Stochastic important-data-based attack model and defense strategies for cyber-physical system: A data-driven method

被引:0
|
作者
Zhang, Chunting [1 ]
Zhao, Xia [1 ,2 ,4 ]
Tian, Engang [3 ,4 ]
Zou, Yi [3 ]
机构
[1] Univ Shanghai Sci & Technol, Coll Sci, Shanghai, Peoples R China
[2] Univ Shanghai Sci & Technol, Lib, Shanghai, Peoples R China
[3] Univ Shanghai Sci & Technol, Sch Opt Elect & Comp Engn, Shanghai, Peoples R China
[4] Univ Shanghai Sci & Technol, Shanghai, Peoples R China
基金
中国国家自然科学基金; 上海市自然科学基金;
关键词
cyber-physical system; data-driven; denial-of-service; resilient estimator;
D O I
10.1002/rnc.7274
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article investigates the security ensured state estimation problem for cyber-physical system via a data-driven method. First, based on the fact that different packets possess varying a degree of significance, that is, some packets play more important roles in the state estimation than others, a novel stochastic important-data-based (IDB) attack mechanism is constructed from the attacker's perspective, which can focus on attacking the important packets thus is expected to achieve more destructiveness. Second, as a countermeasure to the proposed IDB attack, a new data-driven compensation method is proposed, for the first attempt, to compensate for the attack effect and enhance the estimation quality. The designed defense strategy has the following two advantages: (1) only system input and output data are utilized to establish the novel estimator, without knowing the actual system model knowledge, and (2) by constructing a data-driven output predictor to compensate for the data loss, the accuracy of the state estimation can be efficiently improved. With the aid of the least squares technique and completing square technique, a minimum upper bound matrix for the estimation error covariance is obtained by properly designing the estimator gain. Finally, an illustrative example is given to highlight the destructiveness of the designed stochastic IDB attack and the effectiveness of the proposed novel data-based compensation method.
引用
下载
收藏
页码:5384 / 5398
页数:15
相关论文
共 50 条
  • [1] Data-Driven Covert-Attack Strategies and Countermeasures for Cyber-Physical Systems
    Taheri, Mahdi
    Khorasani, Khashayar
    Shames, Iman
    Meskin, Nader
    2021 60TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2021, : 4170 - 4175
  • [2] Resilient filter design of fuzzy cyber-physical system subject to important-data-based DoS attacks
    You, Wenwen
    Xie, Xiangpeng
    Xia, Jianwei
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2024, 34 (11) : 7245 - 7264
  • [3] Data-driven Stealthy Actuator Attack against Cyber-Physical Systems
    Zhang, Zhixue
    Zhang, Qirui
    Liu, Tao
    Pang, Zhonghua
    Cui, Bing
    Jin, Shuxin
    Liu, Kun
    PROCEEDINGS OF THE 39TH CHINESE CONTROL CONFERENCE, 2020, : 4395 - 4399
  • [4] An integrated data-driven scheme for the defense of typical cyber-physical attacks
    Wu, Shimeng
    Jiang, Yuchen
    Luo, Hao
    Zhang, Jiusi
    Yin, Shen
    Kaynak, Okyay
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2022, 220
  • [5] Data-driven Evaluation Method for Cyber-Physical System Reliability of Integrated Energy System
    Wu, Lizhen
    He, Langchao
    Chen, Wei
    Hao, Xiaohong
    RECENT ADVANCES IN ELECTRICAL & ELECTRONIC ENGINEERING, 2023, 16 (06) : 629 - 643
  • [6] Data-Driven Falsification of Cyber-Physical Systems
    Kundu, Atanu
    Gon, Sauvik
    Ray, Rajarshi
    PROCEEDINGS OF THE 17TH INNOVATIONS IN SOFTWARE ENGINEERING CONFERENCE, ISEC 2024, 2024,
  • [7] Data-Driven False Data-Injection Attack Design and Detection in Cyber-Physical Systems
    Zhao, Zhengen
    Huang, Yimin
    Zhen, Ziyang
    Li, Yuzhe
    IEEE TRANSACTIONS ON CYBERNETICS, 2021, 51 (12) : 6179 - 6187
  • [8] POSTER: Defense against False Data Injection Attack in a Cyber-Physical System
    Padhan, Sushree
    Turuk, Ashok Kumar
    PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 1943 - 1945
  • [9] Nonlinear Granger causality graph method for data-driven target attack in power cyber-physical systems
    Li, Qinxue
    Xu, Bugong
    Li, Shanbin
    Liu, Yonggui
    Xie, Xuhuan
    TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL, 2021, 43 (03) : 549 - 566
  • [10] Novel attack-defense framework for nonlinear complex networks: An important-data-based method
    Wang, Xun
    Tian, Engang
    Wei, Bin
    Liu, Jinliang
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2023, 33 (04) : 2861 - 2878