Geometry-Based Data-Driven Complete Stealthy Attacks Against Cyber-Physical Systems

被引:0
|
作者
Wang, Kaiyu [1 ]
Ye, Dan [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Peoples R China
基金
中国国家自然科学基金;
关键词
State estimation; Vectors; Geometry; Detectors; Actuators; Estimation error; Simulation; Cyber-physical systems (CPSs); complete stealthy; data-driven; false data injection attack; geometry;
D O I
10.1109/TNSE.2024.3458095
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This paper proposes a data-driven complete stealthy attack strategy against cyber-physical systems (CPSs) based on the geometric approach. The attacker aims to degrade estimation performance and maintain stealthiness by compromising partial communication links of the actuator and sensor. Different from the classic analysis methods that require accurate model parameters, we focus on how to establish the connection between geometry and data-driven approaches to represent the malicious behavior of attacks on state estimation. First of all, the existence of complete stealthy attacks is analyzed. Then, the maximal attached stealthy subspace and the set of estimation errors under complete stealthy attacks are analyzed intuitively from the geometric point of view. On this basis, the complete stealthy subspace is constructed with the subspace identification method, which is applied to generate the corresponding stealthy attack sequence through the collected system input-output data. Finally, simulation results are provided to illustrate the effectiveness of the proposed strategies.
引用
收藏
页码:5839 / 5849
页数:11
相关论文
共 50 条
  • [21] Stealthy multiplicative attacks against cyber-physical systems: A gap metric approach
    Zhao, Zhengen
    Xu, Yunsong
    Li, Yuzhe
    Cui, Lei
    Huang, Yimin
    Zhen, Ziyang
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2022, 32 (13) : 7336 - 7347
  • [22] Optimal completely stealthy attacks against remote estimation in cyber-physical systems
    Li, Yi-Gang
    Yang, Guang-Hong
    INFORMATION SCIENCES, 2022, 590 : 15 - 28
  • [23] Data-Driven Koopman Operator Based Cyber-Attacks for Nonlinear Control Affine Cyber-Physical Systems
    Taheri, Mahdi
    Khorasani, Khashayar
    Meskin, Nader
    Shames, Iman
    2022 IEEE 61ST CONFERENCE ON DECISION AND CONTROL (CDC), 2022, : 6769 - 6775
  • [24] Detection of Stealthy False Data Injection Attacks Against Cyber-Physical Systems: A Stochastic Coding Scheme
    Guo, Haibin
    Pang, Zhonghua
    Sun, Jian
    Li, Jun
    JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2022, 35 (05) : 1668 - 1684
  • [25] Detection of Stealthy False Data Injection Attacks Against Cyber-Physical Systems: A Stochastic Coding Scheme
    GUO Haibin
    PANG Zhonghua
    SUN Jian
    LI Jun
    JournalofSystemsScience&Complexity, 2022, 35 (05) : 1668 - 1684
  • [26] Detection of Stealthy False Data Injection Attacks Against Cyber-Physical Systems: A Stochastic Coding Scheme
    Haibin Guo
    Zhonghua Pang
    Jian Sun
    Jun Li
    Journal of Systems Science and Complexity, 2022, 35 : 1668 - 1684
  • [27] Enhanced Anomaly Detector for Nonlinear Cyber-Physical Systems against Stealthy Integrity Attacks
    Zhang, Kangkang
    Polycarpou, Marios M.
    Parisini, Thomas
    IFAC PAPERSONLINE, 2020, 53 (02): : 13682 - 13687
  • [28] Stealthy targeted local covert attacks on cyber-physical systems☆
    Mikhaylenko, Dina
    Zhang, Ping
    AUTOMATICA, 2025, 173
  • [29] Optimal stealthy switching location attacks against remote estimation in cyber-physical systems
    Li Y.-G.
    Yang G.-H.
    Neurocomputing, 2021, 421 : 183 - 194
  • [30] Stealthy Integrity Attacks for a Class of Nonlinear Cyber-Physical Systems
    Zhang, Kangkang
    Keliris, Christodoulos
    Parisini, Thomas
    Polycarpou, Marios M.
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2022, 67 (12) : 6723 - 6730