A data-driven covert attack strategy in the closed-loop cyber-physical systems

被引:14
|
作者
Li, Zhe [1 ]
Yang, Guang-Hong [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang, Liaoning, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang, Liaoning, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1016/j.jfranklin.2018.05.046
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a data-driven covert attack strategy is proposed for a class of closed-loop cyber-physical systems. Without the parameters of the system plant and the nominal controller, the attacker can only use the intercepted input and output data of the nominal system. The injected input attack signals are designed based on the subspace predictive control method, which can deviate the real outputs to the expected attack references in a future time horizon. Meanwhile, by injecting the designed output attack signals for compensation, the attack cannot be detected by the anomaly detector. The simulation results of an irrigation canal system illustrate the effect of the proposed strategy with satisfactory performances. (C) 2018 The Franklin Institute. Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:6454 / 6468
页数:15
相关论文
共 50 条
  • [1] Data-Driven Covert-Attack Strategies and Countermeasures for Cyber-Physical Systems
    Taheri, Mahdi
    Khorasani, Khashayar
    Shames, Iman
    Meskin, Nader
    [J]. 2021 60TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2021, : 4170 - 4175
  • [2] Data-driven Stealthy Actuator Attack against Cyber-Physical Systems
    Zhang, Zhixue
    Zhang, Qirui
    Liu, Tao
    Pang, Zhonghua
    Cui, Bing
    Jin, Shuxin
    Liu, Kun
    [J]. PROCEEDINGS OF THE 39TH CHINESE CONTROL CONFERENCE, 2020, : 4395 - 4399
  • [3] A Robust Covert Attack Strategy for a Class of Uncertain Cyber-Physical Systems
    Li, Xuerong
    Zhang, Ping
    Dong, Hongli
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2024, 69 (03) : 1983 - 1990
  • [4] Data-Driven Falsification of Cyber-Physical Systems
    Kundu, Atanu
    Gon, Sauvik
    Ray, Rajarshi
    [J]. PROCEEDINGS OF THE 17TH INNOVATIONS IN SOFTWARE ENGINEERING CONFERENCE, ISEC 2024, 2024,
  • [5] Data-Driven False Data-Injection Attack Design and Detection in Cyber-Physical Systems
    Zhao, Zhengen
    Huang, Yimin
    Zhen, Ziyang
    Li, Yuzhe
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2021, 51 (12) : 6179 - 6187
  • [6] Data-driven attack policy design for cyber-physical systems under channel constraints
    Liu, He
    Li, Xiao-Jian
    [J]. INFORMATION SCIENCES, 2024, 677
  • [7] Data-Driven Mutation Analysis for Cyber-Physical Systems
    Vigano, Enrico
    Cornejo, Oscar
    Pastore, Fabrizio
    Briand, Lionel C.
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2023, 49 (04) : 2182 - 2201
  • [8] Optimal Strictly Stealthy Attack Design on Cyber-Physical Systems: A Data-Driven Approach
    Li, Zhuyuan
    Zhao, Zhengen
    Ding, Steven X.
    Yang, Ying
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2024,
  • [9] Feedback Stabilization of Cyber-Physical Systems for Sampled-Data Control: Synthesizing the Cyber and the Physical With Closed-Loop Interactions
    Huang, Lirong
    [J]. IEEE ACCESS, 2024, 12 : 21886 - 21907
  • [10] Data-Driven Injection Attack Strategy for Linear Cyber-Physical Systems: An Input-Output Data-Based Approach
    Gao, Sheng
    Zhang, Hao
    Wang, Zhuping
    Huang, Chao
    Yan, Huaicheng
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (06): : 4082 - 4095