Data-Injection Attacks in Stochastic Control Systems: Detectability and Performance Tradeoffs
نویسندگان
چکیده
Consider a stochastic process being controlled across a communication channel. The control signal that is transmitted across the control channel can be replaced by a malicious attacker. The controller is allowed to implement any arbitrary detection algorithm to detect if an attacker is present. This work characterizes some fundamental limitations of when such an attack can be detected, and quantifies the performance degradation that an attacker that seeks to be undetected or stealthy can introduce.
منابع مشابه
A Stochastic Cyber-Attack Detection Scheme for Stochastic Control Systems Based on Frequency-Domain Transformation Technique
Based on frequency-domain transformation technique, this paper proposes an attack detection scheme for stochastic control systems under stochastic cyber-attacks and disturbances. The focus is on designing an anomaly detector for the stochastic control systems. First, we construct a model of stochastic control system with stochastic cyber-attacks which satisfy the Markovian stochastic process. A...
متن کاملResilient Configuration of Distribution System versus False Data Injection Attacks Against State Estimation
State estimation is used in power systems to estimate grid variables based on meter measurements. Unfortunately, power grids are vulnerable to cyber-attacks. Reducing cyber-attacks against state estimation is necessary to ensure power system safe and reliable operation. False data injection (FDI) is a type of cyber-attack that tampers with measurements. This paper proposes network reconfigurati...
متن کاملDesign of Sliding mode control for stochastic systems subject to packet losses
In this paper, we examine the design of a sliding mode control for stochastic systems with data packet losses. It is assumed that there is a network connection in the system's feedback loop and that part of the information may be lost during transmission. The innovation of this paper is to peresent a new method with better performance In this paper, we first consider an estimated method to com...
متن کاملAn application of linear algebra theory in networked control systems: stochastic cyber-attacks detection approach
Based on the traditional linear algebra theory, this paper propose the attack detection schemes for networked control systems (NCSs) under single stochastic cyber-attack and multiple stochastic cyber-attacks aiming at multiple communication channels of NCSs, respectively. The focus is on designing an anomaly detector for NCSs under cyber-attacks. First, we construct a model of stochastic NCSs w...
متن کاملSide channel parameter characteristics of code injection attacks
Embedded systems are suggestive targets for code injection attacks in the recent years. Software protection mechanisms, and in general computers, are not usually applicable in embedded systems since they have limited resources like memory and process power. In this paper we investigate side channel characteristics of embedded systems and their applicability in code injection attack detection. T...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Automatica
دوره 82 شماره
صفحات -
تاریخ انتشار 2017