首页> 外文期刊>Control Theory & Applications, IET >Masking attack for sampled-data systems via input redundancy
【24h】

Masking attack for sampled-data systems via input redundancy

机译:通过输入冗余对采样数据系统进行屏蔽攻击

获取原文
获取原文并翻译 | 示例
           

摘要

This study discovers a new vulnerability of cyber-physical systems to malicious attack. It arises when the physical plant, that is modelled as a continuous-time LTI system, is controlled by a digital controller with periodic sampling and actuation. In the sampled-data framework, most anomaly detectors monitor the plant's output only at discrete time instants. Consequently, abnormal behaviour between sampling instants cannot be detected if output behaves normally at every sampling instant. This implies that if an actuator attack drives the plant's state to pass through the kernel of the output matrix at each sensing time, then the attack compromises the system while remaining stealthy. It is shown that this type of attack always exists when the sampled-data system has an input redundancy, i.e. the number of inputs being larger than that of outputs and/or the sampling rate of the actuators being higher than that of the sensors. Simulation results for the X-38 vehicle and other numerical examples illustrate this new attack strategy may result in disastrous consequences.
机译:这项研究发现了网络 - 物理系统的新脆弱性,以恶意攻击。它出现在被建模的作为连续时间LTI系统的物理厂由具有周期性采样和致动的数字控制器控制。在采样数据框架中,大多数异常检测器仅在离散时间瞬间监控工厂的输出。因此,如果输出在每个采样瞬发的输出正常行为,则无法检测到采样瞬间之间的异常行为。这意味着如果执行器攻击驱动工厂的状态,则在每个感测时间通过输出矩阵的内核,然后攻击妥协在封闭的同时妥协。结果表明,当采样数据系统具有输入冗余时,这类攻击总是存在,即输入的输入数量大于输出和/或致动器的采样率高于传感器的输入。 X-38车辆和其他数值示例的仿真结果说明了这种新的攻击策略可能导致灾难性的后果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号