{"title":"网络攻防中的最小鲁棒不变量集与卡尔曼滤波","authors":"Dorijan Leko, M. Vašak","doi":"10.23919/ACC53348.2022.9867272","DOIUrl":null,"url":null,"abstract":"The paper provides a data integrity cyber-attack detection framework based on minimum robust positively invariant sets. A general linear control system with a Kalman filter is considered. The set localization of the state estimator error is taken into account for developing the attack detector. An intelligent attacker algorithm is developed that has access to a subset of signals from the sensor and actuator channel of the control system. It is assumed that the attacker possesses the entire control system model to perform the most proficient attack for a certain set-up of data availability and compromisation. The attacker compromises a set of measurement data under the constraint of remaining non-discovered by the detector. The presented methodology allows assessing the effectiveness of the control system defense achievable in various data integrity attack scenarios. The developed detector and attacker algorithm were implemented on an illustrative example of a power system with two control areas and automatic generation control.","PeriodicalId":366299,"journal":{"name":"2022 American Control Conference (ACC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Minimum Robust Invariant Sets and Kalman Filtering in Cyber Attacking and Defending\",\"authors\":\"Dorijan Leko, M. Vašak\",\"doi\":\"10.23919/ACC53348.2022.9867272\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The paper provides a data integrity cyber-attack detection framework based on minimum robust positively invariant sets. A general linear control system with a Kalman filter is considered. The set localization of the state estimator error is taken into account for developing the attack detector. An intelligent attacker algorithm is developed that has access to a subset of signals from the sensor and actuator channel of the control system. It is assumed that the attacker possesses the entire control system model to perform the most proficient attack for a certain set-up of data availability and compromisation. The attacker compromises a set of measurement data under the constraint of remaining non-discovered by the detector. The presented methodology allows assessing the effectiveness of the control system defense achievable in various data integrity attack scenarios. The developed detector and attacker algorithm were implemented on an illustrative example of a power system with two control areas and automatic generation control.\",\"PeriodicalId\":366299,\"journal\":{\"name\":\"2022 American Control Conference (ACC)\",\"volume\":\"27 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-06-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 American Control Conference (ACC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.23919/ACC53348.2022.9867272\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 American Control Conference (ACC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/ACC53348.2022.9867272","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Minimum Robust Invariant Sets and Kalman Filtering in Cyber Attacking and Defending
The paper provides a data integrity cyber-attack detection framework based on minimum robust positively invariant sets. A general linear control system with a Kalman filter is considered. The set localization of the state estimator error is taken into account for developing the attack detector. An intelligent attacker algorithm is developed that has access to a subset of signals from the sensor and actuator channel of the control system. It is assumed that the attacker possesses the entire control system model to perform the most proficient attack for a certain set-up of data availability and compromisation. The attacker compromises a set of measurement data under the constraint of remaining non-discovered by the detector. The presented methodology allows assessing the effectiveness of the control system defense achievable in various data integrity attack scenarios. The developed detector and attacker algorithm were implemented on an illustrative example of a power system with two control areas and automatic generation control.