Geometry-Based Data-Driven Complete Stealthy Attacks Against Cyber-Physical Systems

被引:0
|
作者
Wang, Kaiyu [1 ]
Ye, Dan [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Peoples R China
来源
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING | 2024年 / 11卷 / 06期
基金
中国国家自然科学基金;
关键词
State estimation; Vectors; Geometry; Detectors; Actuators; Estimation error; Simulation; Cyber-physical systems (CPSs); complete stealthy; data-driven; false data injection attack; geometry;
D O I
10.1109/TNSE.2024.3458095
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This paper proposes a data-driven complete stealthy attack strategy against cyber-physical systems (CPSs) based on the geometric approach. The attacker aims to degrade estimation performance and maintain stealthiness by compromising partial communication links of the actuator and sensor. Different from the classic analysis methods that require accurate model parameters, we focus on how to establish the connection between geometry and data-driven approaches to represent the malicious behavior of attacks on state estimation. First of all, the existence of complete stealthy attacks is analyzed. Then, the maximal attached stealthy subspace and the set of estimation errors under complete stealthy attacks are analyzed intuitively from the geometric point of view. On this basis, the complete stealthy subspace is constructed with the subspace identification method, which is applied to generate the corresponding stealthy attack sequence through the collected system input-output data. Finally, simulation results are provided to illustrate the effectiveness of the proposed strategies.
引用
收藏
页码:5839 / 5849
页数:11
相关论文
共 50 条
  • [31] Optimal stealthy switching location attacks against remote estimation in cyber-physical systems
    Li, Yi-Gang
    Yang, Guang-Hong
    NEUROCOMPUTING, 2021, 421 : 183 - 194
  • [32] Data-Driven Mutation Analysis for Cyber-Physical Systems
    Vigano, Enrico
    Cornejo, Oscar
    Pastore, Fabrizio
    Briand, Lionel C.
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2023, 49 (04) : 2182 - 2201
  • [33] Reachability Analysis of Cyber-Physical Systems Under Stealthy Attacks
    Zhang, Qirui
    Liu, Kun
    Pang, Zhonghua
    Xia, Yuanqing
    Liu, Tao
    IEEE TRANSACTIONS ON CYBERNETICS, 2022, 52 (06) : 4926 - 4934
  • [34] Stealthy Targeted Local Covert Attacks on Cyber-Physical Systems
    Mikhaylenko, Dina
    Krames, Marcel
    Zhang, Ping
    2021 60TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2021, : 3462 - 3467
  • [35] Optimal Stealthy Joint Attacks Against Distributed State Estimation in Cyber-Physical Systems
    Su, Guangzhen
    Liu, Kun
    Wang, Haojun
    Zhang, Qirui
    Xia, Yuanqing
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2024, 11 (03): : 1597 - 1609
  • [36] Design of Stealthy Joint Attacks Against Cyber-Physical Systems: A Reachable Set Approach
    Zhang, Qirui
    Dai, Wei
    Liu, Kun
    Wang, Lanhao
    Yang, Chunyu
    IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2025, 22 : 10333 - 10342
  • [37] Probability-Based Stealthy Attacks for Cyber-Physical Systems with Resource Constraint
    Liu, Xiaoke
    Li, Pengyu
    Ye, Dan
    2023 IEEE 2ND INDUSTRIAL ELECTRONICS SOCIETY ANNUAL ON-LINE CONFERENCE, ONCON, 2023,
  • [38] An integrated data-driven scheme for the defense of typical cyber-physical attacks
    Wu, Shimeng
    Jiang, Yuchen
    Luo, Hao
    Zhang, Jiusi
    Yin, Shen
    Kaynak, Okyay
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2022, 220
  • [39] Worst-case ε-stealthy false data injection attacks in cyber-physical systems
    Li, Yi-Gang
    Yang, Guang-Hong
    INFORMATION SCIENCES, 2020, 515 : 352 - 364
  • [40] Data-Driven Attack Detection and Identification for Cyber-Physical Systems Under Sparse Sensor Attacks
    Zhao, Zhengen
    Xu, Yunsong
    Li, Yuzhe
    Zhen, Ziyang
    Yang, Ying
    Shi, Yang
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2023, 68 (10) : 6330 - 6337