Data-Driven Methods for Stealthy Attacks on TCP/IP-Based Networked Control Systems Equipped With Attack Detectors

被引:55
作者
Wang, Jun-Sheng [1 ,2 ]
Yang, Guang-Hong [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Liaoning, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Liaoning, Peoples R China
基金
中国国家自然科学基金;
关键词
Cyber-physical systems (CPSs); data-driven methods; de servo systems; stealthy attack; transmission control protocol/Internet protocol (TCP/IP); LOOP SUBSPACE IDENTIFICATION; STATE ESTIMATION; DATA-INJECTION; SECURE CONTROL; SCHEMES; FAULTS;
D O I
10.1109/TCYB.2018.2837874
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most of the existing stealthy attack schemes for cyber-physical systems (CPSs) are presented under the assumption that the model parameters of CPS arc known to attackers. Presently, there are only a few model-independent stealthy attack approaches, which, however, need the assumption that attackers know sensor measurements and can modify them. This paper aims to remove the aforementioned conservative assumptions and give a stealthy attack methodology for closed-loop CPS with reference signals, that is, transmission control protocol/Internet protocol (TCP/IP)-based networked control systems. To this end, under the condition that the model parameters of the CPS are unknown, a benchmark platform (consisting of an attack detector and a TCP/IP-based networked de servo system) used for testing the stealthy attack technology is constructed via data-driven methods. A plan is made, which is utilized for eavesdropping the information of the TCP/IP-based CPS. On this basis, an approach to blocking network communications and injecting the false sensor data into the CPS is explored. A closed-loop recursive identification strategy for the dynamic characteristic matrix of the CPS is designed. By employing all of the above-obtained results, a data-driven stealthy attack scheme for the CPS is proposed and, subsequently, its effectiveness and practicability are validated by experiment.
引用
收藏
页码:3020 / 3031
页数:12
相关论文
empty
未找到相关数据