{"title":"A Finite-Time Stealthy Covert Attack Against Cyber-Physical Systems","authors":"Kian Gheitasi, Walter Lucia","doi":"10.1109/CoDIT49905.2020.9263979","DOIUrl":null,"url":null,"abstract":"In the last decade, several cyber-attacks against Cyber-Physical Systems (CPSs) have been investigated, and different active and passive control solutions have been proposed to assure the absence of undetectable attacks. In this paper, first, we show that most of the studied attacks, if performed for a finite-time duration, can be straightforwardly detected in the post-attack phase. Then, given a proper justification for the existence of finite-time attacks, we show that a finite-time stealthy covert attack can be performed if the attacker takes ad-hoc actions before terminating. We propose a practical implementation of a finite-time covert attack, obtained by combining a finite impulse response receding-horizon filter and reachability arguments. Finally, a simulation example, involving a quadruple-tanks water system, is shown to better clarify the capabilities of the designed attack.","PeriodicalId":355781,"journal":{"name":"2020 7th International Conference on Control, Decision and Information Technologies (CoDIT)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 7th International Conference on Control, Decision and Information Technologies (CoDIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CoDIT49905.2020.9263979","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
In the last decade, several cyber-attacks against Cyber-Physical Systems (CPSs) have been investigated, and different active and passive control solutions have been proposed to assure the absence of undetectable attacks. In this paper, first, we show that most of the studied attacks, if performed for a finite-time duration, can be straightforwardly detected in the post-attack phase. Then, given a proper justification for the existence of finite-time attacks, we show that a finite-time stealthy covert attack can be performed if the attacker takes ad-hoc actions before terminating. We propose a practical implementation of a finite-time covert attack, obtained by combining a finite impulse response receding-horizon filter and reachability arguments. Finally, a simulation example, involving a quadruple-tanks water system, is shown to better clarify the capabilities of the designed attack.