Stealthiness Analysis of the Identified Model-Based Covert Attacks with Unknown Model

IEEE Transactions on Control of Network Systems(2023)

引用 0|浏览2
暂无评分
摘要
Most of existing covert attacks are achieved based on known model, which is however impractical for the attacker, leading to the failure of covert attacks. To solve this problem, this paper presents a novel covert attacks method with unknown model. Firstly, the negative correlation between the model errors and the stealthiness of traditional covert attacks (TCAs) is quantitatively analyzed, where bigger errors brings worse stealthiness. Secondly, the subspace identification method is used to obtain the identified model of the plant. Furthermore, a novel identification and adaptive compensation based covert attacks (IACCAs) method is proposed, which can adaptively compensate the attack signals by adaptive law. Although there exist the identification errors, the stealthiness of IACCAs is proved to be similar as TCAs with known model. Finally, experimental results demonstrate the feasibility and effectiveness of the proposed IACCAs method, which can achieve covert attacks with unknown model.
更多
查看译文
关键词
Covert attacks,identification,adaptive compensation,networked control systems
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要