首页> 外文会议>American Control Conference >Security analysis for Cyber-Physical Systems against stealthy deception attacks
【24h】

Security analysis for Cyber-Physical Systems against stealthy deception attacks

机译:网络物理系统针对隐形欺骗攻击的安全性分析

获取原文

摘要

Security of Cyber-Physical Systems (CPS) against cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is difficult to describe them systematically. In this paper, instead of identifying a specific cyber attack model, we are focused on analyzing the system's response during cyber attacks. Deception attacks (or false data injection attacks), which are performed by tampering with system components or data, are not of particular concern if they can be easily detected by the system's monitoring system. However, intelligent cyber attackers can avoid being detected by the monitoring system by carefully design cyber attacks. Our main objective is to investigate the performance of such stealthy deception attacks from the system's perspective. We investigate three kinds of stealthy deception attacks according to the attacker's ability to compromise the system. Based on the information about the dynamics of the system and existing hypothesis testing algorithms, we derive the necessary and sufficient conditions under which the attacker could perform each kind of attack without being detected. In the end, we illustrate the threat of these cyber attacks using an Unmanned Aerial Vehicle (UAV) navigation example.
机译:网络物理系统(CPS)抵御网络攻击的安全性是一个重要且具有挑战性的问题。由于大多数网络攻击都是以不稳定的方式发生的,因此很难系统地描述它们。在本文中,我们没有确定特定的网络攻击模型,而是着重于分析系统在网络攻击期间的响应。如果篡改攻击(或虚假数据注入攻击)可以通过系统的监视系统轻松检测到,则可以通过篡改系统组件或数据来进行这些攻击。但是,通过精心设计网络攻击,智能网络攻击者可以避免被监视系统检测到。我们的主要目标是从系统角度研究这种隐身欺骗攻击的性能。根据攻击者破坏系统的能力,我们研究了三种隐形欺骗攻击。基于有关系统动力学的信息和现有的假设测试算法,我们得出了攻击者可以在不被检测到的情况下执行各种攻击的必要条件和充分条件。最后,我们以无人飞行器(UAV)导航示例说明了这些网络攻击的威胁。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号