首页> 外文会议>Annual American Control Conference >A Comparison of Stealthy Sensor Attacks on Control Systems
【24h】

A Comparison of Stealthy Sensor Attacks on Control Systems

机译:隐形传感器对控制系统的攻击比较

获取原文

摘要

As more attention is paid to security in the context of control systems and as attacks occur to real control systems throughout the world, it has become clear that some of the most nefarious attacks are those that evade detection. The term stealthy has come to encompass a variety of techniques that attackers can employ to avoid detection. Here we show how the states of the system (in particular, the reachable set corresponding to the attack) can be manipulated under two important types of stealthy attacks. We employ the chi-squared fault detection method and demonstrate how this imposes a constraint on the attack sequence either to generate no alarms (zero-alarm attack) or to generate alarms at a rate indistinguishable from normal operation (hidden attack).
机译:随着对控制系统环境中安全性的更多关注以及全世界对实际控制系统的攻击的发生,很明显,一些最邪恶的攻击是逃避检测的攻击。隐身一词已涵盖攻击者可以用来避免检测的多种技术。在这里,我们展示了如何在两种重要的隐形攻击类型下操纵系统的状态(特别是与攻击相对应的可到达集合)。我们采用卡方故障检测方法,并演示了此方法如何对攻击序列施加约束,以不生成警报(零警报攻击)或以与正常操作无法区分的速率生成警报(隐藏攻击)。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号