Novel Stealthy Attack and Defense Strategies for Networked Control Systems

被引:31
|
作者
Mao, Yanbing [1 ]
Jafarnejadsani, Hamidreza [2 ]
Zhao, Pan [1 ]
Akyol, Emrah [3 ]
Hovakimyan, Naira [1 ]
机构
[1] Univ Illinois, Dept Mech Sci & Engn, Urbana, IL 61801 USA
[2] Stevens Inst Technol, Dept Mech Engn, Hoboken, NJ 07310 USA
[3] Binghamton Univ SUNY, Dept Elect & Comp Engn, Binghamton, NY 13902 USA
基金
美国国家科学基金会;
关键词
Topology; Network topology; Monitoring; Switches; Privacy; System dynamics; Attack detection; multiagent systems; privacy; security; topology attack; zero-dynamics attack (ZDA); SYNCHRONIZATION; FLOCKING;
D O I
10.1109/TAC.2020.2997363
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article studies novel attack and defense strategies, based on a class of stealthy attacks, namely the zero-dynamics attack (ZDA), for multiagent control systems. ZDA poses a formidable security challenge since its attack signal is hidden in the null space of the state-space representation of the control system and hence it can evade conventional detection methods. An intuitive defense strategy builds on changing the aforementioned representation via switching through a set of carefully crafted topologies. In this article, we propose realistic ZDA variations where the attacker is aware of this topology-switching strategy, and hence employs the following policies to avoid detection: first, pause, update, and resume ZDA according to the knowledge of switching topologies; and second, cooperate with a concurrent stealthy topology attack that alters network topology at switching times, such that the original ZDA is feasible under the corrupted topology. We first systematically study the proposed ZDA variations, and then develop defense strategies against them under the realistic assumption that the defender has no knowledge of attack starting, pausing, and resuming times and the number of misbehaving agents. Particularly, we characterize conditions for detectability of the proposed ZDA variations, in terms of the network topologies to be maintained, the set of agents to be monitored, and the measurements of the monitored agents that should be extracted, while simultaneously preserving the privacy of the states of the nonmonitored agents. We then propose an attack detection algorithm based on the Luenberger observer, using the characterized detectability conditions. We provide numerical simulation results to demonstrate our theoretical findings.
引用
收藏
页码:3847 / 3862
页数:16
相关论文
共 50 条
  • [31] Privacy-Preserving Stealthy Attack Detection in Multi-Agent Control Systems
    Bahrami, Mohammad
    Jafarnejadsani, Hamidreza
    2021 60TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2021, : 4194 - 4199
  • [32] Stealthy FDI Attacks Against Networked Control Systems Using Two Filters With an Arbitrary Gain
    Guo, Haibin
    Sun, Jian
    Pang, Zhong-Hua
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2022, 69 (07) : 3219 - 3223
  • [33] SEINA: A Stealthy and Effective Internal Attack in Hadoop Systems
    Wang, Jiayin
    Wang, Teng
    Yang, Zhengyu
    Mao, Ying
    Mi, Ningfang
    Sheng, Bo
    2017 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2016, : 525 - 530
  • [34] Attack and Defense Strategies for Intrusion Detection in Autonomous Distributed IoT Systems
    Al-Hamadi, Hamid
    Chen, Ing-Ray
    Wang, Ding-Chau
    Almashan, Meshal
    IEEE ACCESS, 2020, 8 : 168994 - 169009
  • [35] Analysis of Attack-Defense Strategies in Autonomous Distributed IoT Systems
    Al-Hamadi, Hamid
    Chen, Ing-Ray
    Wang, Ding-Chau
    2019 IEEE 14TH INTERNATIONAL SYMPOSIUM ON AUTONOMOUS DECENTRALIZED SYSTEM (ISADS), 2019, : 37 - 42
  • [36] Optimal ε -stealthy attack in cyber-physical systems
    Tu, Weiwei
    Dong, Jiuxiang
    Zhai, Ding
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2021, 358 (01): : 151 - 171
  • [37] Design of Advanced False Data Injection Attack in Networked Control Systems
    Ning, Chuanyi
    Xi, Zhiyu
    Zhang, Xingpeng
    2023 AMERICAN CONTROL CONFERENCE, ACC, 2023, : 1958 - 1965
  • [38] On the security and stability for wireless networked control systems with external attack and disturbances
    Liu, Zhixin
    Li, Yaping
    Li, Li
    Ma, Kai
    Yang, Yi
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2022,
  • [39] Detectability of Intermittent Zero-Dynamics Attack in Networked Control Systems
    Mao, Yanbing
    Jafarnejadsani, Hamidreza
    Zhao, Pan
    Akyol, Emrah
    Hovakimyan, Naira
    2019 IEEE 58TH CONFERENCE ON DECISION AND CONTROL (CDC), 2019, : 5605 - 5610
  • [40] Flow-based attack detection and accommodation for networked control systems
    Niu, Haifeng
    Jagannathan, S.
    INTERNATIONAL JOURNAL OF CONTROL, 2021, 94 (03) : 834 - 847