Data-Driven Covert-Attack Strategies and Countermeasures for Cyber-Physical Systems

被引:4
|
作者
Taheri, Mahdi [1 ]
Khorasani, Khashayar [1 ]
Shames, Iman [2 ]
Meskin, Nader [3 ]
机构
[1] Concordia Univ, Dept Elect & Comp Engn, Montreal, PQ, Canada
[2] Australian Natl Univ, Sch Engn, Canberra, ACT, Australia
[3] Qatar Univ, Dept Elect Engn, Doha, Qatar
基金
加拿大自然科学与工程研究理事会;
关键词
FAULT-DETECTION; ACTUATOR;
D O I
10.1109/CDC45484.2021.9683376
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper studies covert-attacks for cyber-physical systems (CPS) under conditions that adversaries do not explicitly know the system characteristic matrices (A, B, C). Covert-attacks are considered as undetectable type of cyber-attacks. We propose and develop conditions under which adversaries are capable of performing covert-attacks for CPS only by utilizing Markov parameters of the system, which are assumed to be known to adversaries. In order to demonstrate the execution of proposed covert-attacks in this paper, a specific sensor attack signal which should be accompanied by an actuator attack is introduced based on Markov parameters of the CPS. The minimum number of sensors which should be attacked to perform covert-attacks while only one actuator is manipulated by adversaries is investigated. The latter can be used by adversaries to select a specific actuator to compromise. In order to make the CPS more secure against covert-attacks, we propose and develop a coding scheme which increases the number of required sensors that should be compromised during a covert-attack. Hence, if the proposed coding scheme is utilized, adversaries need to compromise all the output communication channels of CPS to perform covert-attacks. An illustrative simulation case study is provided to demonstrate the effectiveness of the proposed covert-attack method and the coding scheme.
引用
收藏
页码:4170 / 4175
页数:6
相关论文
共 50 条
  • [1] A data-driven covert attack strategy in the closed-loop cyber-physical systems
    Li, Zhe
    Yang, Guang-Hong
    [J]. JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2018, 355 (14): : 6454 - 6468
  • [2] Data-driven Stealthy Actuator Attack against Cyber-Physical Systems
    Zhang, Zhixue
    Zhang, Qirui
    Liu, Tao
    Pang, Zhonghua
    Cui, Bing
    Jin, Shuxin
    Liu, Kun
    [J]. PROCEEDINGS OF THE 39TH CHINESE CONTROL CONFERENCE, 2020, : 4395 - 4399
  • [3] Robust Covert Attack Strategies and Their Detection for Switched Cyber-Physical Systems
    Kazemi, MohamadGhasem
    Khorasani, Khashayar
    [J]. 2023 31ST MEDITERRANEAN CONFERENCE ON CONTROL AND AUTOMATION, MED, 2023, : 389 - 394
  • [4] Data-Driven Falsification of Cyber-Physical Systems
    Kundu, Atanu
    Gon, Sauvik
    Ray, Rajarshi
    [J]. PROCEEDINGS OF THE 17TH INNOVATIONS IN SOFTWARE ENGINEERING CONFERENCE, ISEC 2024, 2024,
  • [5] Data-Driven False Data-Injection Attack Design and Detection in Cyber-Physical Systems
    Zhao, Zhengen
    Huang, Yimin
    Zhen, Ziyang
    Li, Yuzhe
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2021, 51 (12) : 6179 - 6187
  • [6] Data-driven attack policy design for cyber-physical systems under channel constraints
    Liu, He
    Li, Xiao-Jian
    [J]. INFORMATION SCIENCES, 2024, 677
  • [7] Data-Driven Mutation Analysis for Cyber-Physical Systems
    Vigano, Enrico
    Cornejo, Oscar
    Pastore, Fabrizio
    Briand, Lionel C.
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2023, 49 (04) : 2182 - 2201
  • [8] Optimal Strictly Stealthy Attack Design on Cyber-Physical Systems: A Data-Driven Approach
    Li, Zhuyuan
    Zhao, Zhengen
    Ding, Steven X.
    Yang, Ying
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2024,
  • [9] Data-Driven Attack Detection and Identification for Cyber-Physical Systems Under Sparse Sensor Attacks
    Zhao, Zhengen
    Xu, Yunsong
    Li, Yuzhe
    Zhen, Ziyang
    Yang, Ying
    Shi, Yang
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2023, 68 (10) : 6330 - 6337
  • [10] Data-driven anomaly detection in cyber-physical production systems
    Niggemann, Oliver
    Frey, Christian
    [J]. AT-AUTOMATISIERUNGSTECHNIK, 2015, 63 (10) : 821 - 832