances, and has been applied in many areas [17,18,19,20]. The existing SMOs can be classified into two types, i.e., linear SMOs and terminal SMOs. The linear SMOs that include conventional SMOs (CSMOs) and super-twisting observers (STOs) use the linear hypersurface with asymptotic stability. For example, CSMOs are proposed for traffic monitoring and detecting anomalies [21]. In the CSMOs, low-pass filters are used to soften the signals with high frequency components, which cause a phase lag and delay. To deal with the chattering phenomenon, STOs are proposed to estimate ATF without any low-pass filters [22]. However, the STOs are activated when the estimate errors converged to zero, which results in a long start-up time. In contrast, terminal SMOs employ the nonlinear a hypersurface and drive the estimate errors to the hypersurface in finit-time [23,24,25,26,27].
Different from the existing observer methods for anomaly detection under the network communication scenario [28,29,30], the novel terminal sliding-mode observer (TSMO) is proposed with the contributions described as: (1) TSMO is designed for disturbance estimation with the properties of finite-time convergence of the estimation error; (2) the proposed TSMO can increase the convergence speed of the internal dynamics to meet the criteria for real-time anomaly detection; (3) a full order sliding mode is designed to achieve a smooth output injection and is directly applied for estimation; and (4) the TSMO is proposed to increase the estimation dynamics of the abnormal traffic, in which the estimation error will converge to a bounded small area within a finite-time and then converge to zero asymptotically. For the network communication scenarios, it is required to meet two criterias: robustness and smooth output injection signals. The results of the estimation for ATF can be further used for the anomaly detection. The paper aims at overcoming the following three challenges from the theoretical viewpoints:
  • How to develop an observer for a class of systems where parts of states are unmeasurable.
  • How to increase the convergence speed of the internal dynamics in the observer.
  • How to design a smooth output injection of the observer and apply it directly for the estimation algorithm.
The remainder of the paper is organized as follows. The fluid-flow model of industrial networks is described in Section 3. The sliding-mode observer for the system is proposed in Section 4. In Section 5, the practical traffic replay is carried out to illustrate the effectiveness of the proposed method. Finally, conclusions are given in Section 6.

2. Problem Formulation and Preliminaries

Consider a class of linear time-varying delay systems represented by
x ˙ ( t ) = A x ( t ) + A d x ( t τ ) + b u ( t ) + d δ ( t ) ,
where x t = x 1 ( t ) , x 2 ( t ) T R 2 is the system state, u ( t ) R is the control input, τ = τ ( t ) R is the time delay, δ ( t ) R is the disturbance, and A = a 11 , a 12 ; a 21 , a 22 , A d = a 11 d , a 12 d ; a 21 d , a 22 d , b = 1 , 0 T , and d = 0 , 1 T are time invariant system parameters.
Some assumptions are made as: (1). the system (1) is stable; (2). the state x 2 is measurable; and (3). the state x 1 is unmeasurable.
The objective in the paper is to design an observer for estimating the disturbance δ ( t ) in (1). Now, an observer is proposed for the system (1) in the form
x ^ ˙ ( t ) = A x ^ ( t ) + A d x ^ ( t τ ) + b u ( t ) + v ( t ) ,
where x ^ ( t ) = x ^ 1 ( t ) , x ^ 2 ( t ) T R 2 is the estimate of x t , and v ( t ) = v 1 ( t ) , v 2 ( t ) T R 2 is the output injection of the observer.
If the errors between the estimates and the true states are written as e ( t ) = x ^ ( t ) x ( t ) , then, from (1) and (2), the following error system is obtained
e ˙ ( t ) = A e ( t ) + A d e ( t τ ) d δ ( t ) + v ( t ) ,
and the estimate of the disturbance δ ( t ) follows that
δ ^ ( t ) = lim e ( t ) 0 v 2 ( t ) .
The estimation process includes the following two steps:
  • The error system (3) converges to zero asymptotically or in finite-time by using the output injection of the observer.
  • Once the error system (3) converges to zero, the disturbance in (1) can be estimated using (4).
The output injection of the observer v ( t ) in (2) can only utilize the measurable error e 2 , i.e., v 1 = v 1 ( e 2 ) , v 2 = v 2 ( e 2 ) . The output injection v 2 = v 2 ( e 2 ) can be designed to force e 2 converging to zero, although there exists unmeasurable e 1 and disturbance δ ( t ) in the error system (3). However, in the conventional observer [22], there is no output injection v 1 for the internal dynamics of error system (3). In such a case, the error state e 1 will converge to zero asymptotically due to the assumption 1. As a result, the convergence of e 1 cannot be affected by the signal v 2 and may be very slow. To address this problem in the conventional methods, an output injection signal v 1 is proposed to the error system (3), which aims at speeding up the convergence of the internal dynamics of the error system (3).
When the error system (3) converges to zero, the estimate of the disturbance can be obtained using (4). Hence, the output injection of the observer v 2 ( t ) is required to be smooth, which is a challenge to the design of the SMO.
Two Lemmas are stated below and will be used in the proof of the Theorems later.
Lemma 1
([31]). Given a nonlinear system x ˙ = f ( x ) , where x R n , f ( 0 ) = 0 , and f · : R n R n is a continuous function. If there exists a continuous positive definite function V ( x ) such that V ˙ ( x ) + c V α ( x ) 0 , where c > 0 and α ( 0 , 1 ) are two constants. Then, V ( x ) , V ( x 0 ) 0 , approaches to zero in a finite-time T, where T V 1 α ( x 0 ) / ( c ( 1 α ) ) .
To prove the Theorems in the paper, the stability of the following form of linear systems with time-varying delay is considered:
x ˙ ( t ) = A x ( t ) + A d x ( t τ ( t ) ) , t > 0 , x ( t ) = φ ( t ) , t [ τ 2 , 0 ] ,
where x ( t ) R n is the state, A and A d are constant matrices with appropriate dimensions, the time delay, τ ( t ) , is a time-varying continuous function that satisfies τ 1 < τ ( t ) < τ 2 and τ ˙ ( t ) μ , where τ 1 , τ 2 , and μ are all known positive constants, and the initial condition, φ ( t ) R n , is a continuous function of t [ τ 2 , 0 ] .
Lemma 2
([32]). The system (5) is asymptotically stable if there exist matrices P > 0 ; Q i > 0 , Z j > 0 , for i = 1 , 2 , 3 , and j = 1 , 2 ; N i , M i , and S i , i = 1 , 2 with appropriate dimensions such that the following LMI holds:
Φ = ϕ ι ν 8 × 8 < 0 ,
whereΦis the symmetric matrix, ι , ν = 1 , 2 , , 8 , ϕ 11 = 2 PA + Q 1 + Q 2 + Q 3 + 2 N 1 , ϕ 12 = PA d + N 2 N 1 + S 1 M 1 , ϕ 13 = M 1 , ϕ 14 = S 1 , ϕ 15 = τ 2 N 1 , ϕ 16 = τ 12 S 1 , ϕ 17 = τ 12 M 1 , ϕ 18 = A 11 υ , ϕ 22 = ( 1 μ ) Q 3 + 2 S 2 2 N 2 2 M 2 , ϕ 23 = M 2 , ϕ 24 = S 2 , ϕ 25 = τ 2 N 2 , ϕ 26 = τ 12 S 2 , ϕ 27 = τ 12 M 2 , ϕ 28 = A 11 d υ , ϕ 33 = Q 1 , ϕ 44 = Q 2 , ϕ 55 = τ 2 Z 1 , ϕ 66 = τ 12 ( Z 1 + Z 2 ) , ϕ 77 = τ 12 Z 2 , ϕ 88 = υ , ϕ ι ν = 0 , for ν > ι and ι = 3 , 4 , , 7 , υ = τ 2 Z 1 + τ 12 Z 2 , and τ 12 = τ 2 τ 1 .

3. Fluid-Flow Model of Industrial Networks

Industrial networks interconnect various industrial control systems (ICS), e.g., local-area switched networks, such as distributed control systems, and wide-area routed networks, such as SCADA, to support the communication between devices. Most ICSs adopt some specialized protocols, such as Open Platform Communications, Modbus, Distributed Network Protocol, Inter-Control Center Protocol, Profibus, etc. However, these protocols were initially designed for serial communications and must been adapted to operate over TCP/IP networks, which is a standard Ethernet link layer and has been widely implemented at common network infrastructures. To this end, the industrial TCP/IP networks will be studied in the paper.
An industrial TCP/IP network consists of multiple hosts and clients in industrial control systems, which are physically connected in any number of topologies including star, tree, and even full-mesh. In industrial networks, a star topology is extremely common to connect to end devices [33]. So, a typical industrial TCP/IP network in a star topology is adopted in this study. In the topology, all nodes (hosts or any other industrial control systems peripherals) are connected to an industrial router. Each connected host has a dedicated, point-to-point connection between the host and the router. It is assumed that there are N homogeneous sources, i.e., all sources are the same in structure, nature, parameters, and software implementations. They connect to a destination (a host or a client devices) through a router, where two mechanisms are embedded: an Active Queue Management (AQM) and an observer. The AQM regulates the queue length in the router buffer with a randomization of choosing connections to notify the congestion, so that the network utilization can be improved. The observer is used to estimate the traffic flow and further detect its abnormal behavior of the traffics in industrial TCP/IP networks.
To describe the behavior of the traffics in industrial networks, the following fluid-flow model of TCP behavior can be used [9]:
w ˙ ( t ) = 1 τ ( t ) w ( t ) 2 w ( t τ ( t ) ) τ ( t τ ( t ) ) p ( t τ ( t ) ) q ˙ ( t ) = N w ( t ) τ ( t ) C + δ ( t ) τ ( t ) = q ( t ) C + T p ,
where w ( t ) is the average TCP congestion window size in packets. Congestion Window ( C w n d ) is a TCP state variable that limits the amount of data the TCP can send into the network before receiving an ACK. q ( t ) is expected queue length in packets. w and q are positive and bounded, i.e., w 0 , w ¯ and q 0 , q ¯ , where w ¯ and q ¯ are known and denote maximum window size and buffer size, respectively. τ ( t ) is the round-trip time in seconds which induces time varying delay in the communication channel. p ( t ) is the probability of packet loss and takes value at 0 , 1 . T p is the propagation delay in seconds. N and C are the numbers of TCP sections and the link bandwidth in packets/second, respectively.
In system (7), δ ( t ) represents the unmeasurable queuing dynamics of ATF in the network. It includes the modeling errors and anomalies. Both of them are uncertain and perturb the normal TCP/IP network behavior at the router level. In normal working conditions, δ ( t ) is around a fixed value, which forms a layer near the value; however, when an anomaly intrusion happens, it will suddenly increase.
The purpose of the paper is to estimate δ ( t ) only using q ( t ) in (7). After obtaining the estimate of δ ( t ) , we can detect and further analyze the anomalies.
The equilibrium point of system (7) is assumed as ( w 0 , q 0 ) , where w 0 is the equilibrium window size, and q 0 is the required queue length set by the AQM. p 0 is the equilibrium input value, and τ 0 is the equilibrium round-trip time. They can be determined as follows by w ˙ ( t ) = 0 and q ˙ ( t ) = 0 :
τ 0 = q 0 q 0 C C + T p w 0 = τ 0 C τ 0 C N N p 0 = 2 2 w 0 2 w 0 2 .
The system (7) can be linearized around its equilibrium point. Defining the perturbation of the equilibrium point as Δ w ( t ) = w ( t ) w 0 and Δ q ( t ) = q ( t ) q 0 , the dynamics of the industrial TCP networks (7) can be linearized to
Δ w ˙ ( t ) = N τ 0 2 C Δ w ( t ) + Δ w ( t τ ( t ) ) 1 τ 0 2 C ( Δ q ( t ) Δ q ( t τ ( t ) ) ) τ 0 C 2 2 N 2 Δ p ( t τ ( t ) ) Δ q ˙ ( t ) = N τ 0 Δ w ( t ) 1 τ 0 Δ q ( t ) + δ ( t ) ,
where q ( t ) and p ( t ) are available in the router. Some software programs, such as Netflow, PacketScope, and Loss Measurement Management, have been installed in routers. They can monitor and measure p ( t ) [34]. The congestion window w ( t ) cannot be used in the AQM or the observer because it is unmeasurable.
To simplify the design of the observer for the linearized model of the industrial TCP/IP network (8), a state transformation is made first.
Define a new state variable x ( t ) = Δ w ( t ) R , an output y ( t ) = Δ q ( t ) R , and a control u ( t ) = Δ p ( t ) R . Then, system (8) can be rewritten as
x ˙ ( t ) = a 11 x ( t ) a 11 x ( t τ ( t ) ) a 12 y ( t ) + a 12 y ( t τ ( t ) ) b d u ( t τ ( t ) ) y ˙ ( t ) = a 21 x ( t ) a 22 y ( t ) + δ ( t ) ,
where a 11 = N / τ 0 2 C , a 12 = 1 / τ 0 2 C , b d = τ 0 C 2 / 2 N 2 , a 21 = N / τ 0 , and a 22 = 1 / τ 0 . C and N are defined in (7).
The time-delay τ ( t ) in (9) satisfies the following inequality:
T p τ t q ¯ q ¯ C C + T p ,
where q ¯ , C and T p are defined in (7).
It should be noted that the lower bound of τ ( t ) is T p as defined in (10). T p is the propagation delay at the circumstance of neither congestion nor queuing delay in a router. In addition, the upper bound of τ ( t ) in (10) is the combination of the propagation delay and the maximum queuing delay under the worst case of congestion in the router buffer, i.e., τ ( t ) , cannot exceed q ¯ / C + T p .
The derivative of τ ( t ) can be assumed to satisfy
τ ˙ ( t ) μ ,
where μ is a known positive constant.
The condition of (10) and (11) can be obtained as below. Differentiating the last equation in (7) with the time t gives
τ ˙ ( t ) = 1 C N w ( t ) + δ ( t ) τ ( t ) τ ( t ) C .
The term N w ( t ) + δ ( t ) τ ( t ) in (12) is actually the amount of data being transmitted in the TCP/IP network, which is physically constrained to the TCP/IP network capacities, namely N w ( t ) + δ ( t ) τ ( t ) B D P + q ¯ where q ¯ is the buffer capacity defined in (7). BDP is the Bandwidth-Delay Product, which represents the amount of data that can be in transit [35]. BDP refers to the product of a data link’s capacity C and its round-trip delay time τ ( t ) , i.e., B D P = C τ ( t ) , where C and τ ( t ) are defined in (7). Normally, the buffer capacity of a router in (7) q ¯ is dependent on the BDP, i.e., q ¯ = μ C τ ( t ) , where μ = 1 / N is a constant [36]. Then, it can be obtained that N w ( t ) + δ ( t ) τ ( t ) C τ ( t ) + μ C τ ( t ) and furthermore, we have the condition (11) is true.
The state variable x ( t ) in the linearized model of the TCP/IP network (9) satisfies the inequality as follows:
x ( t ) w ¯ ,
where w ¯ is the known positive constant, i.e., the maximum window size, and is defined in (7).
In TCP/IP networks, the window size refers to the amount of dada that a host is currently willing to send. Normally, the maximum window size w ¯ at a host is configured as a constant, i.e., w ¯ is set as 65 , 535 (0xFFFF) bytes [37]. As seen as in (8) and (9), x ( t ) is the perturbation around the equilibrium point of w ( t ) that is limited to the known constant maximum window size w ¯ . As x ( t ) = δ w ( t ) , so | x ( t ) | cannot exceed the maximum value of w ( t ) , i.e., the inequality (13) is true.
The aformentioned amount of data being transmitted in the TCP/IP network, N w ( t ) + δ ( t ) τ ( t ) , in (12) includes traffic flow of all N TCP sections N w ( t ) , as well as the dynamics of ATF δ ( t ) τ ( t ) . It is physically constrained to the TCP/IP network capacities, namely N w ( t ) τ ( t ) + δ ( t ) C + μ C , which means that δ ( t ) ( 1 + μ ) C holds because of w ( t ) > 0 , τ ( t ) > 0 , i.e., | δ ( t ) | d m , where d m ( 1 + μ ) C is a known positive constant which can be determined in the experiments.
As δ ( t ) is physically limited to the router communication capacity, its change rate is always constrained to δ ˙ ( t ) d m / T , where T is the sampling period and kept as a constant 1 / C [9]. Hence, we have δ ˙ ( t ) d m / T ( 1 + μ ) C 2 , i.e., δ ˙ ( t ) d 1 , where d 1 ( 1 + μ ) C 2 is a known positive constant. Summarizing the analysis above gives
δ ( t ) d m , δ ˙ ( t ) d 1 ,
where both d m and d 1 are known positive constants.
The block diagram of the AQM and observer in a router is shown in Figure 1. The AQM is utilized to control the queue length q ( t ) to a required value by regulating the probability of packets loss p ( t ) . The inputs of the observer, i.e., q ( t ) and p ( t ) , are measurable states. The outputs of the observer is the estimate of δ ( t ) . The paper aims to design an observer for estimating the dynamics of ATF in real-time and further detecting anomalies in industrial networks.

4. Design of the TSM Observer

In the fluid-flow model of TCP/IP networks in (9), the ATF dynamics δ ( t ) can be considered as a disturbance. The estimate of δ ( t ) can be used for anomaly detection. To estimate δ ( t ) , an observer is proposed as
x ^ ˙ ( t ) = a 11 x ^ ( t ) a 11 x ^ ( t τ ( t ) ) a 12 y ( t ) + a 12 y ( t τ ( t ) ) b d u ( t τ ( t ) ) + v 1 ( t ) y ^ ˙ ( t ) = a 21 x ^ ( t ) a 22 y ( t ) + v 2 ( t ) ,
where x ^ ( t ) and y ^ ( t ) represent the estimates of the system state x ( t ) and output y ( t ) , respectively, and v 1 ( t ) and v 2 ( t ) are output injection for the observer.
Define ξ 1 ( t ) : = x ^ ( t ) x ( t ) and ξ 2 ( t ) : = y ^ ( t ) y ( t ) as the errors between the system states and their estimates. The error system can be obtained from (9) and (15) as follows:
ξ ˙ 1 ( t ) = a 11 ξ 1 ( t ) a 11 ξ 1 ( t τ ( t ) ) + v 1 ( t ) ξ ˙ 2 ( t ) = a 21 ξ 1 ( t ) + v 2 ( t ) δ ( t ) .
It should be noted that the state ξ 2 in error system (16) is measurable and can be used in the design of the output injection. However, the state ξ 1 is unmeasurable and cannot be used in the design of the output injection, i.e., v 1 and v 2 in (16) can include only ξ 2 .

4.1. Measurable Error Subsystem

The measurable error subsystem in (16) is firstly considered, namely
ξ ˙ 2 ( t ) = a 21 ξ 1 ( t ) + v 2 ( t ) δ ( t ) .
A TSM manifold is chosen as the following form [38,39]:
s ( t ) = ξ ˙ 2 ( t ) + α ξ 2 ( t ) + β ξ 2 ϕ ϕ ρ ρ ( t ) ,
where α , β > 0 are constants, and ρ and ϕ are positive odd integers which satisfy 1 < ρ / ϕ < 2 .
Theorem 1.
The measurable error subsystem (17) will reach the ideal sliding manifold s ( t ) = 0 firstly from any nonzero initial condition s ( 0 ) 0 in a finite-time t r | s ( 0 ) | / η 2 , then converge to zero along s ( t ) = 0 in another finite-time t s = ρ ρ α ( ρ ϕ ) α ( ρ ϕ ) ln ( α ξ 2 ( ρ ϕ ) ( ρ ϕ ) ρ ρ ( t r ) + β ) ln β , if s ( t ) is selected as (18), and the output injection is given by
v 2 ( t ) = v 2 e q ( t ) + v 2 n ( t )
v 2 e q ( t ) = a 21 x ^ ( t ) α ξ 2 ( t ) β ξ 2 ( t ) ϕ ϕ ρ ρ v ˙ 2 n ( t ) = a 12 a 21 y ( t ) + a 12 a 21 y ( t τ ( t ) )
a 21 b d u ( t τ ( t ) ) k 2 sgn ( s ( t ) ) ,
where k 2 = 2 a 11 a 21 w ¯ + d 1 + η 2 , η 2 > 0 is a constant, and w ¯ and d 1 are defined in (7) and (14), respectively.
Proof. 
From (17), the manifold (18) can be rewritten as
s ( t ) = a 21 ξ 1 ( t ) + v 2 ( t ) δ ( t ) + α ξ 2 ( t ) + β ξ 2 ϕ ϕ ρ ρ ( t ) .
Substituting (19) and (20) into the above gives
s ( t ) = a 21 x ( t ) + v 2 n ( t ) δ ( t ) .
Differentiating s ( t ) in (22) with respect to time t along the measurable error subsystem (17) yields
s ˙ ( t ) = a 21 x ˙ ( t ) + v ˙ 2 n ( t ) δ ˙ ( t ) = a 21 ( a 11 x ( t ) a 11 x ( t τ ( t ) ) a 12 y ( t ) + a 12 y ( t τ ( t ) ) b d u ( t τ ( t ) ) ) + v ˙ 2 n ( t ) δ ˙ ( t ) .
Further substituting (21) into the above equation gives
s ˙ ( t ) = a 21 ( a 11 x ( t ) a 11 x ( t τ ( t ) ) ) ( 2 a 11 a 21 w ¯ + d 1 + η 2 ) sgn ( s ( t ) ) δ ˙ ( t ) .
Introduce a candidate Lyapunov function given by V 1 ( t ) = 0.5 s 2 ( t ) . Taking the derivative of V 1 ( t ) along the trajectories of (16), and using the above expression, it follows that
s ( t ) s ˙ ( t ) = a 21 ( a 11 x ( t ) a 11 x ( t τ ( t ) ) ) s ( t ) ( 2 a 11 a 21 w ¯ + d 1 + η 2 ) s ( t ) δ ˙ ( t ) s ( t ) a 21 ( a 11 x ( t ) + a 11 x ( t τ ( t ) ) 2 a 11 w ¯ ) s ( t ) + ( δ ˙ ( t ) d 1 ) s ( t ) η 2 s ( t ) .
From the conditions (13), (14) and the above, we have
V ˙ 1 ( t ) = s ( t ) s ˙ ( t ) η 2 2 V 1 1 12 2 ( t ) < 0 , for s t 0 ;
it can be seen that measurable error subsystem (17) will reach to s ( t ) = 0 within the finite-time t r | s ( 0 ) | / η 2 ; in other words, s ( t ) = 0 , t t r . Once the ideal sliding-mode s ( t ) = 0 is established, the measurable error subsystem (17) will maintain on s ( t ) = 0 thereafter and behaves in an identical fashion as ξ ˙ 2 ( t ) = α ξ 2 ( t ) β ξ 2 ϕ ϕ ρ ρ ( t ) , which will converge to zero along s ( t ) = 0 in the finite-time t s . □
Theorem 1 yields a method of designing the output injection in (17) by only using the measurable ξ 2 ( t ) , which forces ξ 2 ( t ) to converge to zero in a finite-time, although there exist unmeasurable ξ 1 ( t ) and unknown disturbance δ ( t ) in (17).

4.2. Unmeasurable Error Subsystem

For the unmeasurable error subsystem in (16), namely
ξ ˙ 1 ( t ) = a 11 ξ 1 ( t ) a 11 ξ 1 ( t τ ( t ) ) + v 1 ( t ) .
Define an area Γ for unmeasurable ξ 1 near zero as
Γ = ξ 1 :   ξ 1 a 21 1 δ φ ,
where φ is a positive constant and defined as φ = a 21 1 d m + ε , d m is defined in (14), and ε is a positive constant, which can be chosen by 0 < ε < a 21 1 d m / 2 .
The purpose of introducing the area Γ is to design a output injection strategy in the following Theorem for increasing the convergence speed of the error ξ 1 , when it is outside Γ .
Theorem 2.
The unmeasurable error subsystem (23) will converge to zero asymptotically, if the output injection is given by
v 1 ( t ) = 0 , ξ ˜ 1 ( t ) φ k 1 sgn ξ ˜ 1 ( t ) , ξ ˜ 1 ( t ) > φ
ξ ˜ 1 ( t ) = x ^ ( t ) a 21 1 v 2 n ( t )
where k 1 = a 11 w ¯ + η 1 , w ¯ is a constant defined in (7), and η 1 > 0 is a constant.
Proof. 
The error state space of ξ 1 can be divided into two different areas, Γ o and Γ , and defined, respectively, as Γ o = ξ 1 : ξ 1 a 21 1 δ > φ and Γ = ξ 1 : ξ 1 a 21 1 δ φ , where φ > 0 is defined in (24). So, two different cases, i.e., Case 1 and 2, are considered.
Case 1: the error state ξ 1 is in area Γ o . The measurable error subsystem (17) will move toward the sliding manifold s = 0 under the output injection (19)–(21). When the measurable error subsystem reaches and stays on the sliding manifold, s ( t ) = 0 , under the output injection in Theorem 1, it follows from (22) that
s ( t ) = a 21 ξ 1 ( t ) a 21 x ^ ( t ) + v 2 n ( t ) δ ( t ) = 0 .
From the above equation and (26), it gives that
ξ ˜ 1 ( t ) = ξ 1 ( t ) a 21 1 δ ( t ) .
As ξ 1 is in area Γ o , the inequality ξ 1 a 21 1 δ > φ holds. According to (28) and the above inequality, we can have that ξ ˜ 1 ( t ) > φ . So, the output injection (25) can be rewritten as
v 1 ( t ) = k 1 sgn ξ ˜ 1 ( t ) .
As we have that ξ ˜ 1 ( t ) = ξ 1 ( t ) a 21 1 δ ( t ) < φ < 0 , where φ = a 21 1 d m + ε is defined in (24), and d m is defined in (14), further, we can obtain that ξ 1 ( t ) < φ + a 21 1 δ ( t ) = a 21 1 ( d m δ ( t ) ) ε < 0 . For the case of ξ ˜ 1 ( t ) = ξ 1 ( t ) a 21 1 δ ( t ) > φ > 0 , similarly, we can have that ξ 1 ( t ) > a 21 1 ( d m + δ ( t ) ) + ε > 0 . So, it can be concluded that
sgn ξ ˜ 1 ( t ) = sgn ξ 1 ( t ) .
According to the above equation, the output injection (29) can be rewritten as
v 1 ( t ) = k 1 sgn ξ 1 ( t ) ;
further substituting (31) into (23), the unmeasurable error subsystem (23) can be reformed as
ξ ˙ 1 ( t ) = a 11 ξ 1 ( t ) a 11 ξ 1 ( t τ ( t ) ) k 1 sgn ξ 1 ( t ) .
Consider a candidate Lyapunov function V 2 ( t ) = 0.5 ξ 1 2 ( t ) . Taking the time-derivative of V 2 ( t ) yields
V ˙ 2 = ξ 1 ( t ) ξ ˙ 1 ( t ) = a 11 ξ 1 2 ( t ) a 11 ξ 1 ( t τ ( t ) ) ξ 1 ( t ) k 1 ξ 1 ( t ) η 1 ξ 1 ( t ) < 0 , for ξ 1 ( t ) 0 ,
which means that, in Case 1, the error state ξ 1 in area Γ o must converge into the area Γ in a finite-time.
Case 2: ξ 1 is in area Γ . The inequality ξ 1 a 21 1 δ φ holds. According to (28) and the above inequality, it can be obtained that ξ ˜ 1 ( t ) φ . Therefore, the output injection (25) becomes v 1 ( t ) = 0 , and the system (23) is rewritten as
ξ ˙ 1 ( t ) = a 11 ξ 1 ( t ) a 11 ξ 1 ( t τ ( t ) ) .
To prove the stability of the system (33), consider the Lyapunov function [32] as
V 3 = g ξ 1 2 ( t ) + h 1 t T p t ξ 1 2 ( s ) d s + h 2 t q ¯ q ¯ C C + T p t ξ 1 2 ( s ) d s + h 3 t τ ( t ) t ξ 1 2 ( s ) d s + q ¯ q ¯ C C + T p 0 t + θ t z 1 ξ ˙ 1 2 ( s ) d θ + q ¯ q ¯ C C + T p T p t + θ t z 2 ξ ˙ 1 2 ( s ) d θ ,
where g, h i , for i = 1 , 2 , 3 , and z j , for j = 1 , 2 , are all positive constants to be determined.
Define X = [ ξ 1 ( t ) , ξ 1 ( t τ ( t ) ) , ξ 1 ( t T p ) , ξ 1 ( t ( q ¯ / C + T p ) ) ] T , A = [ a 11 , a 11 , 0 , 0 ] T , and Φ = ϕ ι ν 4 × 4 is the symmetric matrix, where ι , ν = 1 , 2 , , 4 , ϕ 11 = 2 g a 11 + h 1 + h 2 + h 3 + 2 n 1 , ϕ 12 = 2 g a 11 + n 2 n 1 + s 1 m 1 , ϕ 13 = m 1 , ϕ 13 = s 1 , ϕ 22 = ( 1 μ ) h 3 + 2 s 2 2 n 2 2 m 2 , ϕ 23 = m 2 , ϕ 24 = s 2 , ϕ 33 = q 1 , ϕ 34 = 0 , ϕ 44 = q 2 , M = [ m 1 , m 2 , 0 , 0 ] T , N = [ n 1 , n 2 , 0 , 0 ] T , S = [ s 1 , s 2 , 0 , 0 ] T , and γ is a sufficient small positive value.
Differentiating V 3 ( t ) with respect to time t along the error subsystem (33) gives
V ˙ 3 = 2 g ξ 1 ( t ) ξ ˙ 1 ( t ) + h 1 ξ 1 2 ( t ) ξ 1 2 ( t T p ) + h 2 ( ξ 1 2 ( t ) ξ 1 2 t ( q ¯ q ¯ C C + T p ) ) ( 1 τ ˙ ( t ) ) h 3 ξ 1 2 ( t τ ( t ) ) ) + ( q ¯ q ¯ C C + T p ) z 1 ξ ˙ 1 2 ( t ) + q ¯ C z 2 ξ ˙ 1 2 ( t ) + h 3 ξ 1 2 ( t ) z 1 t q ¯ q ¯ C C + T p t ξ ˙ 1 2 ( s ) d s t q ¯ q ¯ C C + T p t T p z 2 ξ ˙ 1 2 ( s ) d s ,
X T [ Φ + A ( q ¯ q ¯ C C + T p ) z 1 + q ¯ C z 2 A T + q ¯ C M z 2 1 M T + ( q ¯ q ¯ C C + T p ) N z 1 1 N T + q ¯ C S ( z 1 + z 2 ) 1 S T ] X t q ¯ q ¯ C C + T p t τ ( t ) ( z 1 + z 2 ) 1 [ X T S + ξ ˙ 1 ( s ) ( z 1 + z 2 ) ] × S T X + ( z 1 + z 2 ) ξ ˙ 1 ( s ) d s t τ ( t ) t z 1 1 X T N + ξ ˙ 1 ( s ) z 1 N T X + z 1 ξ ˙ 1 ( s ) d s t τ ( t ) t T p z 2 1 X T M + ξ ˙ 1 ( s ) z 2 M T X + z 2 ξ ˙ 1 ( s ) d s .
From (6) in Lemma 2 and the above inequality, it can be obtained as
V ˙ 3 < γ ξ 1 ( t ) 2 < 0 ,
which ensures the asymptotic stability of the error system (33), i.e., ξ 1 ( t ) , will converge to zero asymptotically.
The state space of ξ 1 can be divided into two different areas, Γ o and Γ . In Case 1, when the state ξ 1 is in Γ 0 , the output injection strategies (25)–(26) drive the error system (32) converging to the area Γ in a finite time. Once the state ξ 1 reached and entered the area Γ , namely Case 2 occurred, and the error system (33) will converge to zero asymptotically. That means the the unmeasurable error subsystem (23) will converge to zero asymptotically. □
Remark 1.
In practice, the output injection strategies (25)–(26) are implemented by σ , σ ( s ) × v 1 , where σ , σ ( s ) is a boxcar function and expressed by
σ , σ ( s ) = 1 , s σ 0 , s > σ ,
where σ > 0 is a constant.
The whole state space of ξ 1 and ξ 2 can be divided into two different areas, Ω 1 and Ω 2 , defined as Ω 1 = ( ξ 1 , ξ 2 ) :   s > σ and Ω 2 = ( ξ 1 , ξ 2 ) :   s σ .
When the system states ξ 1 , ξ 2 are in Ω 1 , the boxcar function σ , σ ( s ) = 0 , and then v 1 ( t ) in (25) is equal to zero, which means that the measurable error subsystem (17) has not reached to the sliding manifold s ( t ) = 0 . In this case, the output injection (25) has not been applied in the unmeasurable error subsystem (23).
The measurable error subsystem (17) will move toward the sliding manifold s = 0 under the output injection (19)–(21). Once it reaches to s = 0 , the system states ξ 1 , ξ 2 enter into the area Ω 2 = ( ξ 1 , ξ 2 ) :   s   σ . σ is selected as a small constant for practical implementation.
The output injection strategies (19)–(21) in Theorem 1 drive the error subsystem (17) toward the sliding manifold s = 0 and remain on the manifold thereafter, which guarantees the system states ξ 1 , ξ 2 to converge into the area Ω 2 in a finite-time. Then, the unmeasurable error system (23) will converge to zero asymptotically.
In ideal condition, σ = 0 , i.e., the ideal sliding-mode s = 0 can be detected. However, in practical environments, detecting ideal s = 0 is not possible. So, we can just only detect an area near zero, s < σ . In this case, substituting (19) and (20) into (18), we have a 21 ξ 1 ( t ) δ ( t ) = a 21 x ^ ( t ) v 2 n ( t ) + s ( t ) , where s ( t ) < σ . Hence, it can be chosen σ as σ = κ a 21 ξ ˜ 1 ( t ) , where κ = 0.02 0.05 . It should be noted that σ can affect only the convergence speed in dynamical process but cannot affect the final observation.
Theorem 3.
If the two output injection signals in the error system (16) are designed using Theorems 1 and 2, respectively, the estimation errors lim t ( t r + t s ) ξ 2 ( t ) = 0 and lim t ξ 1 ( t ) = 0 . Then, the ATF dynamics δ ( t ) in (9) can be estimated by as
lim t v 2 ( t ) = lim t δ ( t ) ,
where v 2 ( t ) is designed in (19).
Proof. 
Based on Theorem 1, the measurable error subsystem (16) under the output injection (19) will reach to the sliding manifold s ( t ) = 0 in the finite-time t r and maintain on s ( t ) = 0 thereafter. The unmeasurable error subsystem (17) will converge to zero in the finite-time along s ( t ) = 0 . Then, it follows from (17) that
ξ ˙ 2 ( t ) = a 21 ξ 1 ( t ) + v 2 ( t ) δ ( t ) = 0 .
From Theorem 2, the unmeasurable error state ξ 1 ( t ) under the output injection (25) will converge to zero asymptotically. From (36), the ATF dynamics δ ( t ) can be estimated directly by the smooth v 2 ( t ) in (19) when the unmeasurable error state ξ 1 ( t ) converges to zero asymptotically. This completes the proof. □

5. Real Traffic Replay Results

The real traffic replay results are given to varify the effectiveness of the proposed TSMO method in real-time.

5.1. Real Traffic Replay Setup

For experimental purposes, we used the real traffic dataset from CAIDA, which is governed by the Regents of the University of California and located at the University of California San Diego (UCSD) [40].
In the paper, the CAIDA “DDoS Attack 2007” dataset is used to test the proposed method. This dataset contains approximately one hour of anonymized traffic traces from a DDoS attack on 4 August 2007 ( 20 : 50 : 08 UTC to 21 : 56 : 16 UTC). The DDoS attack attempts to disrupt access to the targeted server and all of the bandwidth of the network connecting the server to the Internet, by consuming computing resources on the server. The 1-h trace is split up into 5-min pcap files, where pcap is an application programming interface for capturing network traffic. The total uncompressed size of the dataset is 21 GB. The traces only include attack traffic to the victim and responses to the attack from the victim. The non-attack traffic in the traces has been removed as much as possible. Traces in this dataset are anonymized using CryptoPAn prefix-preserving anonymization using a single key. The payload has been removed from all packets. These traces can be read with any software that reads the format of packet capture (pcap), including the CoralReef Software Suite, Tcpdump, Wireshark, and many others. The details of traffic features are shown in Table 1. In this experiment, the real-time DDoS attack scenarios for the CAIDA datasets are considered. This collection groups the backscatter datasets, which were created from the massive amount of data continuously collected from the UCSD Network Telescope.
To study the network traffic behavior, a network simulator is used to set up network environments. It is a discrete event-based network simulator for networking research, which contains the necessary features, e.g., a traffic trace generator, to replay the real traffic traces profiles.
A typical star topology of the TCP/IP network consisting of a number of hosts and clients with one network gateway is considered in the study. There are N source agents and destination agents being created to represent the hosts and clients in the network, respectively, where N = 60 . The ‘newreno tcp’ agents are used for the sources with ‘ftp’ connections to generate long-lived TCP flows to the destination clients. The maximum value of C w n d in each ‘tcp’ agent is set to be the same as 0.12 Mb. The link capacity C of the network gateway router is set to be 15 Mb. Moreover, the packet size is set to be 500 bytes. The connections between each host/client and the router are set by ‘full-duplex’, which construct bi-directional links at propagation delay T p = 200 ms. The proportional integral (PI) AQM mechanism is applied to regulate the queue length (QL) at a desired value of q 0 = 175 packets in router buffer [41]. The capacity of router buffer q ¯ is set to be 800 packets. A traffic trace generates payload bursts according to the given trace file of the DDoS attack profile from the CAIDA Dataset. In the network simulator, traffic trace is implemented by using the C++ class ‘TrafficTrace’, which is bound to the specified real DDoS attack traffic trace file in the OTcl domain.
A hundred distributed attackers are created and attached with the real traffic trace files from the CAIDA datasets. In the paper, an increasing rate attack profile of the CAIDA DDoS 2007 datasets is used to test the proposed method. This DoS attack lasts a period of five min.
The parameters in the linearized TCP/IP network model (9) are: a 11 = 0.2630 , a 12 = 0.0044 , b d = 481.7708 , a 21 = 243.2432 , and a 22 = 4.0541 .

5.2. Real Traffic Replay Results and Discussion

Figure 2, Figure 3, Figure 4, Figure 5, Figure 6 and Figure 7 depict the experimental results of the proposed TSMO-based NTM in the scenarios of CAIDA Dataset-6 and Dataset-11. Figure 2 and Figure 5 shows the traffic dynamics of QL captured at the router, which includes the normal traffic flows and the DDoS attack profiles. With simple observations at this traffic dynamics of QL, the anomalies displayed in the traffic dynamics cannot be identified and detected in real-time. By contrast, the TSMO-based real-time NTM scheme, which is implemented at the router, is capable to extract TCP traffic flows from the total traffic dynamics in the buffer and estimate the dynamics of ATF for anomaly detection.
As the Theorem 1, the measurable error subsystem (17) will reach to the predesigned manifold (18), i.e., s ( t ) = 0 , within the finite-time t r . Therefore the estimation error ξ 2 of QL is governed by the output injection (19) to converge to zero in the finite-time t s along s ( t ) = 0 .
In addition to forcing the estimation error ξ 2 to zero in the finite-time, the other aim is to speed up the convergence of the internal dynamics of the error system (16) for precision estimation to meet the real-time criteria. By Theorem 2, the internal dynamics, i.e., the estimation error ξ 2 , is forced to the defined area (24) in the finite-time and then converges to zero asymptotically. As presented in Figure 3 and Figure 6, the congestion window is accurately estimated, which reflects the serious degradations in sending rate, throuput and bandwidth utilization in the networks when the DDoS attacks started in the scenario. From the Theorem 3, the dynamics of ATF, i.e., δ ( t ) , which is represented by the increasing rate attack profile and the subgroup attack profile from the CAIDA datasets, is quickly and exactly estimated. The results of the estimated dynamics of DDoS rate are depicted in Figure 4 and Figure 7.
As the experimental results illustrated in Figure 2, Figure 3, Figure 4, Figure 5, Figure 6 and Figure 7, the proposed TSMO-based NTM presents a good tracking performances of the real traffic trace profile for anomaly detection with the main features of the SMC systems. This real traffic replay experimental results demonstrated the effectiveness and efficiency of the proposed TSMO algorithms in a real-time monitoring capability under real traffic profile environments.

5.3. Comparative Studies

Four different observer algorithms are evaluated in the real traffic replay tests.

5.3.1. The Luenberger Observer (LO)

The output injection strategies of the LO can be designed as [12]:
v 1 lo ( t ) = L 1 lo ( y ( t ) y ^ lo ( t ) ) , v 2 lo ( t ) = L 2 lo ( y ( t ) y ^ lo ( t ) ) ,
where y ^ lo ( t ) is the estimate of y ( t ) in (9), v 1 lo ( t ) and v 2 lo ( t ) are the output injection signals of the observer, and L 1 lo and L 2 lo are the gains of the output injection.

5.3.2. The Conventional Sliding Mode Observer (CSMO)

The CSMO chooses the linear sliding surface by the following:
s csmo ( t ) = c csmo ξ 2 csmo ( t ) , where c csmo > 0 is a constant, and the estimation error ξ 2 csmo ( t ) is defined by ξ 2 csmo ( t ) = y ^ csmo ( t ) y ( t ) . The output injection v 1 csmo ( t ) is equal to zero, and the output injection v 2 csmo ( t ) is designed as [21]:
v 2 c s m o ( t ) = L csmo ξ 2 csmo ( t ) k csmo sgn ( s csmo ( t ) ) ,
with L csmo < 0 , k csmo > 0 is the gain of the output injection.
As highly frequent switching phenomenon existed in v 2 c s m o ( t ) due to the signum function, a low-pass filter is needed to extract the equivalent signal.

5.3.3. The Super-Twisting Observer (STO)

A sliding-mode surface is selected as s sto ( t ) = ξ 2 sto ( t ) , where ξ 2 sto ( t ) = y ^ sto ( t ) y ( t ) . The v 1 sto ( t ) is equal to zero, and the v 2 sto ( t ) is designed by [22]:
v 2 sto ( t ) = k 1 s t o s sto ( t ) 0.5 sgn ( s sto ( t ) ) + v 2 n sto ( t ) v ˙ 2 n sto ( t ) = k 2 s t o sgn ( s sto ( t ) ) ,
where both k 1 s t o and k 2 s t o are positive constant.

5.3.4. The Terminal Sliding Mode Observer (TSMO)

The output injection strategies of the proposed TSMO are designed using Theorem 1 and 2.
Four observers are implemented as: (1). The parameters of the LO are designed as L 1 lo = 5 and L 2 lo = 32 , and (2). for the CSMO, the parameters are designed as: c csmo = 20 , L csmo = 100 , and k csmo = 1600 . (3). The parameters of the STO are chosen as k 1 sto = 100 and k 2 sto = 1600 . (4). The proposed TSMO: α = 15 , β = 5 , ρ = 5 , ϕ = 3 , k 1 = 7.5 , and k 2 = 1600 .
In order to make a fair comparison, the parameters of the four types of observer schemes are repeatedly tested, and, thereby, the optimal parameters are obtained. In the processing, the tradeoff between the dynamic performances and the steady-state performances of the closed-loop error system is made. In this condition, the convergence speed and steady-state performances are compared each other for these observers.
To make the quantitative comparisons among the four kinds of observer algorithms in terms of the steady-state performances of closed-loop error systems, Table 2 provides the average displacement error (ADE) and the standard deviation of displacement error (SDE) in the scenario. From the comparative results in Table 2, the proposed TSMO features the fastest dynamical response and the best steady-state accuracies of estimating w ( t ) and δ ( t ) compared to other existing three observers.

6. Conclusions

This paper has proposed an SMO-based network traffic monitoring approach to estimate the ATF dynamics. The main contributions of this work can be summarized as follows: (i) One output injection of the observer is specially designed to be smooth using the full-order SMC technique. It can be directly used for the estimation of traffic flows in real time, does not need any low-pass filter. (ii) The novel strategy for another output injection of the observer is proposed to increase the convergence speed of the internal dynamics of the observer, which can improve the speed of the estimation algorithms. (iii) The proposed TSMO can be used for a class of linear systems with time-varying delay where some system states are unmeasurable. For the proposed observer, the parameters in the algorithms are to be carefully set. The experimental results have verified the efficiency of the proposed TSMO by comparative studies in real traffic profiles from the CAIDA DDoS attack datasets. The future work will focus on anomaly detection applications considering the multiple area communication networks.

Author Contributions

Conceptualization, L.X.; Data curation, L.X. and W.X.; Formal analysis, L.X. and M.Z.; Funding acquisition, L.X. and W.X.; Investigation, L.X.; Methodology, L.X. and M.Z.; Project administration, L.X.; Resources, L.X.; Software, L.X. and W.X.; Supervision, L.X.; Validation, L.X. and L.C.; Visualization, L.X.; Writing—original draft, L.X.; Writing—review & editing, L.X. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by National Natural Science Foundation of China under Grant No. 62003086, and by Shanghai Pujiang Program under Grant No. 21PJ1422000, and by Guangdong Basic and Applied Basic Research Foundation under Grant No. 2020A1515110148, and by Heilongjiang Industrial Revitalization Major Project on Engineering and Science under Grant No. 2019ZX02A01.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Yan, Q.; Huang, W.; Luo, X.; Gong, Q.; Yu, F.R. A multi-level DDoS mitigation framework for the industrial internet of things. IEEE Commun. Mag. 2018, 56, 30–36. [Google Scholar] [CrossRef]
  2. Sarker, I.H.; Abushark, Y.B.; Alsolami, F.; Khan, A.I. Intrudtree: A machine learning based cyber security intrusion detection model. Symmetry 2020, 12, 754. [Google Scholar] [CrossRef]
  3. Zegzhda, D.; Lavrova, D.; Pavlenko, E.; Shtyrkina, A. Cyber attack prevention based on evolutionary cybernetics approach. Symmetry 2020, 12, 1931. [Google Scholar] [CrossRef]
  4. Faisal, M.A.; Aung, Z.; Williams, J.R.; Sanchez, A. Data-stream-based intrusion detection system for advanced metering infrastructure in smart grid: A feasibility study. IEEE Syst. J. 2015, 9, 31–44. [Google Scholar] [CrossRef]
  5. Yang, Y.; McLaughlin, K.; Sezer, S.; Littler, T.; Im, E.G. Multiattribute SCADA-specific intrusion detection system for power networks. IEEE Trans. Power Del. 2014, 29, 1092–1102. [Google Scholar] [CrossRef] [Green Version]
  6. Skybakmoen, T. Next Generation Firewall Comparative Analysis- Security; NSS Labs: Austin, TX, USA, 2014; pp. 1–20. [Google Scholar]
  7. Niu, Y.; Ho, D.W.C. Design of sliding mode control subject to packet losses. IEEE Trans. Autom. Control 2010, 55, 2623–2628. [Google Scholar] [CrossRef]
  8. Zhang, S.S.; Shang, W.L.; Wan, M.; Zhang, H.; Zeng, P. Security defense module of Modbus TCP communication based on region/enclave rules. Comput. Eng. Des. 2014, 35, 3701–3707. [Google Scholar]
  9. Misra, V.; Gong, W.; Towsley, D. Fluid-based analysis of a network of AQM routers supporting TCP flows with an application to RED. Comput. Commun. Rev. 2000, 30, 151–160. [Google Scholar] [CrossRef]
  10. Ariba, Y.; Gouaisbaut, F.; Labit, Y. Feedback control for router management and TCP/IP network stability. IEEE Trans. Netw. Service Manag. 2009, 6, 255–266. [Google Scholar] [CrossRef]
  11. Hollot, C.V.; Misra, V.; Towsley, D.; Gong, W. Analysis and design of controllers for AQM routers supporting TCP flows. IEEE Trans. Autom. Control 2002, 47, 945–959. [Google Scholar] [CrossRef] [Green Version]
  12. Ariba, Y.; Gouaisbaut, F.; Rahme, S.; Labit, Y. Traffic monitoring in transmission control protocol/active queue management networks through a time-delay observer. IET Control Theory Appl. 2012, 6, 506–517. [Google Scholar] [CrossRef]
  13. Cao, L.; Li, H.; Wang, N.; Zhou, Q. Observer-based event-triggered adaptive decentralized fuzzy control for nonlinear large-scale systems. IEEE Trans. Fuzzy Syst. 2018, 27, 1201–1214. [Google Scholar] [CrossRef]
  14. Wang, Y.; Xie, X.; Chadli, M.; Xie, S.; Peng, Y. Sliding mode control of fuzzy singularly perturbed descriptor systems. IEEE Trans. Fuzzy Syst. 2020. early access. [Google Scholar] [CrossRef]
  15. Hou, H.; Yu, X.; Xu, L.; Restam, K.; Cao, Z. Finite-time continuous terminal sliding mode control of servo motor systems. IEEE Trans. Ind. Electron. 2020, 67, 5647–5656. [Google Scholar] [CrossRef]
  16. Hou, H.; Yu, X.; Fu, Z. Sliding-mode control of uncertain time-varying systems with state delays: A non-negative constraints approach. IEEE Trans. Syst. Man, Cybern. Syst. 2020. early access. [Google Scholar] [CrossRef]
  17. Xu, W.; Qu, S.; Zhao, L.; Zhang, H. An Improved Adaptive Sliding Mode Observer for Middle- and High-Speed Rotor Tracking. IEEE Trans. Power Electron. 2021, 36, 1043–1053. [Google Scholar] [CrossRef]
  18. Gong, C.; Hu, Y.; Gao, J.; Wang, Y.; Yan, L. An improved delay-suppressed sliding-mode observer for sensorless vector-controlled PMSM. IEEE Trans. Ind. Electron. 2021, 67, 5913–5923. [Google Scholar] [CrossRef]
  19. Li, H.; Shi, P.; Yao, D. Adaptive Sliding-Mode Control of Markov Jump Nonlinear Systems with Actuator Faults. IEEE Trans. Autom. Control 2017, 62, 1933–1939. [Google Scholar] [CrossRef]
  20. Wang, Y.; Gao, Y.; Karimi, H.R.; Shen, H.; Fang, Z. Sliding Mode Control of Fuzzy Singularly Perturbed Systems With Application to Electric Circuit. IEEE Trans. Syst. Man, Cybern. Syst. 2018, 48, 1667–1675. [Google Scholar] [CrossRef]
  21. Rahme, S.; Labit, Y.; Gouaisbaut, F. Sliding mode observer for anomaly detection in TCP/AQM networks. In Proceedings of the IEEE Second International Conference on Communication Theory, Reliability, and Quality of Service (CTRQ’2009), Colmar, France, 20–25 July 2009; pp. 113–118. [Google Scholar]
  22. Rahme, S.; Labit, Y.; Gouaisbaut, F.; Floquet, T. Sliding modes for anomaly observation in TCP networks: From theory to practice. IEEE Trans. Control Syst. Technol. 2013, 21, 1031–1038. [Google Scholar] [CrossRef] [Green Version]
  23. Hou, H.; Yu, X.; Xu, L.; Chuei, R.; Cao, Z. Discrete-time terminal sliding-mode tracking control with alleviated chattering. IEEE ASME Trans. Mechatron 2019, 24, 1808–1817. [Google Scholar] [CrossRef]
  24. Hou, H.; Yu, X.; Fu, Z. Sliding mode control of networked control systems: An auxiliary matrices-based approach. IEEE Trans. Autom. Control 2021. early access. [Google Scholar] [CrossRef]
  25. Yang, H.; Yin, S. Reduced-Order Sliding-Mode-Observer-Based Fault Estimation for Markov Jump Systems. IEEE Trans. Autom. Control 2019, 64, 4733–4740. [Google Scholar] [CrossRef]
  26. Chen, S.; Zhang, X.; Wu, X.; Tan, G.; Chen, X. Sensorless Control for IPMSM Based on Adaptive Super-Twisting Sliding-Mode Observer and Improved Phase-Locked Loop. Energies 2019, 12, 1225. [Google Scholar] [CrossRef] [Green Version]
  27. Zheng, W.; Xia, B.; Wang, W.; Lai, Y.; Wang, M.; Wang, H. State of Charge Estimation for Power Lithium-Ion Battery Using a Fuzzy Logic Sliding Mode Observer. Energies 2019, 12, 2491. [Google Scholar] [CrossRef] [Green Version]
  28. Khalil, H.K.; Praly, L. High-gain observers in nonlinear feedback control. Int. J. Robust. Nonlinear Control. 2014, 24, 993–1015. [Google Scholar] [CrossRef]
  29. Beltran-Carbajal, F.; Valderrabano-Gonzalez, A.; Favela-Contreras, A.R.; Rosas-Caro, J.C. Active disturbance rejection control of a magnetic suspension system. Asian J. Control 2015, 17, 842–854. [Google Scholar] [CrossRef]
  30. Kim, K.S.; Rew, K.H.; Kim, S. Disturbance observer for estimating higher order disturbances in time series expansion. IEEE Trans. Autom. Control 2015, 17, 842–854. [Google Scholar]
  31. Bhat, S.P.; Bernstein, D.S. Finite-time stability of continuous autonomous systems. SIAM J. Control Optim. 2000, 38, 751–766. [Google Scholar] [CrossRef]
  32. He, Y.; Wang, Q.; Linb, C.; Wua, M. Delay-range-dependent stability for systems with time-varying delay. Automatica 2007, 43, 371–376. [Google Scholar] [CrossRef]
  33. Hatzivasilis, G.; Fysarakis, K.; Soultatos, O.; Askoxylakis, I.; Demetriou, G. The Industrial Internet of Things as an enabler for a Circular Economy Hy-LP: A novel IIoT protocol, evaluated on a wind park’s SDN/NFV-enabled 5G industrial network. Comput. Commun. 2018, 119, 127–137. [Google Scholar] [CrossRef]
  34. Chuck, F.; Moon, S.; Lyles, B.; Cotton, C.; Khan, M.; Moll, D.; Rockell, R.; Seely, T.; Diot, S.C. Packet level traffic measurements from the sprint IP backbone. IEEE Netw. 2003, 17, 6–16. [Google Scholar]
  35. Jacobson, V.; Braden, R.T. TCP extensions for long-delay paths. Network Working Group Request for Comments: 1072. 1988. Available online: https://www.rfc-editor.org/info/rfc1072 (accessed on 17 May 2020).
  36. Appenzeller, G.; Keslassy, I.; McKeown, N. Sizing router buffers. Comput. Commun. Rev. 2004, 34, 281–292. [Google Scholar] [CrossRef]
  37. Stevens, W. TCP slow start, congestion avoidance, fast retransmit, and fast recovery algorithms. Network Working Group Request for Comments: 2001. 1996. Available online: https://datatracker.ietf.org/doc/html/rfc2001 (accessed on 17 May 2020).
  38. Feng, Y.; Yu, X.; Man, Z. Non-singular terminal sliding mode control of rigid manipulators. Automatica 2002, 38, 2159–2167. [Google Scholar] [CrossRef]
  39. Feng, Y.; Han, F.; Yu, X. Chattering free full-order sliding-mode control. Automatica 2014, 50, 1310–1314. [Google Scholar] [CrossRef]
  40. The CAIDA UCSD “DDoS Attack 2007” Dataset. Available online: https://www.caida.org/data/passive/ddos-20070804_dataset.xml (accessed on 17 May 2020).
  41. Hollot, C.V.; Misra, V.; Towsley, D.; Gong, W. On designing improved controllers for AQM routers supporting TCP flows. In Proceedings of the IEEE INFOCOM’ 2001, Anchorage, AK, USA, 24–26 April 2001; Volume 3, pp. 1726–1734. [Google Scholar]
Figure 1. Block diagram of the AQM and observer in an industrial switch/router.
Figure 1. Block diagram of the AQM and observer in an industrial switch/router.
Symmetry 14 00124 g001
Figure 2. Queue length measured in router buffer in increasing rate attack profile of CAIDA Dataset-6.
Figure 2. Queue length measured in router buffer in increasing rate attack profile of CAIDA Dataset-6.
Symmetry 14 00124 g002
Figure 3. Estimation of C w n d in increasing rate attack profile of CAIDA Dataset-6.
Figure 3. Estimation of C w n d in increasing rate attack profile of CAIDA Dataset-6.
Symmetry 14 00124 g003
Figure 4. Estimation of attack rate in increasing rate attack profile of CAIDA Dataset-6.
Figure 4. Estimation of attack rate in increasing rate attack profile of CAIDA Dataset-6.
Symmetry 14 00124 g004
Figure 5. Queue length measured in router buffer in increasing rate attack profile of CAIDA Dataset-11.
Figure 5. Queue length measured in router buffer in increasing rate attack profile of CAIDA Dataset-11.
Symmetry 14 00124 g005
Figure 6. Estimation of C w n d in increasing rate attack profile of CAIDA Dataset-11.
Figure 6. Estimation of C w n d in increasing rate attack profile of CAIDA Dataset-11.
Symmetry 14 00124 g006
Figure 7. Estimation of attack rate in increasing rate attack profile of CAIDA Dataset-11.
Figure 7. Estimation of attack rate in increasing rate attack profile of CAIDA Dataset-11.
Symmetry 14 00124 g007
Table 1. Traffic features of Caida “DDoS Attack 2007” dataset [40].
Table 1. Traffic features of Caida “DDoS Attack 2007” dataset [40].
Maximum capture length for interface0:65,000
First timestamp:1,186,260,576.487629
Last timestamp:1,186,260,876.482457
Unknown encapsulation:0
IPv4 bytes:37,068,253
IPv4 pkts:166,448
IPv4 traffic:8079
Unique IPv4 addresses:136
Unique IPv4 source addresses:132
Unique IPv4 destination addresses:136
Unique IPv4 TCP source ports:4270
Unique IPv4 TCP destination ports:3348
Unique IPv4 UDP source ports:1
Unique IPv4 UDP destination ports:1
Unique IPv4 ICMP type/codes:2
Table 2. Comparisons of steady-state performances of four observers in scenario I.
Table 2. Comparisons of steady-state performances of four observers in scenario I.
Observers LOCSMOSTOTSMO
t r ( sec ) / 4.2 2.5 2.1
t s ( sec ) /AsymptoticalyAsymptoticaly 2.2
ξ 1 ( pkt / s )ADE 1.97 1.97 1.97 0.73
SDE 2.15 2.15 2.15 2.16
ξ 2 ( pkt / s )ADE 6.36 35.36 3.26 0.50
SDE 21.68 48.03 50.56 14.44
e A T F ( pkt / s )ADE 829.43 1092.28 562.18 267.51
SDE 780.45 616.56 267.61 273.54
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Xu, L.; Xiong, W.; Zhou, M.; Chen, L. A Continuous Terminal Sliding-Mode Observer-Based Anomaly Detection Approach for Industrial Communication Networks. Symmetry 2022, 14, 124. https://doi.org/10.3390/sym14010124

AMA Style

Xu L, Xiong W, Zhou M, Chen L. A Continuous Terminal Sliding-Mode Observer-Based Anomaly Detection Approach for Industrial Communication Networks. Symmetry. 2022; 14(1):124. https://doi.org/10.3390/sym14010124

Chicago/Turabian Style

Xu, Long, Wei Xiong, Minghao Zhou, and Lei Chen. 2022. "A Continuous Terminal Sliding-Mode Observer-Based Anomaly Detection Approach for Industrial Communication Networks" Symmetry 14, no. 1: 124. https://doi.org/10.3390/sym14010124

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop