{"title":"控制系统中网络攻击检测与缓解的模型预测方法","authors":"A. Rosich, H. Voos, Yumei Li, M. Darouach","doi":"10.1109/CDC.2013.6760937","DOIUrl":null,"url":null,"abstract":"The paper presents a new approach for control security. Specifically, cyber-attacks on the controller are investigated by means of optimization techniques in order to determine the worst-case scenario. Then, a novel attack detector based on limit checking is introduced. The particularity of this detector is that no specific controller knowledge is necessary. Hence, the vulnerability of the detector can be reduced since no reconfiguration is required (limited accessibility). Finally, the paper shows that the effect of the attacks on the system can be significantly mitigated by applying proper optimal control laws.","PeriodicalId":415568,"journal":{"name":"52nd IEEE Conference on Decision and Control","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"20","resultStr":"{\"title\":\"A model predictive approach for cyber-attack detection and mitigation in control systems\",\"authors\":\"A. Rosich, H. Voos, Yumei Li, M. Darouach\",\"doi\":\"10.1109/CDC.2013.6760937\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The paper presents a new approach for control security. Specifically, cyber-attacks on the controller are investigated by means of optimization techniques in order to determine the worst-case scenario. Then, a novel attack detector based on limit checking is introduced. The particularity of this detector is that no specific controller knowledge is necessary. Hence, the vulnerability of the detector can be reduced since no reconfiguration is required (limited accessibility). Finally, the paper shows that the effect of the attacks on the system can be significantly mitigated by applying proper optimal control laws.\",\"PeriodicalId\":415568,\"journal\":{\"name\":\"52nd IEEE Conference on Decision and Control\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-12-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"20\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"52nd IEEE Conference on Decision and Control\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CDC.2013.6760937\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"52nd IEEE Conference on Decision and Control","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CDC.2013.6760937","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A model predictive approach for cyber-attack detection and mitigation in control systems
The paper presents a new approach for control security. Specifically, cyber-attacks on the controller are investigated by means of optimization techniques in order to determine the worst-case scenario. Then, a novel attack detector based on limit checking is introduced. The particularity of this detector is that no specific controller knowledge is necessary. Hence, the vulnerability of the detector can be reduced since no reconfiguration is required (limited accessibility). Finally, the paper shows that the effect of the attacks on the system can be significantly mitigated by applying proper optimal control laws.