Set-Based Anomaly Detector and Stealthy Attack Impact using Constrained Zonotopes

被引:1
作者
Wagner, Jonas [1 ]
Kogel, Tanner [1 ]
Ruths, Justin [1 ]
机构
[1] Univ Texas Dallas, Mech Engn Dept, Richardson, TX 75083 USA
来源
2023 62ND IEEE CONFERENCE ON DECISION AND CONTROL, CDC | 2023年
基金
美国国家科学基金会;
关键词
D O I
10.1109/CDC49753.2023.10383403
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a set-based detector is developed and analyzed based on the propagation of nominal (no attacks), actual (possibly with attacks), and perceived (corrupted by attacks) residuals due to bounded system and measurement noise uncertainties. The set of stealthy attacks (attacks that raise no alarms) is characterized and the impact of these stealthy attacks on the system state is quantified. When implemented through the set tools of constrained zonotopes, this approach provides accurate, time-varying attack-reachable sets that can be used to evaluate the safety and performance of systems in adversarial conditions. These tools are demonstrated through two case studies.
引用
收藏
页码:7081 / 7087
页数:7
相关论文
共 50 条
  • [41] A level set-based structural optimization code using FEniCS
    Antoine Laurain
    Structural and Multidisciplinary Optimization, 2018, 58 : 1311 - 1334
  • [42] Rule Induction Using Set-Based Particle Swarm Optimisation
    van Zyl, Jean-Pierre
    Engelbrecht, Andries P.
    2022 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2022,
  • [43] Kinodynamic planning for robotic manipulators using set-based methods
    McGovern, Ryan
    Athanasopoulos, Nikolaos
    2022 EUROPEAN CONTROL CONFERENCE (ECC), 2022, : 1309 - 1314
  • [44] Rough set-based decision tree using a core attribute
    Han, Sang-Wook
    Kim, Jae-Yearn
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY & DECISION MAKING, 2008, 7 (02) : 275 - 290
  • [45] Design and evaluation of a rough set-based anomaly detection scheme considering weighted feature values
    Bae, Ihn-Han
    Lee, Hwa-Ju
    Lee, Kyung-Sook
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 1, PROCEEDINGS, 2006, 4251 : 483 - 489
  • [46] Stealthy attack detection using convex optimization-based RPCA algorithm
    Arulini, Sheryl A.
    Jawhar, Joseph
    ELECTRIC POWER SYSTEMS RESEARCH, 2020, 187
  • [47] Adapting to Changes in Design Requirements Using Set-Based Design
    McKenney, Thomas A.
    Kemink, Lauren F.
    Singer, David J.
    NAVAL ENGINEERS JOURNAL, 2011, 123 (03) : 67 - 77
  • [48] Constrained-Differential-Evolution-Based Stealthy Sparse Cyber-Attack and Countermeasure in an AC Smart Grid
    Lu, Kang-Di
    Wu, Zheng-Guang
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (08) : 5275 - 5285
  • [49] Set-valued state estimation of nonlinear discrete-time systems with nonlinear invariants based on constrained zonotopes
    Rego, Brenner S.
    Scott, Joseph K.
    Raimondo, Davide M.
    Raffo, Guilherme V.
    AUTOMATICA, 2021, 129
  • [50] Guaranteed methods based on constrained zonotopes for set-valued state estimation of nonlinear discrete-time systems
    Rego, Brenner S.
    Raffo, Guilherme V.
    Scott, Joseph K.
    Raimondo, Davide M.
    AUTOMATICA, 2020, 111 (111)