• Corpus ID: 235422201

Risk Assessment of Stealthy Attacks on Uncertain Control Systems

@article{Anand2021RiskAO,
  title={Risk Assessment of Stealthy Attacks on Uncertain Control Systems},
  author={Sribalaji Coimbatore Anand and Andr{\'e} M. H. Teixeira and Anders Ahl'en},
  journal={ArXiv},
  year={2021},
  volume={abs/2106.07071}
}
In this article, we address the problem of risk assessment of stealthy attacks on uncertain control systems. Considering data injection attacks that aim at maximizing impact while remaining undetected, we use the recently proposed output-to-output gain to characterize the risk associated with the impact of attacks under a limited system knowledge attacker. The risk is formulated using a well-established risk metric, namely the maximum expected loss. Under this setups, the risk assessment… 

Figures and Tables from this paper

References

SHOWING 1-10 OF 27 REFERENCES
Strategic stealthy attacks: The output-to-output ℓ2-gain
TLDR
This paper characterize and analyze the set of strategic stealthy false-data injection attacks on discrete-time linear systems and derives necessary and sufficient conditions for the output-to-output gain to be unbounded, with and without model uncertainties, which are tightly related to the invariant zeros of the system.
Stealthy Adversaries Against Uncertain Cyber-Physical Systems: Threat of Robust Zero-Dynamics Attack
TLDR
This paper first interprets the (non-robust) conventional zero-dynamics attack based on Byrnes–Isidori normal form, and then presents a new robust zero-D dynamics attack for uncertain plants that does not require the exact model knowledge anymore.
Optimal stealthy attacks on actuators for strictly proper systems
  • André M. H. Teixeira
  • Mathematics, Computer Science
    2019 IEEE 58th Conference on Decision and Control (CDC)
  • 2019
TLDR
This work considers stealthy data injection attacks against control systems, and develops security sensitivity metrics to quantify their impact on the system, and proposes the truncated ℓ2 gain, which it is shown can cope with strictly proper systems.
(A Little) Ignorance is Bliss: The Effect of Imperfect Model Information on Stealthy Attacks in Power Grids
TLDR
It is shown that while a small mismatch between model and reality can easily be managed by a robust controller, an attacker's imperfect knowledge of the system can thwart the stealth of the attack.
Security metrics and synthesis of secure control systems
Cyber Risk Analysis of Combined Data Attacks Against Power System State Estimation
TLDR
Risk analysis of combined data integrity and availability attacks against the power system state estimation and a security index for vulnerability assessment to these two kinds of attacks is proposed and formulated as a mixed integer linear programming problem.
A General Scenario Theory for Nonconvex Optimization and Decision Making
TLDR
The approach adopted in this paper applies not only to optimization, but also to generic decision problems where the solution is obtained according to a rule that is not necessarily the optimization of a cost function.
...
...