Stealthy Cyber-Attack Design Using Dynamic Programming
@article{Anand2021StealthyCD, title={Stealthy Cyber-Attack Design Using Dynamic Programming}, author={Sribalaji Coimbatore Anand and Andr{\'e} M. H. Teixeira}, journal={2021 60th IEEE Conference on Decision and Control (CDC)}, year={2021}, pages={3474-3479} }
This paper addresses the issue of data injection attacks on control systems. We consider attacks which aim at maximizing system disruption while staying undetected in the finite horizon. The maximum possible disruption caused by such attacks is formulated as a non-convex optimization problem whose dual problem is a convex semi-definite program. We show that the duality gap is zero using S-lemma. To determine the optimal attack vector, we formulate a soft-constrained optimization problem using…
One Citation
Risk-averse controller design against data injection attacks on actuators for uncertain control systems
- Computer Science, Mathematics2022 American Control Conference (ACC)
- 2022
This paper uses the Conditional Value-at-Risk to characterize the risk associated with the impact of attacks and proposes a convex optimization problem that approximately solves the design problem with probabilistic certificates.
References
SHOWING 1-10 OF 16 REFERENCES
Optimal Data Injection Attacks in Cyber-Physical Systems
- Mathematics, Computer ScienceIEEE Transactions on Cybernetics
- 2018
A closed-form switching policy for data injection attacks with multiple objectives is introduced, which is shown optimal in the sense of minimizing a hybrid quadratic performance criterion.
Zero-Sum Game-Based Optimal Secure Control Under Actuator Attacks
- MathematicsIEEE Transactions on Automatic Control
- 2021
This article investigates the zero-sum game-based secure control problem for cyber–physical systems (CPS) under the actuator false data injection attacks and derives the optimal defending policy and the attack policy from the dynamic programming approach.
Stealthy Adversaries Against Uncertain Cyber-Physical Systems: Threat of Robust Zero-Dynamics Attack
- MathematicsIEEE Transactions on Automatic Control
- 2019
This paper first interprets the (non-robust) conventional zero-dynamics attack based on Byrnes–Isidori normal form, and then presents a new robust zero-D dynamics attack for uncertain plants that does not require the exact model knowledge anymore.
Cyber-Physical Attacks With Control Objectives
- Mathematics, Computer ScienceIEEE Transactions on Automatic Control
- 2018
This paper formulate a cost function that reflects the attacker's goals, and, using dynamic programming, shows how an attacker can design optimal attacks to balance the control objective and the detection avoidance objective.
Constrained Differential Games for Secure Decision-Making Against Stealthy Attacks
- Computer Science2020 American Control Conference (ACC)
- 2020
Pontryagin's minimum principle is employed to obtain the defense policy that optimizes the system performance and the attack policy that manipulates the future evolution of the system while optimally exploiting the information asymmetry present in the game.
Quantifying Cyber-Security for Networked Control Systems
- Computer Science, MathematicsCPSW@CISS
- 2013
A typical architecture for a networked control system under false-data injection attacks and various formulations for quantifying cyber-security of control systems are proposed and formulated as constrained optimization problems.
Security analysis of control system anomaly detectors
- Computer Science2017 American Control Conference (ACC)
- 2017
It is proved that the problem of sensitivity to malicious data injection attacks in two anomaly detectors for control systems can be solved by means of a set of convex optimization problems.
Joint controller and detector design against data injection attacks on actuators
- Computer Science
- 2020
Finite energy and bounded actuator attacks on cyber-physical systems
- Computer Science, Engineering2015 European Control Conference (ECC)
- 2015
In this paper, attacks on actuator signals are analyzed from a system theoretic context and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained.
A Tutorial Introduction to Security and Privacy for Cyber-Physical Systems
- Computer Science2019 18th European Control Conference (ECC)
- 2019
The concept of risk in the context of CPS under cyber-attacks is explored, paying special attention to the characterization of attack scenarios and to the interpretation of impact and likelihood for CPS.