Skip to main content
U.S. Department of Energy
Office of Scientific and Technical Information

Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems

Journal Article · · IEEE Transactions on Control of Network Systems
This paper studies an attacker against a cyberphysical system (CPS) whose goal is to move the state of a CPS to a target state while ensuring that his or her probability of being detected does not exceed a given bound. The attacker’s probability of being detected is related to the nonnegative bias induced by his or her attack on the CPS’s detection statistic. We formulate a linear quadratic cost function that captures the attacker’s control goal and establish constraints on the induced bias that reflect the attacker’s detection-avoidance objectives. When the attacker is constrained to be detected at the false-alarm rate of the detector, we show that the optimal attack strategy reduces to a linear feedback of the attacker’s state estimate. In the case that the attacker’s bias is upper bounded by a positive constant, we provide two algorithms – an optimal algorithm and a sub-optimal, less computationally intensive algorithm – to find suitable attack sequences. Lastly, we illustrate our attack strategies in numerical examples based on a remotely-controlled helicopter under attack.
Research Organization:
Carnegie Mellon Univ., Pittsburgh, PA (United States)
Sponsoring Organization:
USDOE Office of Electricity Delivery and Energy Reliability (OE)
Grant/Contract Number:
OE0000779
OSTI ID:
1406998
Alternate ID(s):
OSTI ID: 1433649
Journal Information:
IEEE Transactions on Control of Network Systems, Journal Name: IEEE Transactions on Control of Network Systems Journal Issue: 99 Vol. PP; ISSN 2325-5870
Publisher:
IEEECopyright Statement
Country of Publication:
United States
Language:
English

Cited By (2)

Cooperative attack strategy design via H / H scheme for linear cyber‐physical systems journal October 2019
Research about DoS Attack against ICPS journal March 2019

Similar Records

Cyber-Physical Attacks With Control Objectives
Journal Article · Thu Aug 17 20:00:00 EDT 2017 · IEEE Transactions on Automatic Control · OSTI ID:1433632

False Data Injection and Detection in LQG Systems: A Game Theoretic Approach
Journal Article · Wed Apr 10 20:00:00 EDT 2019 · IEEE Transactions on Control of Network Systems · OSTI ID:1801312