首页> 外文会议>IEEE Conference on Control Technology and Applications >Manipulative Zero-Stealthy Attacks in Cyber-Physical Systems: Existence Space of Feasible Attack Objectives
【24h】

Manipulative Zero-Stealthy Attacks in Cyber-Physical Systems: Existence Space of Feasible Attack Objectives

机译:网络物理系统的操纵零隐身攻击:可行攻击目标的存在空间

获取原文

摘要

In this paper, we analyze the vulnerabilities due to novel integrity cyber attacks in CPS, which are modeled as a stochastic Linear Time-Invariant (LTI) system equipped with a Kalman filter, an LQG controller, and a x~2 failure detector from an attacker's standpoint. The attacks are designed by a sophisticated attacker so that the measurement residual of the compromised system coincides with the healthy one. Additionally, the attacked system state is manipulated to an objective which is designed by the adversary. We first show an existence condition and a design procedure of the stealthy attacks using invariant subspace property. Then, we formulate the stealthy attacks with a malicious objective, and the condition of the feasible objectives is derived. Finally, the dangerousness of the attacks is verified through a numerical simulation.
机译:在本文中,我们分析了由于CP中的新型完整性网络攻击导致的漏洞,其被建模为配备卡尔曼滤波器,LQG控制器和攻击者的AX〜2故障检测器的随机线性时间不变(LTI)系统。立场。该攻击是由复杂的攻击者设计的,使得受损系统的测量残余与健康的攻击者。另外,攻击的系统状态被操纵到由对手设计的目标。我们首先使用不变子空间属性显示存在条件和隐形攻击的设计过程。然后,我们制定了恶意目标的隐形攻击,得到了可行目标的条件。最后,通过数值模拟来验证攻击的危险性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号