{"title":"网络物理系统中基于概率的随机隐形攻击","authors":"Dan Ye;Xiaoke Liu;Pengyu Li","doi":"10.1109/JSYST.2024.3380584","DOIUrl":null,"url":null,"abstract":"This article focuses on the design of stochastic stealthy attacks in linear cyber-physical systems (CPSs), where the objective of attackers is to degrade the system's performance and maintain a delicate balance between detection and false alarm rates. In contrast to the commonly used stealthiness constraint defined using the Kullback–Leibler divergence, the \n<bold><inline-formula><tex-math>$\\varepsilon$</tex-math></inline-formula></b>\n-stealthiness is established based on the detector's tolerance against the false alarm rate, providing an intuitive correlation between the attacker's stealthiness and the detection rate from a probabilistic perspective. Furthermore, we obtain an upper bound on the attack performance using the Schur–Horn theorem and devise a corresponding stealth attack strategy to ensure compliance with this bound. Finally, simulations with a three-tank system model are executed to corroborate the theoretical results.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"1288-1295"},"PeriodicalIF":4.0000,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Probability-Based Stochastic Stealthy Attacks in Cyber-Physical Systems\",\"authors\":\"Dan Ye;Xiaoke Liu;Pengyu Li\",\"doi\":\"10.1109/JSYST.2024.3380584\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article focuses on the design of stochastic stealthy attacks in linear cyber-physical systems (CPSs), where the objective of attackers is to degrade the system's performance and maintain a delicate balance between detection and false alarm rates. In contrast to the commonly used stealthiness constraint defined using the Kullback–Leibler divergence, the \\n<bold><inline-formula><tex-math>$\\\\varepsilon$</tex-math></inline-formula></b>\\n-stealthiness is established based on the detector's tolerance against the false alarm rate, providing an intuitive correlation between the attacker's stealthiness and the detection rate from a probabilistic perspective. Furthermore, we obtain an upper bound on the attack performance using the Schur–Horn theorem and devise a corresponding stealth attack strategy to ensure compliance with this bound. Finally, simulations with a three-tank system model are executed to corroborate the theoretical results.\",\"PeriodicalId\":55017,\"journal\":{\"name\":\"IEEE Systems Journal\",\"volume\":\"18 2\",\"pages\":\"1288-1295\"},\"PeriodicalIF\":4.0000,\"publicationDate\":\"2024-04-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Systems Journal\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10488750/\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Systems Journal","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10488750/","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Probability-Based Stochastic Stealthy Attacks in Cyber-Physical Systems
This article focuses on the design of stochastic stealthy attacks in linear cyber-physical systems (CPSs), where the objective of attackers is to degrade the system's performance and maintain a delicate balance between detection and false alarm rates. In contrast to the commonly used stealthiness constraint defined using the Kullback–Leibler divergence, the
$\varepsilon$
-stealthiness is established based on the detector's tolerance against the false alarm rate, providing an intuitive correlation between the attacker's stealthiness and the detection rate from a probabilistic perspective. Furthermore, we obtain an upper bound on the attack performance using the Schur–Horn theorem and devise a corresponding stealth attack strategy to ensure compliance with this bound. Finally, simulations with a three-tank system model are executed to corroborate the theoretical results.
期刊介绍:
This publication provides a systems-level, focused forum for application-oriented manuscripts that address complex systems and system-of-systems of national and global significance. It intends to encourage and facilitate cooperation and interaction among IEEE Societies with systems-level and systems engineering interest, and to attract non-IEEE contributors and readers from around the globe. Our IEEE Systems Council job is to address issues in new ways that are not solvable in the domains of the existing IEEE or other societies or global organizations. These problems do not fit within traditional hierarchical boundaries. For example, disaster response such as that triggered by Hurricane Katrina, tsunamis, or current volcanic eruptions is not solvable by pure engineering solutions. We need to think about changing and enlarging the paradigm to include systems issues.