Stealthy Cyber-Attack Design Using Dynamic Programming

  title={Stealthy Cyber-Attack Design Using Dynamic Programming},
  author={Sribalaji Coimbatore Anand and Andr{\'e} M. H. Teixeira},
  journal={2021 60th IEEE Conference on Decision and Control (CDC)},
This paper addresses the issue of data injection attacks on control systems. We consider attacks which aim at maximizing system disruption while staying undetected in the finite horizon. The maximum possible disruption caused by such attacks is formulated as a non-convex optimization problem whose dual problem is a convex semi-definite program. We show that the duality gap is zero using S-lemma. To determine the optimal attack vector, we formulate a soft-constrained optimization problem using… 
1 Citations

Figures from this paper

Risk-averse controller design against data injection attacks on actuators for uncertain control systems

This paper uses the Conditional Value-at-Risk to characterize the risk associated with the impact of attacks and proposes a convex optimization problem that approximately solves the design problem with probabilistic certificates.



Optimal Data Injection Attacks in Cyber-Physical Systems

  • Guangyu WuJian SunJie Chen
  • Mathematics, Computer Science
    IEEE Transactions on Cybernetics
  • 2018
A closed-form switching policy for data injection attacks with multiple objectives is introduced, which is shown optimal in the sense of minimizing a hybrid quadratic performance criterion.

Zero-Sum Game-Based Optimal Secure Control Under Actuator Attacks

This article investigates the zero-sum game-based secure control problem for cyber–physical systems (CPS) under the actuator false data injection attacks and derives the optimal defending policy and the attack policy from the dynamic programming approach.

Stealthy Adversaries Against Uncertain Cyber-Physical Systems: Threat of Robust Zero-Dynamics Attack

This paper first interprets the (non-robust) conventional zero-dynamics attack based on Byrnes–Isidori normal form, and then presents a new robust zero-D dynamics attack for uncertain plants that does not require the exact model knowledge anymore.

Cyber-Physical Attacks With Control Objectives

This paper formulate a cost function that reflects the attacker's goals, and, using dynamic programming, shows how an attacker can design optimal attacks to balance the control objective and the detection avoidance objective.

Constrained Differential Games for Secure Decision-Making Against Stealthy Attacks

Pontryagin's minimum principle is employed to obtain the defense policy that optimizes the system performance and the attack policy that manipulates the future evolution of the system while optimally exploiting the information asymmetry present in the game.

Quantifying Cyber-Security for Networked Control Systems

A typical architecture for a networked control system under false-data injection attacks and various formulations for quantifying cyber-security of control systems are proposed and formulated as constrained optimization problems.

Security analysis of control system anomaly detectors

It is proved that the problem of sensitivity to malicious data injection attacks in two anomaly detectors for control systems can be solved by means of a set of convex optimization problems.

Joint controller and detector design against data injection attacks on actuators

Finite energy and bounded actuator attacks on cyber-physical systems

In this paper, attacks on actuator signals are analyzed from a system theoretic context and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained.

A Tutorial Introduction to Security and Privacy for Cyber-Physical Systems

The concept of risk in the context of CPS under cyber-attacks is explored, paying special attention to the characterization of attack scenarios and to the interpretation of impact and likelihood for CPS.