首页> 外文会议>IFAC Workshop on Distributed Estimation and Control in Networked Systems >Authentication of cyber-physical systems under learning-based attacks
【24h】

Authentication of cyber-physical systems under learning-based attacks

机译:基于学习的攻击下网络物理系统的认证

获取原文

摘要

We study the problem of learning-based attacks in a simple abstraction of cyber-physical systems—the case of a scalar, discrete-time, linear, time-invariant plant that may be subject to an attack that overrides the sensor readings and the controller actions. The attacker attempts to learn the dynamics of the plant and subsequently override the controller’s actuation signal, to destroy the plant without being detected. The attacker can feed fictitious sensor readings to the controller using its estimate of the plant dynamics and mimicking the legitimate plant operation. The controller, on the other hand, is constantly on the lookout for an attack, and immediately shuts the plant off if an attack is detected. We study the performance of a specific authentication test and, by utilizing tools from information theory and statistics, we bound the asymptotic detection and deception probabilities forany measurablecontrol policy when the attacker usesan arbitrarylearning algorithm to estimate the dynamic of the plant. Finally, we show how the controller can impede the learning process of the attacker by superimposing a carefully craftedprivacy-enhancing signalupon its control policy.
机译:我们研究了一个简单的网络物理系统的抽象中基于学习的攻击问题 - 所以可以受到映射传感器读数和控制器的攻击的标量,离散时间,线性,时间不变工厂的情况行动。攻击者试图学习工厂的动态,随后覆盖控制器的致动信号,以破坏工厂而不会被检测到。攻击者可以使用其对植物动力学的估计来向控制器馈送虚拟传感器读数,并模仿合法的工厂操作。另一方面,控制器在攻击时不断地攻击,如果检测到攻击,立即关闭植物。我们研究了特定认证测试的性能,并通过利用来自信息理论和统计的工具,当攻击者使用Arbitrary算法来估计工厂的动态时,我们将渐近检测和欺骗概率绑定了渐近检测和欺骗概率。最后,我们展示了控制器如何通过叠加仔细制作的伪装增强信号来阻碍攻击者的学习过程。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号