Set-Based Anomaly Detector and Stealthy Attack Impact using Constrained Zonotopes

被引:1
作者
Wagner, Jonas [1 ]
Kogel, Tanner [1 ]
Ruths, Justin [1 ]
机构
[1] Univ Texas Dallas, Mech Engn Dept, Richardson, TX 75083 USA
来源
2023 62ND IEEE CONFERENCE ON DECISION AND CONTROL, CDC | 2023年
基金
美国国家科学基金会;
关键词
D O I
10.1109/CDC49753.2023.10383403
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a set-based detector is developed and analyzed based on the propagation of nominal (no attacks), actual (possibly with attacks), and perceived (corrupted by attacks) residuals due to bounded system and measurement noise uncertainties. The set of stealthy attacks (attacks that raise no alarms) is characterized and the impact of these stealthy attacks on the system state is quantified. When implemented through the set tools of constrained zonotopes, this approach provides accurate, time-varying attack-reachable sets that can be used to evaluate the safety and performance of systems in adversarial conditions. These tools are demonstrated through two case studies.
引用
收藏
页码:7081 / 7087
页数:7
相关论文
共 50 条
  • [31] Robust Fault Detection using Set-based Approaches
    Zhang, Shuang
    Puig, Vicenc
    5TH CONFERENCE ON CONTROL AND FAULT-TOLERANT SYSTEMS (SYSTOL 2021), 2021, : 91 - 96
  • [32] A novel set-based reachability method for optimal robust control of constrained linear systems
    Desimini, Riccardo
    Prandini, Maria
    2019 18TH EUROPEAN CONTROL CONFERENCE (ECC), 2019, : 1437 - 1442
  • [33] Ellipsoidal Set-Based Extended Command Governor for Constrained Linear Systems With Bounded Disturbances
    Nguyen, Hoai-Nam
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2023, 68 (09) : 5699 - 5705
  • [34] Robust constrained control of piecewise affine systems through set-based reachability computations
    Desimini, Riccardo
    Prandini, Maria
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2020, 30 (15) : 5989 - 6020
  • [35] Constrained Convex Generators: A Tool Suitable for Set-Based Estimation With Range and Bearing Measurements
    Silvestre, Daniel
    IEEE CONTROL SYSTEMS LETTERS, 2022, 6 : 1610 - 1615
  • [36] Quantifying the Impact of Cyber-Attack Strategies for Control Systems Equipped with an Anomaly Detector
    Milosevic, Jezdimir
    Umsonst, David
    Sandberg, Henrik
    Johansson, Karl Henrik
    2018 EUROPEAN CONTROL CONFERENCE (ECC), 2018, : 338 - 344
  • [37] Image set-based classification using collaborative exemplars representation
    Xu, Zhi
    Cai, Guoyong
    Wen, Yimin
    Chen, Dongdong
    Han, Liyao
    SIGNAL IMAGE AND VIDEO PROCESSING, 2018, 12 (04) : 607 - 615
  • [38] Using Set-Based Heading to Improve Mobile Agent Movement
    Prosser, Bryan
    Dawes, Neal
    Fulp, Errin W.
    McKinnon, A. David
    Fink, Glenn A.
    2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SELF-ADAPTIVE AND SELF-ORGANIZING SYSTEMS (SASO), 2014, : 120 - 128
  • [39] A level set-based structural optimization code using FEniCS
    Laurain, Antoine
    STRUCTURAL AND MULTIDISCIPLINARY OPTIMIZATION, 2018, 58 (03) : 1311 - 1334
  • [40] Image set-based classification using collaborative exemplars representation
    Zhi Xu
    Guoyong Cai
    Yimin Wen
    Dongdong Chen
    Liyao Han
    Signal, Image and Video Processing, 2018, 12 : 607 - 615