A Model-Free Stealthy Attack for Cyber-Physical Systems Based on Deep Reinforcement Learning

被引:0
作者
Zhang, Qirui [1 ]
Meng, Siqi [1 ]
Dai, Wei [1 ]
Xia, Zhenxing [1 ]
Yang, Chunyu [1 ]
Wang, Xuesong [1 ]
机构
[1] China Univ Min & Technol, Sch Informat & Control Engn, Xuzhou 221116, Peoples R China
来源
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS | 2025年 / 55卷 / 07期
基金
中国国家自然科学基金;
关键词
Deep reinforcement learning; Detectors; Nonlinear systems; Convergence; Trajectory; System dynamics; Entropy; Technological innovation; Optimization; Lyapunov methods; Cyber-physical systems (CPSs); deep reinforcement learning; model-free; stealthy attack; DESIGN;
D O I
10.1109/TSMC.2025.3559710
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article, from the attacker's standpoint, develops a model-free stealthy attack that can steer the system state to the predefined target value and evade detection, without prior knowledge of the system dynamics. A constrained Markov decision process (CMDP) is first modeled to characterize the objective of the stealthy attack. On the basis of the established CMDP, an actor-critic reinforcement learning algorithm is proposed to train the attacker's policy. Furthermore, by introducing a Lyapunov function constructed from the action value function to the algorithm, convergence of the attacked system's state to the target is theoretically guaranteed. Differing from existing model-free stealthy attacks which are only suitable for linear systems, the proposed approach guarantees the applicability to nonlinear systems. A linear numerical example and a nonlinear example of flotation industrial system are provided to validate the effectiveness of our proposed stealthy attack.
引用
收藏
页码:5091 / 5101
页数:11
相关论文
共 46 条
[1]   Data-Driven Coordinated Attack Policy Design Based on Adaptive L2-Gain Optimal Theory [J].
An, Liwei ;
Yang, Guang-Hong .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2018, 63 (06) :1850-1857
[2]   Dual-Rate Control Framework With Safe Watermarking Against Deception Attacks [J].
Bessa, Iury ;
Trapiello, Carlos ;
Puig, Vicenc ;
Palhares, Reinaldo Martinez .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 52 (12) :7494-7506
[3]   Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems [J].
Chen, Yuan ;
Kar, Soummya ;
Moura, Jose M. F. .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2018, 5 (03) :1157-1168
[4]  
Chow Y, 2018, ADV NEUR IN, V31
[5]   Modeling Cyber-Physical Systems [J].
Derler, Patricia ;
Lee, Edward A. ;
Vincentelli, Alberto Sangiovanni .
PROCEEDINGS OF THE IEEE, 2012, 100 (01) :13-28
[6]   A Survey of Cyber Attacks on Cyber Physical Systems: Recent Advances and Challenges [J].
Duo, Wenli ;
Zhou, Meng Chu ;
Abusorrah, Abdullah .
IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2022, 9 (05) :784-800
[7]   Data-Driven Injection Attack Strategy for Linear Cyber-Physical Systems: An Input-Output Data-Based Approach [J].
Gao, Sheng ;
Zhang, Hao ;
Wang, Zhuping ;
Huang, Chao ;
Yan, Huaicheng .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (06) :4082-4095
[8]   Optimal Injection Attack Strategy for Nonlinear Cyber-Physical Systems Based on Iterative Learning [J].
Gao, Sheng ;
Zhang, Hao ;
Huang, Chao ;
Wang, Zhuping ;
Yan, Huaicheng .
IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2024, 21 (01) :56-68
[9]   Worst-case stealthy innovation-based linear attack on remote state estimation [J].
Guo, Ziyang ;
Shi, Dawei ;
Johansson, Karl Henrik ;
Shi, Ling .
AUTOMATICA, 2018, 89 :117-124
[10]  
Haarnoja T, 2018, PR MACH LEARN RES, V80