首页> 外文学位 >Cyber attack analysis on cyber-physical systems: Detectability, severity, and attenuation strategy.
【24h】

Cyber attack analysis on cyber-physical systems: Detectability, severity, and attenuation strategy.

机译:网络物理系统上的网络攻击分析:可检测性,严重性和衰减策略。

获取原文
获取原文并翻译 | 示例

摘要

Security of Cyber-Physical Systems (CPS) against malicious cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is usually intractable to describe and diagnose them systematically. Motivated by such difficulties, this thesis presents a set of theories and algorithms for a cyber-secure architecture of the CPS within the control theoretic perspective. Here, instead of identifying a specific cyber attack model, we are focused on analyzing the system's response during cyber attacks. Firstly, we investigate the detectability of the cyber attacks from the system's behavior under cyber attacks. Specifically, we conduct a study on the vulnerabilities in the CPS's monitoring system against the stealthy cyber attack that is carefully designed to avoid being detected by its detection scheme. After classifying three kinds of cyber attacks according to the attacker's ability to compromise the system, we derive the necessary and sufficient conditions under which such stealthy cyber attacks can be designed to cause the unbounded estimation error while not being detected. Then, the analytical design method of the optimal stealthy cyber attack that maximizes the estimation error is developed. The proposed stealthy cyber attack analysis is demonstrated with illustrative examples on Air Traffic Control (ATC) system and Unmanned Aerial Vehicle (UAV) navigation system applications. Secondly, in an attempt to study the CPSs' vulnerabilities in more detail, we further discuss a methodology to identify potential cyber threats inherent in the given CPSs and quantify the attack severity accordingly. We then develop an analytical algorithm to test the behavior of the CPS under various cyber attack combinations. Compared to a numerical approach, the analytical algorithm enables the prediction of the most effective cyber attack combinations without computing the severity of all possible attack combinations, thereby greatly reducing the computational cost. The proposed algorithm is validated through a linearized longitudinal motion of a UAV example. Finally, we propose an attack attenuation strategy via the controller design for CPSs that are robust to various types of cyber attacks. While the previous studies have investigated a secure control by assuming a specific attack strategy, in this research we propose a hybrid robust control scheme that contains multiple sub-controllers, each matched to a specific type of cyber attacks. Then the system can be adapted to various cyber attacks (including those that are not assumed for sub-controller design) by switching its sub-controllers to achieve the best performance. Then, a method for designing a secure switching logic to counter all possible cyber attacks is proposed and it verifies mathematically the system's performance and stability as well. The performance of the proposed control scheme is demonstrated by an example with the hybrid H2 - H-infinity controller applied to a UAV example.
机译:网络物理系统(CPS)免受恶意网络攻击的安全性是一个重要且具有挑战性的问题。由于大多数网络攻击都是以不稳定的方式发生的,因此系统地描述和诊断它们通常很棘手。由于这些困难,本文从控制理论的角度提出了一套针对CPS网络安全体系结构的理论和算法。在这里,我们没有确定特定的网络攻击模型,而是专注于分析系统在网络攻击期间的响应。首先,我们从网络攻击下系统的行为来研究网络攻击的可检测性。具体来说,我们针对CPS监控系统中针对隐身网络攻击的漏洞进行了研究,该隐患经过精心设计,可避免被其检测方案检测到。在根据攻击者破坏系统的能力对三种网络攻击进行分类之后,我们得出了必要和充分的条件,在这种条件下,可以设计这种隐蔽的网络攻击,从而在不被发现的情况下引起无限的估计误差。然后,提出了一种最大化估计误差的最优隐身网络攻击的分析设计方法。以空中交通管制(ATC)系统和无人机(UAV)导航系统应用为例,演示了拟议的隐形网络攻击分析。其次,为了更详细地研究CPS的漏洞,我们进一步讨论了一种方法,用于识别给定CPS中固有的潜在网络威胁并据此量化攻击的严重性。然后,我们开发一种分析算法来测试各种网络攻击组合下CPS的行为。与数值方法相比,该分析算法可以预测最有效的网络攻击组合,而无需计算所有可能的攻击组合的严重性,从而大大降低了计算成本。该算法通过无人机实例的线性纵向运动得到验证。最后,我们通过针对CPS的控制器设计提出了一种攻击衰减策略,该策略可抵抗各种类型的网络攻击。尽管先前的研究通过假设特定的攻击策略来研究安全控制,但在本研究中,我们提出了一种混合鲁棒控制方案,其中包含多个子控制器,每个子控制器都与特定类型的网络攻击相匹配。然后,通过切换其子控制器以获得最佳性能,可以使系统适应各种网络攻击(包括子控制器未假定的攻击)。然后,提出了一种设计安全的交换逻辑以应对所有可能的网络攻击的方法,该方法还可以数学方式验证系统的性能和稳定性。通过将混合H2-H-无限混合控制器应用于UAV示例的示例,演示了提出的控制方案的性能。

著录项

  • 作者

    Kwon, Cheolhyeon.;

  • 作者单位

    Purdue University.;

  • 授予单位 Purdue University.;
  • 学科 Engineering Aerospace.
  • 学位 M.S.A.A.
  • 年度 2013
  • 页码 95 p.
  • 总页数 95
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

  • 入库时间 2022-08-17 11:41:55

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号