Set-Based Anomaly Detector and Stealthy Attack Impact using Constrained Zonotopes

被引:1
|
作者
Wagner, Jonas [1 ]
Kogel, Tanner [1 ]
Ruths, Justin [1 ]
机构
[1] Univ Texas Dallas, Mech Engn Dept, Richardson, TX 75083 USA
来源
2023 62ND IEEE CONFERENCE ON DECISION AND CONTROL, CDC | 2023年
基金
美国国家科学基金会;
关键词
D O I
10.1109/CDC49753.2023.10383403
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a set-based detector is developed and analyzed based on the propagation of nominal (no attacks), actual (possibly with attacks), and perceived (corrupted by attacks) residuals due to bounded system and measurement noise uncertainties. The set of stealthy attacks (attacks that raise no alarms) is characterized and the impact of these stealthy attacks on the system state is quantified. When implemented through the set tools of constrained zonotopes, this approach provides accurate, time-varying attack-reachable sets that can be used to evaluate the safety and performance of systems in adversarial conditions. These tools are demonstrated through two case studies.
引用
收藏
页码:7081 / 7087
页数:7
相关论文
共 50 条
  • [21] Random Finite Set-Based Anomaly Detection for Safety Monitoring in Construction Sites
    Kamoona, Ammar Mansoor
    Gostar, Amirali Khodadadian
    Tennakoon, Ruwan
    Bab-Hadiashar, Alireza
    Accadia, David
    Thorpe, Joshua
    Hoseinnezhad, Reza
    IEEE ACCESS, 2019, 7 : 105710 - 105720
  • [22] SPAR: set-based piecewise aggregate representation for time series anomaly detection
    Peng Zhan
    Yupeng Hu
    Lin Chen
    Wei Luo
    Xueqing Li
    Science China Information Sciences, 2021, 64
  • [23] SPAR: set-based piecewise aggregate representation for time series anomaly detection
    Zhan, Peng
    Hu, Yupeng
    Chen, Lin
    Luo, Wei
    Li, Xueqing
    SCIENCE CHINA-INFORMATION SCIENCES, 2021, 64 (04)
  • [24] Reach Set-based Attack Resilient State Estimation against Omniscient Adversaries
    Shinohara, Takumi
    Namerikawa, Toni
    2018 ANNUAL AMERICAN CONTROL CONFERENCE (ACC), 2018, : 5813 - 5818
  • [25] Self-triggered control for constrained systems: a contractive set-based approach
    Hashimoto, Kazumune
    Adachi, Shuichi
    Dimarogonas, Dimos V.
    2017 AMERICAN CONTROL CONFERENCE (ACC), 2017, : 1011 - 1016
  • [26] An Application of a Set-Valued State Estimator Based on Constrained Zonotopes in GNSS-INS Integration
    Ashraf, Fawad Farooq
    2023 9TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND ROBOTICS, ICCAR, 2023, : 49 - 54
  • [27] Set-based replay attack detection in closed-loop systems using a plug & play watermarking approach
    Trapiello, Carlos
    Puig, Vicenc
    2019 4TH CONFERENCE ON CONTROL AND FAULT TOLERANT SYSTEMS (SYSTOL), 2019, : 330 - 335
  • [28] Using value of information in quantitative set-based design
    Shallcross, Nicholas J.
    Parnell, Gregory S.
    Pohl, Ed
    Goerger, Simon R.
    SYSTEMS ENGINEERING, 2021, 24 (06) : 439 - 455
  • [29] Distributed set-based observers using diffusion strategies
    Alanwar, Amr
    Rath, Jagat Jyoti
    Said, Hazem
    Johansson, Karl Henrik
    Althoff, Matthias
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2023, 360 (10): : 6976 - 6993
  • [30] Contextual Object Detection Using Set-Based Classification
    Cinbis, Ramazan Gokberk
    Sclaroff, Stan
    COMPUTER VISION - ECCV 2012, PT VI, 2012, 7577 : 43 - 57