Geometry-Based Data-Driven Complete Stealthy Attacks Against Cyber-Physical Systems

被引:0
|
作者
Wang, Kaiyu [1 ]
Ye, Dan [1 ,2 ]
机构
[1] Northeastern University, College of Information Science and Engineering, Shenyang,110819, China
[2] State Key Laboratory of Synthetical Automation for Process Industries, Northeastern University, Shenyang,110819, China
关键词
Cyber attacks;
D O I
10.1109/TNSE.2024.3458095
中图分类号
学科分类号
摘要
This paper proposes a data-driven complete stealthy attack strategy against cyber-physical systems (CPSs) based on the geometric approach. The attacker aims to degrade estimation performance and maintain stealthiness by compromising partial communication links of the actuator and sensor. Different from the classic analysis methods that require accurate model parameters, we focus on how to establish the connection between geometry and data-driven approaches to represent the malicious behavior of attacks on state estimation. First of all, the existence of complete stealthy attacks is analyzed. Then, the maximal attached stealthy subspace and the set of estimation errors under complete stealthy attacks are analyzed intuitively from the geometric point of view. On this basis, the complete stealthy subspace is constructed with the subspace identification method, which is applied to generate the corresponding stealthy attack sequence through the collected system input-output data. Finally, simulation results are provided to illustrate the effectiveness of the proposed strategies. © 2024 IEEE.
引用
收藏
页码:5839 / 5849
相关论文
共 50 条
  • [1] Data-driven Stealthy Actuator Attack against Cyber-Physical Systems
    Zhang, Zhixue
    Zhang, Qirui
    Liu, Tao
    Pang, Zhonghua
    Cui, Bing
    Jin, Shuxin
    Liu, Kun
    PROCEEDINGS OF THE 39TH CHINESE CONTROL CONFERENCE, 2020, : 4395 - 4399
  • [2] Stochastic Stealthy False Data Injection Attacks Against Cyber-Physical Systems
    Liu, Ruirui
    Yu, Hao
    Hao, Fei
    IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 6009 - 6020
  • [3] Stealthy Deception Attacks for Cyber-Physical Systems
    Goes, Romulo Meira
    Kang, Eunsuk
    Kwong, Raymond
    Lafortune, Stephane
    2017 IEEE 56TH ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2017,
  • [4] DDAF: Deceptive Data Acquisition Framework against Stealthy Attacks in Cyber-Physical Systems
    Shahriar, Md Hasan
    Rahman, Mohammad Ashiqur
    Haque, Nur Imtiazul
    Chowdhury, Badrul
    2021 IEEE 45TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2021), 2021, : 725 - 734
  • [5] Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks
    Miao, Fei
    Zhu, Quanyan
    Pajic, Miroslav
    Pappas, George J.
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (01): : 106 - 117
  • [6] Security Analysis for Cyber-Physical Systems against Stealthy Deception Attacks
    Kwon, Cheolhyeon
    Liu, Weiyi
    Hwang, Inseok
    2013 AMERICAN CONTROL CONFERENCE (ACC), 2013, : 3344 - 3349
  • [7] Design of Stealthy Attacks Against Interval Estimation for Cyber-Physical Systems
    Li, Zhi-Hui
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (02): : 2215 - 2222
  • [8] Optimal Strictly Stealthy Attack Design on Cyber-Physical Systems: A Data-Driven Approach
    Li, Zhuyuan
    Zhao, Zhengen
    Ding, Steven X.
    Yang, Ying
    IEEE TRANSACTIONS ON CYBERNETICS, 2024, : 6180 - 6192
  • [9] Optimal stealthy false data injection attacks in cyber-physical systems
    Li, Yi-Gang
    Yang, Guang-Hong
    INFORMATION SCIENCES, 2019, 481 : 474 - 490
  • [10] Robust Stealthy Covert Attacks on Cyber-Physical Systems
    Li, Xuerong
    Zhang, Ping
    Dong, Hongli
    IFAC PAPERSONLINE, 2022, 55 (06): : 520 - 525