Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems
- Carnegie Mellon Univ., Pittsburgh, PA (United States)
This paper studies an attacker against a cyberphysical system (CPS) whose goal is to move the state of a CPS to a target state while ensuring that his or her probability of being detected does not exceed a given bound. The attacker’s probability of being detected is related to the nonnegative bias induced by his or her attack on the CPS’s detection statistic. We formulate a linear quadratic cost function that captures the attacker’s control goal and establish constraints on the induced bias that reflect the attacker’s detection-avoidance objectives. When the attacker is constrained to be detected at the false-alarm rate of the detector, we show that the optimal attack strategy reduces to a linear feedback of the attacker’s state estimate. In the case that the attacker’s bias is upper bounded by a positive constant, we provide two algorithms – an optimal algorithm and a sub-optimal, less computationally intensive algorithm – to find suitable attack sequences. Finally, we illustrate our attack strategies in numerical examples based on a remotely-controlled helicopter under attack.
- Research Organization:
- Carnegie Mellon Univ., Pittsburgh, PA (United States)
- Sponsoring Organization:
- USDOE Office of Electricity (OE)
- Grant/Contract Number:
- OE0000779
- OSTI ID:
- 1406998
- Alternate ID(s):
- OSTI ID: 1433649
- Journal Information:
- IEEE Transactions on Control of Network Systems, Vol. PP, Issue 99; ISSN 2325-5870
- Publisher:
- IEEECopyright Statement
- Country of Publication:
- United States
- Language:
- English
Web of Science
Cooperative attack strategy design via H − / H ∞ scheme for linear cyber‐physical systems
|
journal | October 2019 |
Research about DoS Attack against ICPS
|
journal | March 2019 |
Similar Records
Data-driven cyber attack detection and mitigation for decentralized wide-area protection and control in smart grids
Cyber risk assessment and investment optimization using game theory and ML-based anomaly detection and mitigation for wide-area control in smart grids