Data-based optimal Denial-of-Service attack scheduling against robust control based on Q-learning

被引:12
|
作者
An, Liwei [1 ]
Yang, Guang-Hong [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Liaoning, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang, Liaoning, Peoples R China
基金
中国国家自然科学基金;
关键词
Cyber-physical systems; DoS attacks; multichannel transmission; Q-learning; robust control; CYBER-PHYSICAL SYSTEMS; STATE ESTIMATION; SECURE ESTIMATION; FAULT-DETECTION; DESIGN; TRANSMISSION; NETWORKS; DEFENSE;
D O I
10.1002/rnc.4666
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attack optimization is an important issue in securing cyber-physical systems. This paper investigates how an attacker should schedule its denial-of-service attacks to degrade the robust performance of a closed-loop system. The measurements of system states are transmitted to a remote controller over a multichannel network. With limited resources, the attacker only has the capacity to jam sparse channels and to decide which channels should be attacked. Under an L2 framework, a data-based optimal attack strategy that uses Q-learning is proposed to maximize the effect on the closed-loop system. The Q-learning algorithm can adaptively learn the optimal attack using data sniffed over the wireless network without requiring a priori knowledge of system parameters. Simulation results sustain the performance of the proposed attack scenario.
引用
收藏
页码:5178 / 5194
页数:17
相关论文
共 50 条
  • [1] Optimal Denial-of-Service Attack Scheduling Against Linear Quadratic Gaussian Control
    Zhang, Heng
    Cheng, Peng
    Shi, Ling
    Chen, Jiming
    2014 AMERICAN CONTROL CONFERENCE (ACC), 2014, : 3996 - 4001
  • [2] Quantized data-based iterative learning control under denial-of-service attacks
    Zhou, Chang-Ren
    Che, Wei-Wei
    OPTIMAL CONTROL APPLICATIONS & METHODS, 2023, 44 (03): : 1185 - 1199
  • [3] Optimal Denial-of-Service Attack Scheduling With Energy Constraint
    Zhang, Heng
    Cheng, Peng
    Shi, Ling
    Chen, Jiming
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (11) : 3023 - 3028
  • [4] Data-Based Security Fault Tolerant Iterative Learning Control under Denial-of-Service Attacks
    Li, Zengwei
    Zhou, Changren
    Che, Weiwei
    Deng, Chao
    Jin, Xiaozheng
    ACTUATORS, 2022, 11 (07)
  • [5] Optimal Selfish Mining-Based Denial-of-Service Attack
    Wang, Qiuhua
    Li, Chengyu
    Xia, Tianyu
    Ren, Yizhi
    Wang, Dong
    Zhang, Guoyan
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 835 - 850
  • [6] Data-Based Collaborative Learning for Multiagent Systems Under Distributed Denial-of-Service Attacks
    Xu, Yong
    Wu, Zheng-Guang
    IEEE TRANSACTIONS ON COGNITIVE AND DEVELOPMENTAL SYSTEMS, 2024, 16 (01) : 75 - 85
  • [7] Hybrid Q-learning for data-based optimal control of non-linear switching system
    LI Xiaofeng
    DONG Lu
    SUN Changyin
    JournalofSystemsEngineeringandElectronics, 2022, 33 (05) : 1186 - 1194
  • [8] Hybrid Q-learning for data-based optimal control of non-linear switching system
    Li Xiaofeng
    Dong Lu
    Sun Changyin
    JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2022, 33 (05) : 1186 - 1194
  • [9] Deep reinforcement learning for optimal denial-of-service attacks scheduling
    Fangyuan HOU
    Jian SUN
    Qiuling YANG
    Zhonghua PANG
    ScienceChina(InformationSciences), 2022, 65 (06) : 98 - 106
  • [10] Deep reinforcement learning for optimal denial-of-service attacks scheduling
    Hou, Fangyuan
    Sun, Jian
    Yang, Qiuling
    Pang, Zhonghua
    SCIENCE CHINA-INFORMATION SCIENCES, 2022, 65 (06)