Robust Stealthy Attacks Based on Uncertain Costs and Labeled Finite Automata With Inputs

被引:4
作者
Ammour, Rabah [1 ]
Amari, Said [2 ]
Brenner, Leonardo [1 ]
Demongodin, Isabel [1 ]
Lefebvre, Dimitri [3 ]
机构
[1] Aix Marseille Univ, LIS, CNRS, F-13397 Marseille, France
[2] ENS Paris Saclay, LURPA, F-94235 Paris, France
[3] Univ Le Havre Normandie, GREAH, F-76600 Le Havre, France
关键词
Costs; Symbols; Automata; Robot sensing systems; Actuators; Uncertainty; Cyberattack; Discrete event systems; automata; cyber-physical systems; robust attacks; SECURITY;
D O I
10.1109/LRA.2023.3250007
中图分类号
TP24 [机器人技术];
学科分类号
080202 ; 1405 ;
摘要
This letter deals with the vulnerability analysis of cyber-physical systems subject to malicious actions. For this purpose, the considered system is assumed to be abstracted as a discrete event system. Labeled finite automata with inputs are used to model the system's behavior along with the information that circulates in both the input and output channels. In particular, we study here stealthy, i.e., undetectable, cyber-attacks that aim to drive the system from a given normal state to a set of forbidden states. We assume that the attacker has limited resources, i.e., a credit, to insert and delete control and sensors events. The proposed analysis evaluates the costs of such attacks on the controlled system depending on its structure, the cost of the malicious actions and possible uncertainties that may affect those costs. It provides systematic methods that aim to compute attacks of minimal cost and robust attacks that are weakly impacted by uncertainties. A case study representing a manufacturing plant is considered to illustrate the results.
引用
收藏
页码:2732 / 2739
页数:8
相关论文
共 22 条
  • [1] Min-max and min-max regret versions of combinatorial optimization problems: A survey
    Aissi, Hassene
    Bazgan, Cristina
    Vanderpooten, Daniel
    [J]. EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2009, 197 (02) : 427 - 438
  • [2] Ammour R, 2021, 2021 EUROPEAN CONTROL CONFERENCE (ECC), P746, DOI 10.23919/ECC54610.0000/2021.9655111
  • [3] Ammour S., 2021, P IEEE 17 INT C AUT, P799
  • [4] The price of robustness
    Bertsimas, D
    Sim, M
    [J]. OPERATIONS RESEARCH, 2004, 52 (01) : 35 - 53
  • [5] Carvalho A, 2020, P 2020 IEEE INT C EN, P1, DOI [10.1109/ICE/ITMC49519.2020.9198592, DOI 10.1109/ICE/ITMC49519.2020.9198592]
  • [6] A Survey of Cyber Attacks on Cyber Physical Systems: Recent Advances and Challenges
    Duo, Wenli
    Zhou, Meng Chu
    Abusorrah, Abdullah
    [J]. IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2022, 9 (05) : 784 - 800
  • [7] Stuxnet and the Future of Cyber War
    Farwell, James P.
    Rohozinski, Rafal
    [J]. SURVIVAL, 2011, 53 (01) : 23 - 40
  • [8] A multi-layered and kill-chain based security analysis framework for cyber-physical systems
    Hahn, Adam
    Thomas, Roshan K.
    Lozano, Ivan
    Cardenas, Alvaro
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2015, 11 : 39 - 50
  • [9] Karasan M. C., 2001, ROBUST SHORTEST PATH
  • [10] Unmanned Aircraft Capture and Control Via GPS Spoofing
    Kerns, Andrew J.
    Shepard, Daniel P.
    Bhatti, Jahshan A.
    Humphreys, Todd E.
    [J]. JOURNAL OF FIELD ROBOTICS, 2014, 31 (04) : 617 - 636