Manipulative Zero-Stealthy Attacks In Cyber-Physical Systems: Existence Space Of Feasible Attack Objectives

2017 IEEE CONFERENCE ON CONTROL TECHNOLOGY AND APPLICATIONS (CCTA 2017)(2017)

引用 8|浏览2
暂无评分
摘要
In this paper, we analyze the vulnerabilities due to novel integrity cyber attacks in CPS, which are modeled as a stochastic Linear Time-Invariant (LTI) system equipped with a Kalman filter, an LQG controller, and a chi(2) failure detector from an attacker's standpoint. The attacks are designed by a sophisticated attacker so that the measurement residual of the compromised system coincides with the healthy one. Additionally, the attacked system state is manipulated to an objective which is designed by the adversary. We first show an existence condition and a design procedure of the stealthy attacks using invariant subspace property. Then, we formulate the stealthy attacks with a malicious objective, and the condition of the feasible objectives is derived. Finally, the dangerousness of the attacks is verified through a numerical simulation.
更多
查看译文
关键词
Kalman filter,invariant subspace property,malicious objective,feasible objectives,manipulative zero-stealthy attacks,cyber-physical systems,existence space,feasible attack objectives,integrity cyber attacks,stochastic Linear Time-Invariant system,CPS,LTI system,failure detector,LQG controller
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要