A data-driven covert attack strategy in the closed-loop cyber-physical systems

被引:14
|
作者
Li, Zhe [1 ]
Yang, Guang-Hong [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang, Liaoning, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang, Liaoning, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1016/j.jfranklin.2018.05.046
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a data-driven covert attack strategy is proposed for a class of closed-loop cyber-physical systems. Without the parameters of the system plant and the nominal controller, the attacker can only use the intercepted input and output data of the nominal system. The injected input attack signals are designed based on the subspace predictive control method, which can deviate the real outputs to the expected attack references in a future time horizon. Meanwhile, by injecting the designed output attack signals for compensation, the attack cannot be detected by the anomaly detector. The simulation results of an irrigation canal system illustrate the effect of the proposed strategy with satisfactory performances. (C) 2018 The Franklin Institute. Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:6454 / 6468
页数:15
相关论文
共 50 条
  • [31] Mitigating Adversarial Attacks on Data-Driven Invariant Checkers for Cyber-Physical Systems
    Maiti, Rajib Ranjan
    Yoong, Cheah Huei
    Palleti, Venkata Reddy
    Silva, Arlindo
    Poskitt, Christopher M. M.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (04) : 3378 - 3391
  • [32] A Finite-Time Stealthy Covert Attack Against Cyber-Physical Systems
    Gheitasi, Kian
    Lucia, Walter
    [J]. 2020 7TH INTERNATIONAL CONFERENCE ON CONTROL, DECISION AND INFORMATION TECHNOLOGIES (CODIT'20), VOL 1, 2020, : 347 - 352
  • [33] DATA-DRIVEN FAULT TREE MODELING FOR RELIABILITY ASSESSMENT OF CYBER-PHYSICAL SYSTEMS
    Lazarova-Molnar, Sanja
    Niloofar, Parisa
    Barta, Gabor Kevin
    [J]. 2020 WINTER SIMULATION CONFERENCE (WSC), 2020, : 2719 - 2730
  • [34] Enabling data-driven anomaly detection by design in cyber-physical production systems
    Pinto, Rui
    Goncalves, Gil
    Delsing, Jerker
    Tovar, Eduardo
    [J]. CYBERSECURITY, 2022, 5 (01)
  • [35] Undetectable Finite-Time Covert Attack on Constrained Cyber-Physical Systems
    Gheitasi, Kian
    Lucia, Walter
    [J]. IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2022, 9 (02): : 1040 - 1048
  • [36] Covert Attack Detection Based on Hi/H∞ Optimization for Cyber-Physical Systems
    Qin, Jiao
    Zhong, Maiying
    Liu, Yang
    Wang, Xianghua
    Zhou, Donghua
    [J]. IFAC PAPERSONLINE, 2020, 53 (02): : 4487 - 4492
  • [37] Server-Edge dualized closed-loop data analytics system for cyber-physical system application
    Kim, Jun
    Lee, Ju Yeon
    [J]. ROBOTICS AND COMPUTER-INTEGRATED MANUFACTURING, 2021, 67
  • [38] Covert Attacks in Cyber-Physical Control Systems
    de Sa, Alan Oliveira
    Rust da Costa Carmo, Luiz F.
    Machado, Raphael C. S.
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (04) : 1641 - 1651
  • [39] Framework for a closed-loop cooperative human Cyber-Physical System for the mining industry driven by VR and AR: MHCPS
    Xie, Jiacheng
    Liu, Shuguang
    Wang, Xuewen
    [J]. COMPUTERS & INDUSTRIAL ENGINEERING, 2022, 168
  • [40] Covert channels in stochastic cyber-physical systems
    Lucia, Walter
    Youssef, Amr
    [J]. IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2021, 6 (04) : 228 - 237