Security and Diagnosability of Finite State Machines Under Cyber-Attacks

IF 6.4 2区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS IEEE Transactions on Automation Science and Engineering Pub Date : 2024-09-25 DOI:10.1109/TASE.2024.3416821
Naeimeh Fakhr Shamloo;Elena De Santis;Maria Domenica Di Benedetto
{"title":"Security and Diagnosability of Finite State Machines Under Cyber-Attacks","authors":"Naeimeh Fakhr Shamloo;Elena De Santis;Maria Domenica Di Benedetto","doi":"10.1109/TASE.2024.3416821","DOIUrl":null,"url":null,"abstract":"In many applications, security is a serious issue due to the high risk of cyber-attacks. An adversary can cause severe damage by providing wrong information about the system and consequently leading the controller to perform incorrectly. Detecting any malicious activity is necessary to cover up its negative effects and make the system operate reliably. In this paper, we propose a new approach to analyze security and diagnosability of a Finite-state machine (FSM) under multiple attacks. Different kinds of attacks are modeled by an FSM and the composition of the nominal and attack model can express all the effects of possible attacks on the given system. We define different concepts of security and give conditions under which detectability of the attacks is possible. Moreover, diagnosability of an FSM affected by multiple attacks is addressed, and the special case of critical observability under attack is characterized. Note to Practitioners—Nowadays, cyber-physical systems (CPSs) are being widely used in industry and the extensive use of communication networks by CPSs raises the concern of vulnerability to malicious attacks. Therefore, it is a major challenge to detect the attack specifically when multiple attacks might launch on different sensors or communication channels. These facts motivate us to investigate the attack detectability properties of a system modeled by Finite State Machines (FSMs). To this end, we consider one of the well-known types of cyber-attacks which can inject, replace or remove output information in the communication network, called the man-in-the-middle attack. This may also be modeled by an FSM. In this paper, we provide a good understanding of the security level of a system under this powerful kind of attack, which can provide better insight into the weaknesses and strengths of the system before designing a supervisor. In some applications e.g. in air traffic control, the designer needs to detect if a state belongs to a “critical set”, i.e. a set of dangerous or unsafe states. As a second important contribution of the paper, we investigate under which conditions this is possible even if the system is under attack. An extension to the more general property of diagnosability is illustrated.","PeriodicalId":51060,"journal":{"name":"IEEE Transactions on Automation Science and Engineering","volume":"22 ","pages":"5108-5116"},"PeriodicalIF":6.4000,"publicationDate":"2024-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Automation Science and Engineering","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10693943/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

In many applications, security is a serious issue due to the high risk of cyber-attacks. An adversary can cause severe damage by providing wrong information about the system and consequently leading the controller to perform incorrectly. Detecting any malicious activity is necessary to cover up its negative effects and make the system operate reliably. In this paper, we propose a new approach to analyze security and diagnosability of a Finite-state machine (FSM) under multiple attacks. Different kinds of attacks are modeled by an FSM and the composition of the nominal and attack model can express all the effects of possible attacks on the given system. We define different concepts of security and give conditions under which detectability of the attacks is possible. Moreover, diagnosability of an FSM affected by multiple attacks is addressed, and the special case of critical observability under attack is characterized. Note to Practitioners—Nowadays, cyber-physical systems (CPSs) are being widely used in industry and the extensive use of communication networks by CPSs raises the concern of vulnerability to malicious attacks. Therefore, it is a major challenge to detect the attack specifically when multiple attacks might launch on different sensors or communication channels. These facts motivate us to investigate the attack detectability properties of a system modeled by Finite State Machines (FSMs). To this end, we consider one of the well-known types of cyber-attacks which can inject, replace or remove output information in the communication network, called the man-in-the-middle attack. This may also be modeled by an FSM. In this paper, we provide a good understanding of the security level of a system under this powerful kind of attack, which can provide better insight into the weaknesses and strengths of the system before designing a supervisor. In some applications e.g. in air traffic control, the designer needs to detect if a state belongs to a “critical set”, i.e. a set of dangerous or unsafe states. As a second important contribution of the paper, we investigate under which conditions this is possible even if the system is under attack. An extension to the more general property of diagnosability is illustrated.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
网络攻击下有限状态机的安全性和可诊断性
在许多应用中,由于网络攻击的高风险,安全性是一个严重的问题。攻击者可以通过提供有关系统的错误信息,从而导致控制器错误地执行,从而造成严重的损害。检测任何恶意活动是必要的,以掩盖其负面影响,使系统可靠运行。本文提出了一种分析有限状态机(FSM)在多重攻击下安全性和可诊断性的新方法。不同类型的攻击通过FSM建模,名义模型和攻击模型的组合可以表达所有可能的攻击对给定系统的影响。我们定义了不同的安全概念,并给出了可能检测攻击的条件。此外,还讨论了受多种攻击影响的FSM的可诊断性问题,并刻画了攻击下临界可观察性的特殊情况。从业人员注意事项——如今,网络物理系统(cps)在工业中得到广泛应用,cps对通信网络的广泛使用引起了人们对恶意攻击脆弱性的担忧。因此,当多个攻击可能在不同的传感器或通信通道上发起时,如何检测攻击是一个重大挑战。这些事实促使我们研究由有限状态机(FSMs)建模的系统的攻击可检测性。为此,我们考虑了一种众所周知的网络攻击类型,它可以在通信网络中注入,替换或删除输出信息,称为中间人攻击。这也可以通过FSM建模。在本文中,我们提供了一个很好的理解系统在这种强大的攻击下的安全级别,这可以在设计监控器之前更好地洞察系统的弱点和优势。在一些应用中,例如在空中交通管制中,设计者需要检测一个状态是否属于“临界集”,即一组危险或不安全的状态。作为本文的第二个重要贡献,我们研究了即使系统受到攻击,在哪些条件下这是可能的。对可诊断性这一更一般性质的一个扩展进行了说明。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Transactions on Automation Science and Engineering
IEEE Transactions on Automation Science and Engineering 工程技术-自动化与控制系统
CiteScore
12.50
自引率
14.30%
发文量
404
审稿时长
3.0 months
期刊介绍: The IEEE Transactions on Automation Science and Engineering (T-ASE) publishes fundamental papers on Automation, emphasizing scientific results that advance efficiency, quality, productivity, and reliability. T-ASE encourages interdisciplinary approaches from computer science, control systems, electrical engineering, mathematics, mechanical engineering, operations research, and other fields. T-ASE welcomes results relevant to industries such as agriculture, biotechnology, healthcare, home automation, maintenance, manufacturing, pharmaceuticals, retail, security, service, supply chains, and transportation. T-ASE addresses a research community willing to integrate knowledge across disciplines and industries. For this purpose, each paper includes a Note to Practitioners that summarizes how its results can be applied or how they might be extended to apply in practice.
期刊最新文献
A Divide-and-Conquer Fusion Algorithm for Multi-Target Tracking in Multi-Sensor Networks Based on the PMBM Filter Immersion and Invariance Adaptive Controller with Flexible Gains for UAV with Off-centered Slung Load Bi-Handover: A Unified Vision-Based Paradigm for Reliable Bidirectional Human-Robot Object Handover Attention-Enhanced Diffusion with LLM-Driven Prompts for Controllable Defect Generation in Photovoltaic cells Adaptive filtered feedback–driven Nash equilibrium seeking for structurally uncertain nonaffine multiagent systems
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1