针对网络物理系统的隐身联合攻击设计:可达集方法

IF 6.4 2区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS IEEE Transactions on Automation Science and Engineering Pub Date : 2024-12-31 DOI:10.1109/TASE.2024.3521970
Qirui Zhang;Wei Dai;Kun Liu;Lanhao Wang;Chunyu Yang
{"title":"针对网络物理系统的隐身联合攻击设计:可达集方法","authors":"Qirui Zhang;Wei Dai;Kun Liu;Lanhao Wang;Chunyu Yang","doi":"10.1109/TASE.2024.3521970","DOIUrl":null,"url":null,"abstract":"This article studies the joint design of stealthy actuator and sensor attacks against cyber-physical systems with the aim of keeping the system’s state in an unsafe region. The Kullback-Leibler divergence is adopted as the metric of the joint attacks’ stealthiness. The attacker’s objective is realized by making the system’s ellipsoidal invariant reachable set under stealthy joint attacks belong to the unsafe set. Firstly, the relationship between the actuator attack and the shape of the ellipsoid is analyzed and it can be characterized by a non-convex optimization problem. Parameters of the actuator attack are obtained by solving another convex optimization problem constructed through applying a linear transformation to the original problem. Then, the sensor attack is analytically solved from a non-convex optimization problem to move the center of the ellipsoid to the desired target and increase the controller’s cost. Finally, an example of the flotation industrial process is illustrated to demonstrate effectiveness of the attack. Note to Practitioners—This paper aims to study security of cyber-physical systems from the perspective of attackers, which can help defenders fully understand the behavior of attackers. Existing works have not investigated which kind of stealthy attacks can move the state to the unsafe region. In this article, novel stealthy joint attacks are proposed such that the state of the attacked system is kept in the unsafe region. In detail, the actuator attack is to reshape the system’s ellipsoidal invariant reachable set and the sensor attack is to move the center of the ellipsoid to the desired target. In practical applications, the attacker need to obtain the system’s parameters and eavesdrop the input and output data, then solve the actuator attack from a convex optimization problem and compute the sensor attack by analytically solving a non-convex optimization problem. The attacks’ effectiveness is verified through the flotation industrial process. In the future, we will further investigate the design of stealthy attack strategies for nonlinear systems.","PeriodicalId":51060,"journal":{"name":"IEEE Transactions on Automation Science and Engineering","volume":"22 ","pages":"10333-10342"},"PeriodicalIF":6.4000,"publicationDate":"2024-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Design of Stealthy Joint Attacks Against Cyber-Physical Systems: A Reachable Set Approach\",\"authors\":\"Qirui Zhang;Wei Dai;Kun Liu;Lanhao Wang;Chunyu Yang\",\"doi\":\"10.1109/TASE.2024.3521970\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article studies the joint design of stealthy actuator and sensor attacks against cyber-physical systems with the aim of keeping the system’s state in an unsafe region. The Kullback-Leibler divergence is adopted as the metric of the joint attacks’ stealthiness. The attacker’s objective is realized by making the system’s ellipsoidal invariant reachable set under stealthy joint attacks belong to the unsafe set. Firstly, the relationship between the actuator attack and the shape of the ellipsoid is analyzed and it can be characterized by a non-convex optimization problem. Parameters of the actuator attack are obtained by solving another convex optimization problem constructed through applying a linear transformation to the original problem. Then, the sensor attack is analytically solved from a non-convex optimization problem to move the center of the ellipsoid to the desired target and increase the controller’s cost. Finally, an example of the flotation industrial process is illustrated to demonstrate effectiveness of the attack. Note to Practitioners—This paper aims to study security of cyber-physical systems from the perspective of attackers, which can help defenders fully understand the behavior of attackers. Existing works have not investigated which kind of stealthy attacks can move the state to the unsafe region. In this article, novel stealthy joint attacks are proposed such that the state of the attacked system is kept in the unsafe region. In detail, the actuator attack is to reshape the system’s ellipsoidal invariant reachable set and the sensor attack is to move the center of the ellipsoid to the desired target. In practical applications, the attacker need to obtain the system’s parameters and eavesdrop the input and output data, then solve the actuator attack from a convex optimization problem and compute the sensor attack by analytically solving a non-convex optimization problem. The attacks’ effectiveness is verified through the flotation industrial process. In the future, we will further investigate the design of stealthy attack strategies for nonlinear systems.\",\"PeriodicalId\":51060,\"journal\":{\"name\":\"IEEE Transactions on Automation Science and Engineering\",\"volume\":\"22 \",\"pages\":\"10333-10342\"},\"PeriodicalIF\":6.4000,\"publicationDate\":\"2024-12-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Automation Science and Engineering\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10819010/\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Automation Science and Engineering","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10819010/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

本文研究了针对网络物理系统的隐身执行器和传感器攻击的联合设计,目的是使系统的状态保持在不安全区域。采用Kullback-Leibler散度作为联合攻击隐身性的度量。通过使系统在隐身联合攻击下的椭球不变可达集属于不安全集来实现攻击者的目标。首先,分析了执行器攻击与椭球形状的关系,并将其表征为非凸优化问题。通过求解另一个对原问题进行线性变换构造的凸优化问题,得到执行器攻击的参数。然后,从一个非凸优化问题解析解决传感器攻击问题,将椭球中心移动到期望目标,增加控制器的成本。最后,以浮选工业过程为例,说明了该方法的有效性。从业人员注意:本文旨在从攻击者的角度研究网络物理系统的安全性,这有助于防御者充分了解攻击者的行为。现有的工作并没有调查哪种隐形攻击可以将国家转移到不安全地区。本文提出了一种新的隐身联合攻击方法,使被攻击系统的状态保持在不安全区域。其中,执行器攻击是对系统的椭球不变可达集进行重塑,传感器攻击是将椭球中心移动到目标位置。在实际应用中,攻击者需要获取系统参数并窃听输入输出数据,然后通过凸优化问题求解执行器攻击,通过解析求解非凸优化问题计算传感器攻击。通过浮选工业过程验证了攻击的有效性。在未来,我们将进一步研究非线性系统的隐身攻击策略设计。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Design of Stealthy Joint Attacks Against Cyber-Physical Systems: A Reachable Set Approach
This article studies the joint design of stealthy actuator and sensor attacks against cyber-physical systems with the aim of keeping the system’s state in an unsafe region. The Kullback-Leibler divergence is adopted as the metric of the joint attacks’ stealthiness. The attacker’s objective is realized by making the system’s ellipsoidal invariant reachable set under stealthy joint attacks belong to the unsafe set. Firstly, the relationship between the actuator attack and the shape of the ellipsoid is analyzed and it can be characterized by a non-convex optimization problem. Parameters of the actuator attack are obtained by solving another convex optimization problem constructed through applying a linear transformation to the original problem. Then, the sensor attack is analytically solved from a non-convex optimization problem to move the center of the ellipsoid to the desired target and increase the controller’s cost. Finally, an example of the flotation industrial process is illustrated to demonstrate effectiveness of the attack. Note to Practitioners—This paper aims to study security of cyber-physical systems from the perspective of attackers, which can help defenders fully understand the behavior of attackers. Existing works have not investigated which kind of stealthy attacks can move the state to the unsafe region. In this article, novel stealthy joint attacks are proposed such that the state of the attacked system is kept in the unsafe region. In detail, the actuator attack is to reshape the system’s ellipsoidal invariant reachable set and the sensor attack is to move the center of the ellipsoid to the desired target. In practical applications, the attacker need to obtain the system’s parameters and eavesdrop the input and output data, then solve the actuator attack from a convex optimization problem and compute the sensor attack by analytically solving a non-convex optimization problem. The attacks’ effectiveness is verified through the flotation industrial process. In the future, we will further investigate the design of stealthy attack strategies for nonlinear systems.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
IEEE Transactions on Automation Science and Engineering
IEEE Transactions on Automation Science and Engineering 工程技术-自动化与控制系统
CiteScore
12.50
自引率
14.30%
发文量
404
审稿时长
3.0 months
期刊介绍: The IEEE Transactions on Automation Science and Engineering (T-ASE) publishes fundamental papers on Automation, emphasizing scientific results that advance efficiency, quality, productivity, and reliability. T-ASE encourages interdisciplinary approaches from computer science, control systems, electrical engineering, mathematics, mechanical engineering, operations research, and other fields. T-ASE welcomes results relevant to industries such as agriculture, biotechnology, healthcare, home automation, maintenance, manufacturing, pharmaceuticals, retail, security, service, supply chains, and transportation. T-ASE addresses a research community willing to integrate knowledge across disciplines and industries. For this purpose, each paper includes a Note to Practitioners that summarizes how its results can be applied or how they might be extended to apply in practice.
期刊最新文献
Dynamic Event-triggered H ∞ Control for Networked Control Systems with Stochastic Delay: An Envelope-Guided Partial Reset Approach Embedded Grating Sensing and Compensation Enabling Cross-Scale Nanopositioning Robotic Non-Contact Three-Dimensional Micromanipulation by Acoustohydrodynamic Effects SETKNet: Stochastic Event-Triggered Kalman Net with Sensor Scheduling for Remote State Estimation Important-Data-Based Attack Strategy and Resilient H ∞ Estimator Design for Autonomous Vehicle
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1