Data-Driven Methods for Stealthy Attacks on TCP/IP-Based Networked Control Systems Equipped With Attack Detectors

被引:48
|
作者
Wang, Jun-Sheng [1 ,2 ]
Yang, Guang-Hong [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Liaoning, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Liaoning, Peoples R China
基金
中国国家自然科学基金;
关键词
Cyber-physical systems (CPSs); data-driven methods; de servo systems; stealthy attack; transmission control protocol/Internet protocol (TCP/IP); LOOP SUBSPACE IDENTIFICATION; STATE ESTIMATION; DATA-INJECTION; SECURE CONTROL; SCHEMES; FAULTS;
D O I
10.1109/TCYB.2018.2837874
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most of the existing stealthy attack schemes for cyber-physical systems (CPSs) are presented under the assumption that the model parameters of CPS arc known to attackers. Presently, there are only a few model-independent stealthy attack approaches, which, however, need the assumption that attackers know sensor measurements and can modify them. This paper aims to remove the aforementioned conservative assumptions and give a stealthy attack methodology for closed-loop CPS with reference signals, that is, transmission control protocol/Internet protocol (TCP/IP)-based networked control systems. To this end, under the condition that the model parameters of the CPS are unknown, a benchmark platform (consisting of an attack detector and a TCP/IP-based networked de servo system) used for testing the stealthy attack technology is constructed via data-driven methods. A plan is made, which is utilized for eavesdropping the information of the TCP/IP-based CPS. On this basis, an approach to blocking network communications and injecting the false sensor data into the CPS is explored. A closed-loop recursive identification strategy for the dynamic characteristic matrix of the CPS is designed. By employing all of the above-obtained results, a data-driven stealthy attack scheme for the CPS is proposed and, subsequently, its effectiveness and practicability are validated by experiment.
引用
收藏
页码:3020 / 3031
页数:12
相关论文
共 50 条
  • [1] The sensor-actuators stealthy cyber-attacks framework on networked control systems: A data-driven approach
    Xin, Liang
    Yang, Biao
    Long, Zhiqing
    ASIAN JOURNAL OF CONTROL, 2024, 26 (02) : 960 - 973
  • [2] On scheduling of deception attacks for discrete-time networked systems equipped with attack detectors
    Ding, Derui
    Wei, Guoliang
    Zhang, Sunjie
    Liu, Yurong
    Alsaadi, Fuad E.
    NEUROCOMPUTING, 2017, 219 : 99 - 106
  • [3] Improved Stealthy False Data Injection Attacks in Networked Control Systems
    Ning, Chuanyi
    Xi, Zhiyu
    IEEE SYSTEMS JOURNAL, 2024, 18 (01): : 505 - 515
  • [4] Optimal Innovation-Based Stealthy Attacks in Networked LQG Systems With Attack Cost
    Jin, Kaijing
    Ye, Dan
    IEEE TRANSACTIONS ON CYBERNETICS, 2024, 54 (02) : 787 - 796
  • [5] Data-Driven Based Predictive Control for Networked Nonlinear Systems With Energy-Limited DoS Attacks
    Yang, Tianbao
    Yue, Dong
    Cheng, Zihao
    2017 IEEE CONFERENCE ON ENERGY INTERNET AND ENERGY SYSTEM INTEGRATION (EI2), 2017,
  • [6] Data-driven predictive control for networked control systems
    Xia, Yuanqing
    Xie, Wen
    Liu, Bo
    Wang, Xiaoyun
    INFORMATION SCIENCES, 2013, 235 : 45 - 54
  • [7] Data-driven Stealthy Actuator Attack against Cyber-Physical Systems
    Zhang, Zhixue
    Zhang, Qirui
    Liu, Tao
    Pang, Zhonghua
    Cui, Bing
    Jin, Shuxin
    Liu, Kun
    PROCEEDINGS OF THE 39TH CHINESE CONTROL CONFERENCE, 2020, : 4395 - 4399
  • [8] Geometry-Based Data-Driven Complete Stealthy Attacks Against Cyber-Physical Systems
    Wang, Kaiyu
    Ye, Dan
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (06): : 5839 - 5849
  • [9] Poisoning Attacks against Data-Driven Control Methods
    Russo, Alessio
    Proutiere, Alexandre
    2021 AMERICAN CONTROL CONFERENCE (ACC), 2021, : 3234 - 3241
  • [10] Simulation study of TCP/IP communication based on networked control systems
    Wei, An
    Chen, Yuqiang
    Wu, Jinhua
    WCICA 2006: SIXTH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-12, CONFERENCE PROCEEDINGS, 2006, : 4479 - +