Data-driven attack policy design for cyber-physical systems under channel constraints

被引:0
|
作者
Liu, He [1 ]
Li, Xiao-Jian [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Peoples R China
关键词
Cyber-physical system security; Cyber-attacks; Data-driven technology; Optimization; DATA-INJECTION ATTACKS; REMOTE ESTIMATION; FAULT-DETECTION;
D O I
10.1016/j.ins.2024.120894
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper is concerned with the design of data -driven sensor injection attack for cyber-physical systems (CPSs) under channel constraints, where the attacker can only access a part of the sensor channels and the accessible channels switch over time. To enhance the attack's effectiveness while maintaining its stealthiness, the design problem is formulated as a constraint -type L 2 - gain optimization problem. Then, by optimizing the attack -direction matrix using the data -driven parametrization method, an attack policy with channel constraints is proposed. Specifically, the necessary and sufficient design conditions are established in terms of the attack stealthiness. Furthermore, the optimized attack stealthiness index and attack effectiveness index under channel constrains are obtained, and it is theoretically proven that the attack performance is reduced due to the passive channel switching. The effectiveness of the data -driven attack policy is illustrated by the IEEE 6 bus power system.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Data-Driven False Data-Injection Attack Design and Detection in Cyber-Physical Systems
    Zhao, Zhengen
    Huang, Yimin
    Zhen, Ziyang
    Li, Yuzhe
    IEEE TRANSACTIONS ON CYBERNETICS, 2021, 51 (12) : 6179 - 6187
  • [2] Optimal Strictly Stealthy Attack Design on Cyber-Physical Systems: A Data-Driven Approach
    Li, Zhuyuan
    Zhao, Zhengen
    Ding, Steven X.
    Yang, Ying
    IEEE TRANSACTIONS ON CYBERNETICS, 2024, : 6180 - 6192
  • [3] Data-driven Stealthy Actuator Attack against Cyber-Physical Systems
    Zhang, Zhixue
    Zhang, Qirui
    Liu, Tao
    Pang, Zhonghua
    Cui, Bing
    Jin, Shuxin
    Liu, Kun
    PROCEEDINGS OF THE 39TH CHINESE CONTROL CONFERENCE, 2020, : 4395 - 4399
  • [4] Data-Driven Attack Detection and Identification for Cyber-Physical Systems Under Sparse Sensor Attacks
    Zhao, Zhengen
    Xu, Yunsong
    Li, Yuzhe
    Zhen, Ziyang
    Yang, Ying
    Shi, Yang
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2023, 68 (10) : 6330 - 6337
  • [5] Data-Driven Falsification of Cyber-Physical Systems
    Kundu, Atanu
    Gon, Sauvik
    Ray, Rajarshi
    PROCEEDINGS OF THE 17TH INNOVATIONS IN SOFTWARE ENGINEERING CONFERENCE, ISEC 2024, 2024,
  • [6] Data-Driven Covert-Attack Strategies and Countermeasures for Cyber-Physical Systems
    Taheri, Mahdi
    Khorasani, Khashayar
    Shames, Iman
    Meskin, Nader
    2021 60TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2021, : 4170 - 4175
  • [7] A data-driven covert attack strategy in the closed-loop cyber-physical systems
    Li, Zhe
    Yang, Guang-Hong
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2018, 355 (14): : 6454 - 6468
  • [8] Data-Driven Mutation Analysis for Cyber-Physical Systems
    Vigano, Enrico
    Cornejo, Oscar
    Pastore, Fabrizio
    Briand, Lionel C.
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2023, 49 (04) : 2182 - 2201
  • [9] Enabling data-driven anomaly detection by design in cyber-physical production systems
    Rui Pinto
    Gil Gonçalves
    Jerker Delsing
    Eduardo Tovar
    Cybersecurity, 5
  • [10] Enabling data-driven anomaly detection by design in cyber-physical production systems
    Pinto, Rui
    Goncalves, Gil
    Delsing, Jerker
    Tovar, Eduardo
    CYBERSECURITY, 2022, 5 (01)